Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/12/2024, 23:59

General

  • Target

    file.exe

  • Size

    2.9MB

  • MD5

    d2b1682105389a925387227c660abb87

  • SHA1

    9c91cbba1071420b73caad3a2abcfc47360f4f0e

  • SHA256

    65e38a7dd78629bc9a810a0dac0a18f977be82eacd6de5a090c0405c57de7a26

  • SHA512

    452a20edc68a8d76018220fe6f0ed3a38d6211e66b393f573f460fb2f9ec6f11efb4b8a45256ad8c3cae4acc0cf31ae60c4bbc3692f967a34a350fb4e0c080be

  • SSDEEP

    49152:l+OrfMejZNr/UFhowlQSEzzRQA1BehabYJOnbj:lrfdj8FhowlQSuziAOhaaOn3

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://drive-connect.cyou/api

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

https://tacitglibbr.biz/api

https://shineugler.biz/api

Extracted

Family

cryptbot

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://drive-connect.cyou/api

https://tacitglibbr.biz/api

https://shineugler.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • XMRig Miner payload 13 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 26 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3564
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5008
      • C:\Users\Admin\AppData\Local\Temp\1015819001\XpAg0vN.exe
        "C:\Users\Admin\AppData\Local\Temp\1015819001\XpAg0vN.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:760
      • C:\Users\Admin\AppData\Local\Temp\1015821001\b35ee32a7a.exe
        "C:\Users\Admin\AppData\Local\Temp\1015821001\b35ee32a7a.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4940
          • C:\Windows\system32\mode.com
            mode 65,10
            5⤵
              PID:316
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e file.zip -p24291711423417250691697322505 -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:2744
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_7.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:2380
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_6.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3424
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_5.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1736
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_4.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3784
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_3.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4552
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_2.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1480
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_1.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1932
            • C:\Windows\system32\attrib.exe
              attrib +H "in.exe"
              5⤵
              • Views/modifies file attributes
              PID:1440
            • C:\Users\Admin\AppData\Local\Temp\main\in.exe
              "in.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4496
              • C:\Windows\SYSTEM32\attrib.exe
                attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:3300
              • C:\Windows\SYSTEM32\attrib.exe
                attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:1944
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:3276
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell ping 127.0.0.1; del in.exe
                6⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4440
                • C:\Windows\system32\PING.EXE
                  "C:\Windows\system32\PING.EXE" 127.0.0.1
                  7⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:3556
        • C:\Users\Admin\AppData\Local\Temp\1015822001\0b438bd844.exe
          "C:\Users\Admin\AppData\Local\Temp\1015822001\0b438bd844.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4932
          • C:\Users\Admin\AppData\Local\Temp\1015822001\0b438bd844.exe
            "C:\Users\Admin\AppData\Local\Temp\1015822001\0b438bd844.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2500
        • C:\Users\Admin\AppData\Local\Temp\1015823001\7cf608a853.exe
          "C:\Users\Admin\AppData\Local\Temp\1015823001\7cf608a853.exe"
          3⤵
          • Enumerates VirtualBox registry keys
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1132
        • C:\Users\Admin\AppData\Local\Temp\1015824001\1cb48e3b17.exe
          "C:\Users\Admin\AppData\Local\Temp\1015824001\1cb48e3b17.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:5072
        • C:\Users\Admin\AppData\Local\Temp\1015825001\e16651fb61.exe
          "C:\Users\Admin\AppData\Local\Temp\1015825001\e16651fb61.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:3976
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1015825001\e16651fb61.exe" & rd /s /q "C:\ProgramData\VAIM7GLFCBIE" & exit
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2724
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 10
              5⤵
              • System Location Discovery: System Language Discovery
              • Delays execution with timeout.exe
              PID:3724
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 2036
            4⤵
            • Program crash
            PID:3428
        • C:\Users\Admin\AppData\Local\Temp\1015826001\10d947db59.exe
          "C:\Users\Admin\AppData\Local\Temp\1015826001\10d947db59.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1892
          • C:\Users\Admin\AppData\Local\Temp\UGO5G91RXEVYA7MMU7WPBPLSAV7DT88.exe
            "C:\Users\Admin\AppData\Local\Temp\UGO5G91RXEVYA7MMU7WPBPLSAV7DT88.exe"
            4⤵
            • Modifies Windows Defender Real-time Protection settings
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Windows security modification
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1196
          • C:\Users\Admin\AppData\Local\Temp\L8WRSYZ9N5P13IJ2108D.exe
            "C:\Users\Admin\AppData\Local\Temp\L8WRSYZ9N5P13IJ2108D.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4984
        • C:\Users\Admin\AppData\Local\Temp\1015827001\671f320d56.exe
          "C:\Users\Admin\AppData\Local\Temp\1015827001\671f320d56.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:228
        • C:\Users\Admin\AppData\Local\Temp\1015828001\df16fc1c3f.exe
          "C:\Users\Admin\AppData\Local\Temp\1015828001\df16fc1c3f.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1268
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3464
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2968
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1496
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:5012
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3732
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:4516
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:3556
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5407972c-7599-4364-ad92-85b563ee3871} 3556 "\\.\pipe\gecko-crash-server-pipe.3556" gpu
                  6⤵
                    PID:5040
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {36f84876-877e-4d5e-b51c-63eb53a0a4d7} 3556 "\\.\pipe\gecko-crash-server-pipe.3556" socket
                    6⤵
                      PID:2832
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3172 -childID 1 -isForBrowser -prefsHandle 3208 -prefMapHandle 3236 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {71a7b3b0-6443-477d-9678-fb77dd8326d3} 3556 "\\.\pipe\gecko-crash-server-pipe.3556" tab
                      6⤵
                        PID:216
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3924 -childID 2 -isForBrowser -prefsHandle 3084 -prefMapHandle 1076 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a4450cf3-41ad-43d1-9671-0f860a0cf603} 3556 "\\.\pipe\gecko-crash-server-pipe.3556" tab
                        6⤵
                          PID:316
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2784 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4516 -prefMapHandle 4512 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f0a03b9f-8295-4472-b4ec-6d01832d4d5e} 3556 "\\.\pipe\gecko-crash-server-pipe.3556" utility
                          6⤵
                          • Checks processor information in registry
                          PID:2392
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5632 -childID 3 -isForBrowser -prefsHandle 5608 -prefMapHandle 5612 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c4f1c369-9ab5-4f8e-9a48-ad06e34bc019} 3556 "\\.\pipe\gecko-crash-server-pipe.3556" tab
                          6⤵
                            PID:1044
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5772 -childID 4 -isForBrowser -prefsHandle 5848 -prefMapHandle 5844 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {22274f25-3238-4c2c-8814-faa2469964a5} 3556 "\\.\pipe\gecko-crash-server-pipe.3556" tab
                            6⤵
                              PID:116
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6028 -childID 5 -isForBrowser -prefsHandle 5652 -prefMapHandle 5616 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6fddc9cd-f172-4fac-a358-c526e3007a24} 3556 "\\.\pipe\gecko-crash-server-pipe.3556" tab
                              6⤵
                                PID:3332
                        • C:\Users\Admin\AppData\Local\Temp\1015829001\1b4212e9e8.exe
                          "C:\Users\Admin\AppData\Local\Temp\1015829001\1b4212e9e8.exe"
                          3⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3236
                        • C:\Users\Admin\AppData\Local\Temp\1015830001\d9c46d37be.exe
                          "C:\Users\Admin\AppData\Local\Temp\1015830001\d9c46d37be.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4592
                    • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      1⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:1960
                      • C:\Windows\explorer.exe
                        explorer.exe
                        2⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4392
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                        2⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1736
                        • C:\Windows\system32\PING.EXE
                          "C:\Windows\system32\PING.EXE" 127.1.10.1
                          3⤵
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Runs ping.exe
                          PID:3056
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3976 -ip 3976
                      1⤵
                        PID:2204
                      • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                        C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                        1⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1564
                        • C:\Windows\explorer.exe
                          explorer.exe
                          2⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1664
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                          2⤵
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2764
                          • C:\Windows\system32\PING.EXE
                            "C:\Windows\system32\PING.EXE" 127.1.10.1
                            3⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Runs ping.exe
                            PID:5012

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                              Filesize

                              2KB

                              MD5

                              21e44557b2fa8e6186d9177607dd801f

                              SHA1

                              4def4d9e454c653b4a778e06adcb249d3323142d

                              SHA256

                              49b07f45f106ef173012341b976b7937f7d8c74114a9cb027be11bcf29aab867

                              SHA512

                              7e24a56251de14ed1438426e7f6cebac07eee6e693bbd24e3380116a22e046c94d95be50d850b12e965750837fe0de4289baf1182b422a71a9a9abf11f7661d1

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              815c1cbd80d872af0169e3c0ce5015fe

                              SHA1

                              a22dc5e1c5c4e7349b12f4b5d2a1fd3dfc8e4390

                              SHA256

                              6b9382733afa68e517bbc15ce15898509319d94007b457b140a11a9876fc3d0f

                              SHA512

                              161a79c1ca082135a933fc7cfafdab0505ad70236e52763458f736203393ee0f2bb64cc402c40582fd4dfc466cc5e4cd73702276718af540705bfe0d4267d4db

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json

                              Filesize

                              20KB

                              MD5

                              a90304130f5c9ef3a441260dc921080c

                              SHA1

                              7303400073a30425b2feac04453378615efc0931

                              SHA256

                              ddf2c8cfafd998640436c6d6f2105783b8f02f30675ca06e28fe67b2a0ba9319

                              SHA512

                              903d735fc89d4a935ac3b5a75c2c5ecbe069f788316eb8ab5f06877d0c78732e824ec65c257deb71e9225cf8557072cb7d5e03a076fd673e036e675b51889110

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                              Filesize

                              13KB

                              MD5

                              bb48f9f8309e2ae6c3a2b54804cd2e27

                              SHA1

                              39b95772ca826099c54cbf01cefd0108a837ae1e

                              SHA256

                              d030bfc22fa4588ace801b29a24abfd1eb0290b353a1968bcaf404000410253c

                              SHA512

                              d6e62d3842de09fd27697ee5e798eeba50111ea7dd4e3ed5e3fcf6acfb3724a7f392513224dee09c6a08a8cd1ec9195297c301edfd54fb59320db7b773d93283

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                              Filesize

                              15KB

                              MD5

                              96c542dec016d9ec1ecc4dddfcbaac66

                              SHA1

                              6199f7648bb744efa58acf7b96fee85d938389e4

                              SHA256

                              7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                              SHA512

                              cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                            • C:\Users\Admin\AppData\Local\Temp\1015819001\XpAg0vN.exe

                              Filesize

                              54KB

                              MD5

                              d708cdcf904424e5ccfe7583ee1c7567

                              SHA1

                              8e47e3f58b42d400d347686f96fadbeca8f08416

                              SHA256

                              00e5dee46223200a6ec5fe8cb742dfa3dbcab1738233944c7fc8b66fc56e10e1

                              SHA512

                              b6e6fd7266729ce08d7618b1ae5ec231745a188da6c0c8837bfc464c642a36f1603911dd0ccf19f27ca004af2d7c58975f9424472841b165edeab1d0850c311d

                            • C:\Users\Admin\AppData\Local\Temp\1015821001\b35ee32a7a.exe

                              Filesize

                              4.2MB

                              MD5

                              3a425626cbd40345f5b8dddd6b2b9efa

                              SHA1

                              7b50e108e293e54c15dce816552356f424eea97a

                              SHA256

                              ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                              SHA512

                              a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                            • C:\Users\Admin\AppData\Local\Temp\1015822001\0b438bd844.exe

                              Filesize

                              710KB

                              MD5

                              28e568616a7b792cac1726deb77d9039

                              SHA1

                              39890a418fb391b823ed5084533e2e24dff021e1

                              SHA256

                              9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2

                              SHA512

                              85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5

                            • C:\Users\Admin\AppData\Local\Temp\1015823001\7cf608a853.exe

                              Filesize

                              4.3MB

                              MD5

                              7bdd52d200b7195b67e68677dfd53b48

                              SHA1

                              2c6e16d9905d1727f71cfb807d5f44fffb2bf34b

                              SHA256

                              0a0e9a6e074898066418d7916d49f16f262e58b4f670cdcebe17ded36bf0b1b8

                              SHA512

                              f913cfa2608e147ea1e837d4dfde32e91f12c482ae5f494c7f5516e9735bf6364bc5f4d8cf82bf1485fabf840b47854c4767bc7b673279ecbb12e7b258e9c847

                            • C:\Users\Admin\AppData\Local\Temp\1015824001\1cb48e3b17.exe

                              Filesize

                              4.3MB

                              MD5

                              d6ae7100d00459b353ffe46fe09f8fb6

                              SHA1

                              c6e7ee53f412d1991af4b3fe8c5e29ff30c3ae27

                              SHA256

                              ae8d57b5c9d8a11db7c2e89b8a8967b570346114a1044f68201e6d2e13223a7b

                              SHA512

                              e62c156ab6ae1969fd47d1dd37d731ee603dd40951522c2af0c2b577ef6d2e71c19ff93b2d2d8a7377733fd05b43162e6e92b04eb4bf1dbb5dc2421f2117e06e

                            • C:\Users\Admin\AppData\Local\Temp\1015825001\e16651fb61.exe

                              Filesize

                              384KB

                              MD5

                              dfd5f78a711fa92337010ecc028470b4

                              SHA1

                              1a389091178f2be8ce486cd860de16263f8e902e

                              SHA256

                              da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d

                              SHA512

                              a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656

                            • C:\Users\Admin\AppData\Local\Temp\1015826001\10d947db59.exe

                              Filesize

                              1.8MB

                              MD5

                              2a6aeec4e777f7a51d69c8e2722470b0

                              SHA1

                              920239d60b2e721d26a25fd9cf5d5b7bb24fb071

                              SHA256

                              9ee9269af52c94e8debc491be4fae9fe7df1a25bbc055895b57a18d80184ef00

                              SHA512

                              bf568319c04750e6c481fba348e72d815b968a215a8f281429237b0bb7e35b272f2d990ad1af23731a8301dbf709efd30cbeac9532b4804710abadae89705de1

                            • C:\Users\Admin\AppData\Local\Temp\1015828001\df16fc1c3f.exe

                              Filesize

                              944KB

                              MD5

                              20abe18170f17f6897254e2255cf871e

                              SHA1

                              4e267654f4ccb3755191c05aa0a1d3bc591f3b18

                              SHA256

                              c9b2bbd6b1f057d79ce0e749cded19d9d47cf281305f812e3d255ffc30c5fd8e

                              SHA512

                              d1dbba3ecaaef71012cd07035eee03b7f9827f823967c733cace9fbd67c7df7a5777b339f8640dcf36cf91c04164f31ab9bf9f85ac52c8c72d3ad0da190ca1cc

                            • C:\Users\Admin\AppData\Local\Temp\1015830001\d9c46d37be.exe

                              Filesize

                              1.7MB

                              MD5

                              6c1d0dabe1ec5e928f27b3223f25c26b

                              SHA1

                              e25ab704a6e9b3e4c30a6c1f7043598a13856ad9

                              SHA256

                              92228a0012605351cf08df9a2ad4b93fa552d7a75991f81fb80f1ae854a0e57d

                              SHA512

                              3a3f7af4f6018fcbd8c6f2871270504731cf269134453c9a146351c3e4a5c89165ecccafb3655d8b39c1ff1ec68f06e1851c0abd66d47602e1f0f8e36d4acfe9

                            • C:\Users\Admin\AppData\Local\Temp\L8WRSYZ9N5P13IJ2108D.exe

                              Filesize

                              1.8MB

                              MD5

                              2b42a6845cebbdb99b482bb1368550a9

                              SHA1

                              a77c1869dcf86fcb2599103f0bba1f8a37d4f524

                              SHA256

                              3047c85efba5f953d7308cd6ce571369962417b1f094b8c3129bae3139503d3a

                              SHA512

                              03de82140e61b1260c47136bdc3e1ef7f1a81f09b7ad9ae13d90a2c229e1285287d9b878c27879cde2a5667d39b0e48c166450f4473954040784efd93c0d1459

                            • C:\Users\Admin\AppData\Local\Temp\UGO5G91RXEVYA7MMU7WPBPLSAV7DT88.exe

                              Filesize

                              2.7MB

                              MD5

                              9dfcb4a9ea102af900dddfb6a9254e7f

                              SHA1

                              7ce43ca00b6fb2d8d184a0fc4a2bd761eafbfd12

                              SHA256

                              af3b4408b3fe6467351b49ea5328d12d75c09cc29b5e10b5448a682367fa7a5f

                              SHA512

                              f257c8884dbac1d0d1d3ce75feea8a4138e0e0c02b06412189d3bb245ae319460295ff8bc51c938d5e9fa6fccb5533d48fc0aab191eeff8629427a1413536614

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_c0ofb2ad.xa5.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                              Filesize

                              2.9MB

                              MD5

                              d2b1682105389a925387227c660abb87

                              SHA1

                              9c91cbba1071420b73caad3a2abcfc47360f4f0e

                              SHA256

                              65e38a7dd78629bc9a810a0dac0a18f977be82eacd6de5a090c0405c57de7a26

                              SHA512

                              452a20edc68a8d76018220fe6f0ed3a38d6211e66b393f573f460fb2f9ec6f11efb4b8a45256ad8c3cae4acc0cf31ae60c4bbc3692f967a34a350fb4e0c080be

                            • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                              Filesize

                              1.6MB

                              MD5

                              72491c7b87a7c2dd350b727444f13bb4

                              SHA1

                              1e9338d56db7ded386878eab7bb44b8934ab1bc7

                              SHA256

                              34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                              SHA512

                              583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                              Filesize

                              458KB

                              MD5

                              619f7135621b50fd1900ff24aade1524

                              SHA1

                              6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                              SHA256

                              344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                              SHA512

                              2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                              Filesize

                              2.2MB

                              MD5

                              579a63bebccbacab8f14132f9fc31b89

                              SHA1

                              fca8a51077d352741a9c1ff8a493064ef5052f27

                              SHA256

                              0ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0

                              SHA512

                              4a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                              Filesize

                              1.7MB

                              MD5

                              5659eba6a774f9d5322f249ad989114a

                              SHA1

                              4bfb12aa98a1dc2206baa0ac611877b815810e4c

                              SHA256

                              e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4

                              SHA512

                              f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                              Filesize

                              1.7MB

                              MD5

                              5404286ec7853897b3ba00adf824d6c1

                              SHA1

                              39e543e08b34311b82f6e909e1e67e2f4afec551

                              SHA256

                              ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266

                              SHA512

                              c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                              Filesize

                              1.7MB

                              MD5

                              5eb39ba3698c99891a6b6eb036cfb653

                              SHA1

                              d2f1cdd59669f006a2f1aa9214aeed48bc88c06e

                              SHA256

                              e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2

                              SHA512

                              6c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                              Filesize

                              1.7MB

                              MD5

                              7187cc2643affab4ca29d92251c96dee

                              SHA1

                              ab0a4de90a14551834e12bb2c8c6b9ee517acaf4

                              SHA256

                              c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830

                              SHA512

                              27985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                              Filesize

                              1.7MB

                              MD5

                              b7d1e04629bec112923446fda5391731

                              SHA1

                              814055286f963ddaa5bf3019821cb8a565b56cb8

                              SHA256

                              4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                              SHA512

                              79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                              Filesize

                              1.7MB

                              MD5

                              0dc4014facf82aa027904c1be1d403c1

                              SHA1

                              5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                              SHA256

                              a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                              SHA512

                              cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                              Filesize

                              3.3MB

                              MD5

                              cea368fc334a9aec1ecff4b15612e5b0

                              SHA1

                              493d23f72731bb570d904014ffdacbba2334ce26

                              SHA256

                              07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                              SHA512

                              bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\in.exe

                              Filesize

                              1.7MB

                              MD5

                              83d75087c9bf6e4f07c36e550731ccde

                              SHA1

                              d5ff596961cce5f03f842cfd8f27dde6f124e3ae

                              SHA256

                              46db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f

                              SHA512

                              044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a

                            • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                              Filesize

                              3.3MB

                              MD5

                              045b0a3d5be6f10ddf19ae6d92dfdd70

                              SHA1

                              0387715b6681d7097d372cd0005b664f76c933c7

                              SHA256

                              94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                              SHA512

                              58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                            • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                              Filesize

                              440B

                              MD5

                              3626532127e3066df98e34c3d56a1869

                              SHA1

                              5fa7102f02615afde4efd4ed091744e842c63f78

                              SHA256

                              2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                              SHA512

                              dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                              Filesize

                              479KB

                              MD5

                              09372174e83dbbf696ee732fd2e875bb

                              SHA1

                              ba360186ba650a769f9303f48b7200fb5eaccee1

                              SHA256

                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                              SHA512

                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                              Filesize

                              13.8MB

                              MD5

                              0a8747a2ac9ac08ae9508f36c6d75692

                              SHA1

                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                              SHA256

                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                              SHA512

                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                              Filesize

                              6KB

                              MD5

                              2575ceafdf207b22d92b5a14c98b2232

                              SHA1

                              1d15782d802f585d1560a9b09d0ec5db69313f54

                              SHA256

                              9cfaf103fb8b1a4b87edda3434b364a47c5784c5fd22ec58944c202175c41cf8

                              SHA512

                              aaa4cfae8d5b9ed2a1e152d802f7cfadb5b158ea9c2718b426cb6a4c4221b5402036ce1b3654a8bf430d62fca7a841467db42ec45d45f15520b0f46604ef14aa

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                              Filesize

                              8KB

                              MD5

                              22a0ae9122939ccb139010d382b19c1e

                              SHA1

                              5fcc05fda6e04405bbce4f0b6a740c5a16f77af2

                              SHA256

                              9a613dd0064a6ceca2d603f12a428f2289f657169564623c2dbd8ca0e275e106

                              SHA512

                              00bd6c63d6059b241031f5674e823c85d6f30bcc6421fc744cc450f052b2954728bac2b998ca5a8c7df88b6325fa9ddde14cb181c6ec401710067c3e2ac920a2

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\cert9.db

                              Filesize

                              224KB

                              MD5

                              e53fa69945fe7beae375863b11d954e5

                              SHA1

                              df241cb778043b837acc590759d55b1e990de7d9

                              SHA256

                              9e7e79329aec0ed03126668b616adeb5135280a19745ec44130597a0b3643122

                              SHA512

                              31d8e32d7421995d223857fe1d3ac74c791ea6d3729a3382dfd51b85de08c07f3a8a57dae395ced1f50655758193c3358930f36b944a89ba5be39a98a24e4f53

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              22KB

                              MD5

                              8e80541e357b2336760f04011fc1a30a

                              SHA1

                              33375f818009f2da7dfd167ae62f763b85c35feb

                              SHA256

                              2b3b68d52b4e52f715353b78e892ae02760f42faeadecb1683fbd593c14bdeee

                              SHA512

                              b8dd820cfaeabebb31e080383c0ad0f72e476ced3544bb45ca2f05c09ca8b22715e0edd80048ac5a870b8d3e8e3da17b73c4f67332e40f8b9f65ff7edbe730e9

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              25KB

                              MD5

                              f34657af61269c8c83261875b55b9eaa

                              SHA1

                              87be62c51f8c5bc47f3f36644a01ecd5b38d7899

                              SHA256

                              e47d0355b1f17d5e40a6647dd6744e803889f66e33501fb7953bc819578b4c63

                              SHA512

                              b639c2de681e5babb6ad6f530fac94bd6c97664695982c4879ef5e76c772a6c7b48cd8fcafa1c0ede7156037434170ecc3569d08a8f100fa8e11b85ddebf054f

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              25KB

                              MD5

                              2e109301a5eab67bb1690a0c299c4cd1

                              SHA1

                              cf875d52e1323bec1add2dcfaf6399fefc1fe8f9

                              SHA256

                              efd3ce96d1590bad180b799c08c9afa2c9394559996aed495a5bdf2765af8532

                              SHA512

                              1c7697f6755c48b1275889394a59c40829bdfdeea7a7998914a8759105ef7145d99546a693f41d7e46b86dedafd12483d45a8c696963e6e3fbb3035939d514e8

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              23KB

                              MD5

                              0854cd365096c1a5efdbd9cf0d200910

                              SHA1

                              8bf6c9878e4a5684bd006fc0edaac1f38538202a

                              SHA256

                              8491132febe15568f7222cc9f22b42794e47a1fbf217aae6194a7fb98b300195

                              SHA512

                              a3354be81c9d35caa3bb2be3c517d901986b47fae1a07da779c66d5df2d7dc0d89de166747ab0b430293b435e31767b48bfc30ddeeef86295b165562577b7bcd

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\20725bbe-b04d-48dc-a89c-0bd92a63d14e

                              Filesize

                              659B

                              MD5

                              459cec63bc5eb193dd711efb50831728

                              SHA1

                              f71fb1782824fb4eea4ce6eef7c55fa8a2a422ed

                              SHA256

                              8a55d938f0c768081a81b5f6900696ec3f19990d47236874fe03b6005015dd5f

                              SHA512

                              052cbb6a43571a9ca6dd423a495f3455281ef151bb04cad144a1ffb65be357c98b7c2bdf88177c232314806d8284c9a55ccfc494bef97b2fab6880eb0a554250

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\d5554abe-eff0-4185-ba76-0955272c4e83

                              Filesize

                              982B

                              MD5

                              51bc7e080f9fcd4985107e3dbd156e4e

                              SHA1

                              36ff55760316a3f6fafd3020f7fda9fa5502feb6

                              SHA256

                              b8297dd61876bb78d2796c2487b4e36b3a617943e76dd03a702d1468a97e6235

                              SHA512

                              20e212fb2ce760870d33ca4fa0076f92de669144d99b55884f80969fb2dcf792d499d436bb37b1e3c8bd792f4ef5fe578ff74b13653a75cd4b0a401cabe77d09

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                              Filesize

                              1.1MB

                              MD5

                              842039753bf41fa5e11b3a1383061a87

                              SHA1

                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                              SHA256

                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                              SHA512

                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                              Filesize

                              116B

                              MD5

                              2a461e9eb87fd1955cea740a3444ee7a

                              SHA1

                              b10755914c713f5a4677494dbe8a686ed458c3c5

                              SHA256

                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                              SHA512

                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                              Filesize

                              372B

                              MD5

                              bf957ad58b55f64219ab3f793e374316

                              SHA1

                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                              SHA256

                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                              SHA512

                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                              Filesize

                              17.8MB

                              MD5

                              daf7ef3acccab478aaa7d6dc1c60f865

                              SHA1

                              f8246162b97ce4a945feced27b6ea114366ff2ad

                              SHA256

                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                              SHA512

                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                              Filesize

                              15KB

                              MD5

                              848bef882e3c810771d49becbd7fd824

                              SHA1

                              375f66f784b133733afd2e8b8f3983de7cc3dd1d

                              SHA256

                              793ce02f7158cf55de9f6c5c3d37b735a8716de0a1ab123dd7b06d890840f33a

                              SHA512

                              fe9609e393b7f89627b9c973c4b25f8b0f949232736bf2d10f687b02f0c493dfe6df4f435eb88b2ee84c39f7bebbb3863e2b5e4dbfe3a5deb9668b12117831b2

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                              Filesize

                              12KB

                              MD5

                              53f24738c4b3010b226b11866ff76049

                              SHA1

                              3a90b74970024bf3a7cf895bafb56fe40582c8eb

                              SHA256

                              96987a8bf912dd3871331d33205cf41011c1553d79afebb817f1c5710f0635ee

                              SHA512

                              b10640bc0ff2e7ef4b0510f2809b0b8b6d315bc8d046b608166df658cb6edfad940f3e9f909a37554f8cc4f603347d9b60828e8c89ac93806bd3d92914953d5b

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                              Filesize

                              10KB

                              MD5

                              c872a8fe916849212ada4a989f07d618

                              SHA1

                              ae0c03b822d6cbfb62d08e57d2bb217d907436fc

                              SHA256

                              a4df474a95bb284f88a9bd51cd55d930d8a6e18501b95bda4d371e785c5857d5

                              SHA512

                              d9a3624ec609b3ccaf36c34bf25a7aeef7783f8633510a93dacdaf8949b380193c64a292d9a1d53f6b74a6363e94b190e6b541bee205a055269cdca50bf3955c

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                              Filesize

                              10KB

                              MD5

                              2d03d53af4b73a88ef1d876df175a0de

                              SHA1

                              0fc6e21bb0d1d9dd3309c141e6534ce3090ce91a

                              SHA256

                              05facfba1e64d591bafa1060ca1749d8e0bfef041aecbb2c7045448651177924

                              SHA512

                              95bb6c85a43379f8d0bf37d1fcf6f7a1ede6fcedd727182f1b54beb14babafd2eaa4a03d040a08ee204e1feb6bcdaa64469ddcf73e28595029a5b1cac8d527ac

                            • memory/228-302-0x0000000000730000-0x0000000000DDD000-memory.dmp

                              Filesize

                              6.7MB

                            • memory/228-324-0x0000000000730000-0x0000000000DDD000-memory.dmp

                              Filesize

                              6.7MB

                            • memory/1132-231-0x00000000004C0000-0x00000000010C3000-memory.dmp

                              Filesize

                              12.0MB

                            • memory/1132-227-0x00000000004C0000-0x00000000010C3000-memory.dmp

                              Filesize

                              12.0MB

                            • memory/1132-182-0x00000000004C0000-0x00000000010C3000-memory.dmp

                              Filesize

                              12.0MB

                            • memory/1196-277-0x0000000000080000-0x0000000000332000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/1196-278-0x0000000000080000-0x0000000000332000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/1196-279-0x0000000000080000-0x0000000000332000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/1196-621-0x0000000000080000-0x0000000000332000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/1196-325-0x0000000000080000-0x0000000000332000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/1564-1046-0x00007FF71F250000-0x00007FF71F6E0000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/1664-1035-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/1664-1031-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/1664-1049-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/1892-284-0x0000000000280000-0x0000000000713000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/1892-272-0x0000000000280000-0x0000000000713000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/1960-198-0x00007FF71F250000-0x00007FF71F6E0000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/1960-185-0x00007FF71F250000-0x00007FF71F6E0000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/2500-165-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2500-163-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3236-668-0x0000000000E60000-0x0000000001112000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/3236-731-0x0000000000E60000-0x0000000001112000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/3236-734-0x0000000000E60000-0x0000000001112000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/3236-623-0x0000000000E60000-0x0000000001112000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/3236-667-0x0000000000E60000-0x0000000001112000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/3564-3-0x00000000006E0000-0x0000000000A01000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/3564-4-0x00000000006E0000-0x0000000000A01000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/3564-18-0x00000000006E0000-0x0000000000A01000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/3564-2-0x00000000006E1000-0x000000000070F000-memory.dmp

                              Filesize

                              184KB

                            • memory/3564-1-0x0000000077A04000-0x0000000077A06000-memory.dmp

                              Filesize

                              8KB

                            • memory/3564-0-0x00000000006E0000-0x0000000000A01000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/3976-255-0x0000000000400000-0x000000000064B000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/4392-187-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/4392-188-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/4392-193-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/4392-197-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/4392-220-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/4392-186-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/4392-192-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/4392-195-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/4392-189-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/4392-196-0x0000000001320000-0x0000000001340000-memory.dmp

                              Filesize

                              128KB

                            • memory/4392-190-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/4392-191-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/4440-144-0x0000021D415A0000-0x0000021D415C2000-memory.dmp

                              Filesize

                              136KB

                            • memory/4496-130-0x00007FF758470000-0x00007FF758900000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/4496-133-0x00007FF758470000-0x00007FF758900000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/4592-723-0x0000000000690000-0x0000000000B1B000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/4592-715-0x0000000000690000-0x0000000000B1B000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/4984-286-0x0000000000590000-0x0000000000C3D000-memory.dmp

                              Filesize

                              6.7MB

                            • memory/4984-303-0x0000000000590000-0x0000000000C3D000-memory.dmp

                              Filesize

                              6.7MB

                            • memory/5008-183-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-692-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-43-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-735-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-41-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-40-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-21-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-20-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-19-0x00000000001E1000-0x000000000020F000-memory.dmp

                              Filesize

                              184KB

                            • memory/5008-44-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-16-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-42-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-145-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-166-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-955-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-3706-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-270-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-3703-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-304-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-248-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5008-3093-0x00000000001E0000-0x0000000000501000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5072-229-0x0000000000580000-0x00000000011BD000-memory.dmp

                              Filesize

                              12.2MB

                            • memory/5072-226-0x0000000000580000-0x00000000011BD000-memory.dmp

                              Filesize

                              12.2MB