Analysis

  • max time kernel
    149s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23-12-2024 22:24

General

  • Target

    52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe

  • Size

    2.9MB

  • MD5

    150a14aee722f93553528f147ac1cfdb

  • SHA1

    a05fe7ada978105e51f8931a5049668234f5379e

  • SHA256

    52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c

  • SHA512

    48c4bdc1b646c8f21f67ed0eb98ff55e8d26a9349004b467caf98178e8092e21aacb0bfacecaaf4009a3fa1d339e8c36d674fb2af81c34fed6a08d8c9c88cd69

  • SSDEEP

    49152:IGI5rdefRz19sIuvq2/kdz0c0ladCQ5l1HjvePKy:QdefRPs3q2/Iz0c0ladCQr1re5

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://pollution-raker.cyou/api

https://hosue-billowy.cyou/api

https://ripe-blade.cyou/api

https://smash-boiling.cyou/api

https://supporse-comment.cyou/api

https://greywe-snotty.cyou/api

https://steppriflej.xyz/api

https://sendypaster.xyz/api

Extracted

Family

redline

Botnet

1488Traffer

C2

147.45.44.224:1912

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • XMRig Miner payload 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 35 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 53 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 27 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe
    "C:\Users\Admin\AppData\Local\Temp\52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Users\Admin\AppData\Local\Temp\1020416001\SdVB3P2.exe
        "C:\Users\Admin\AppData\Local\Temp\1020416001\SdVB3P2.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2516
      • C:\Users\Admin\AppData\Local\Temp\1020826001\I0XmI2t.exe
        "C:\Users\Admin\AppData\Local\Temp\1020826001\I0XmI2t.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2424
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -WindowStyle Hidden -EncodedCommand QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXAB4AHcAMwBkAGsAMgBlAHUAMQB4AG8AQwBPAFgAVwBSAEMAUQBEACcA
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2248
        • C:\Users\Admin\AppData\Roaming\xw3dk2eu1xoCOXWRCQD\DJj.exe
          "C:\Users\Admin\AppData\Roaming\xw3dk2eu1xoCOXWRCQD\DJj.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1504
      • C:\Users\Admin\AppData\Local\Temp\1020934001\mdjw5me.exe
        "C:\Users\Admin\AppData\Local\Temp\1020934001\mdjw5me.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2492
        • C:\Users\Admin\AppData\Local\Temp\1020934001\mdjw5me.exe
          "C:\Users\Admin\AppData\Local\Temp\1020934001\mdjw5me.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          PID:700
      • C:\Users\Admin\AppData\Local\Temp\1021325001\49cd5046bf.exe
        "C:\Users\Admin\AppData\Local\Temp\1021325001\49cd5046bf.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:932
      • C:\Users\Admin\AppData\Local\Temp\1021329001\cd5488bba4.exe
        "C:\Users\Admin\AppData\Local\Temp\1021329001\cd5488bba4.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2360
        • C:\Users\Admin\AppData\Local\Temp\1021329001\cd5488bba4.exe
          "C:\Users\Admin\AppData\Local\Temp\1021329001\cd5488bba4.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2752
      • C:\Users\Admin\AppData\Local\Temp\1021330001\6f5401d6ce.exe
        "C:\Users\Admin\AppData\Local\Temp\1021330001\6f5401d6ce.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:936
      • C:\Users\Admin\AppData\Local\Temp\1021331001\fff4e3aba6.exe
        "C:\Users\Admin\AppData\Local\Temp\1021331001\fff4e3aba6.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1856
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
          4⤵
          • Loads dropped DLL
          PID:2584
          • C:\Windows\system32\mode.com
            mode 65,10
            5⤵
              PID:2188
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e file.zip -p24291711423417250691697322505 -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1116
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_7.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:2920
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_6.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3020
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_5.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:2368
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_4.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:2540
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_3.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:932
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_2.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:2292
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_1.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:912
            • C:\Windows\system32\attrib.exe
              attrib +H "in.exe"
              5⤵
              • Views/modifies file attributes
              PID:1644
            • C:\Users\Admin\AppData\Local\Temp\main\in.exe
              "in.exe"
              5⤵
              • Executes dropped EXE
              PID:2268
              • C:\Windows\system32\attrib.exe
                attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:2152
              • C:\Windows\system32\attrib.exe
                attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:1356
              • C:\Windows\system32\schtasks.exe
                schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:2488
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell ping 127.0.0.1; del in.exe
                6⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:704
                • C:\Windows\system32\PING.EXE
                  "C:\Windows\system32\PING.EXE" 127.0.0.1
                  7⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:1192
        • C:\Users\Admin\AppData\Local\Temp\1021332001\5007fd9db0.exe
          "C:\Users\Admin\AppData\Local\Temp\1021332001\5007fd9db0.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1996
        • C:\Users\Admin\AppData\Local\Temp\1021333001\3bde4c445e.exe
          "C:\Users\Admin\AppData\Local\Temp\1021333001\3bde4c445e.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:584
        • C:\Users\Admin\AppData\Local\Temp\1021334001\83ccd36190.exe
          "C:\Users\Admin\AppData\Local\Temp\1021334001\83ccd36190.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:524
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2456
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1772
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2888
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:588
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1852
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:3064
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:2596
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.0.2090168831\1374193389" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6cb9fcea-f384-484b-bc09-fcb1899eb730} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 1324 103f4158 gpu
                  6⤵
                    PID:3028
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.1.1609469668\2000938894" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {662c04d8-57a5-4dd2-bd18-0137ea9b088b} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 1504 e74258 socket
                    6⤵
                      PID:2844
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.2.84455501\634614460" -childID 1 -isForBrowser -prefsHandle 2196 -prefMapHandle 2212 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {eaaa0f4a-991c-435d-a24c-ac5822575e13} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 2188 1a489258 tab
                      6⤵
                        PID:2292
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.3.1241233329\1868836498" -childID 2 -isForBrowser -prefsHandle 2928 -prefMapHandle 2920 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8548d78c-85c4-4ae0-9bc7-bf274f1ebd5a} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 2940 1cc17e58 tab
                        6⤵
                          PID:2828
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.4.774689707\98206817" -childID 3 -isForBrowser -prefsHandle 3896 -prefMapHandle 3892 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {94a72119-3871-4e5f-b7cc-adc6aa87bdbb} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 3908 1f7ec858 tab
                          6⤵
                            PID:568
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.5.1214285484\266473613" -childID 4 -isForBrowser -prefsHandle 4016 -prefMapHandle 4020 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe8046b6-6e42-49af-9df3-b245721941c4} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 4004 2121f458 tab
                            6⤵
                              PID:2008
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.6.1889201694\43204567" -childID 5 -isForBrowser -prefsHandle 4132 -prefMapHandle 4136 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8d5af3bb-5eab-4389-9517-f639d7f0901d} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 4120 2121e258 tab
                              6⤵
                                PID:1716
                        • C:\Users\Admin\AppData\Local\Temp\1021335001\6a151eeb5f.exe
                          "C:\Users\Admin\AppData\Local\Temp\1021335001\6a151eeb5f.exe"
                          3⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:540
                        • C:\Users\Admin\AppData\Local\Temp\1021336001\6c98084bf3.exe
                          "C:\Users\Admin\AppData\Local\Temp\1021336001\6c98084bf3.exe"
                          3⤵
                          • Executes dropped EXE
                          PID:2852
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "powershell.exe" -WindowStyle Hidden -EncodedCommand QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXABlAGUAbQB0AGIAMwBpADIANABkAHIAUwBIAFUARwBWAFMATgBHACcA
                            4⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3096
                          • C:\Users\Admin\AppData\Roaming\eemtb3i24drSHUGVSNG\DJj.exe
                            "C:\Users\Admin\AppData\Roaming\eemtb3i24drSHUGVSNG\DJj.exe"
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3352
                        • C:\Users\Admin\AppData\Local\Temp\1021337001\b1ec163c13.exe
                          "C:\Users\Admin\AppData\Local\Temp\1021337001\b1ec163c13.exe"
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Adds Run key to start application
                          • Drops file in Program Files directory
                          • Modifies system certificate store
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3268
                          • C:\Program Files\Windows Media Player\graph\graph.exe
                            "C:\Program Files\Windows Media Player\graph\graph.exe"
                            4⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3644
                        • C:\Users\Admin\AppData\Local\Temp\1021338001\f8c9acb5e0.exe
                          "C:\Users\Admin\AppData\Local\Temp\1021338001\f8c9acb5e0.exe"
                          3⤵
                          • Enumerates VirtualBox registry keys
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3864
                        • C:\Users\Admin\AppData\Local\Temp\1021339001\c4688ef85a.exe
                          "C:\Users\Admin\AppData\Local\Temp\1021339001\c4688ef85a.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Loads dropped DLL
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3164
                        • C:\Users\Admin\AppData\Local\Temp\1021340001\75411c9c9c.exe
                          "C:\Users\Admin\AppData\Local\Temp\1021340001\75411c9c9c.exe"
                          3⤵
                          • Executes dropped EXE
                          PID:2036
                        • C:\Users\Admin\AppData\Local\Temp\1021341001\828f3a59fd.exe
                          "C:\Users\Admin\AppData\Local\Temp\1021341001\828f3a59fd.exe"
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:3524
                          • C:\Users\Admin\AppData\Local\Temp\1021341001\828f3a59fd.exe
                            "C:\Users\Admin\AppData\Local\Temp\1021341001\828f3a59fd.exe"
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:2324
                    • C:\Windows\system32\taskeng.exe
                      taskeng.exe {EFE74B54-44AA-4528-B01C-70648906E188} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]
                      1⤵
                      • Loads dropped DLL
                      PID:540
                      • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                        C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2852
                        • C:\Windows\explorer.exe
                          explorer.exe
                          3⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3736
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                          3⤵
                          • Drops file in System32 directory
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3820
                          • C:\Windows\system32\PING.EXE
                            "C:\Windows\system32\PING.EXE" 127.1.10.1
                            4⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Runs ping.exe
                            PID:2892
                      • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                        C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:2844
                        • C:\Windows\explorer.exe
                          explorer.exe
                          3⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2376
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                          3⤵
                          • Drops file in System32 directory
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2176
                          • C:\Windows\system32\PING.EXE
                            "C:\Windows\system32\PING.EXE" 127.1.10.1
                            4⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Runs ping.exe
                            PID:2804

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8P9TO0C6\download[1].htm

                      Filesize

                      1B

                      MD5

                      cfcd208495d565ef66e7dff9f98764da

                      SHA1

                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                      SHA256

                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                      SHA512

                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\activity-stream.discovery_stream.json.tmp

                      Filesize

                      23KB

                      MD5

                      0af280ede69e416f4353bcb6395e99a8

                      SHA1

                      1b3fb10dc6b9ec4e5f3598f6b5c9b800a9c06b25

                      SHA256

                      9c46017607a9b01be9020a46d911447d863ba649717b902c55f1580a37975323

                      SHA512

                      9de06e0e27e631b84819ed12b945a1210e4bd4965afb710761fd85c8583deb65e59336f5a46baa7ddd7f67081b124e26ace8e1ac1c3a44ddc43a3abe31462a54

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                      Filesize

                      15KB

                      MD5

                      96c542dec016d9ec1ecc4dddfcbaac66

                      SHA1

                      6199f7648bb744efa58acf7b96fee85d938389e4

                      SHA256

                      7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                      SHA512

                      cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                    • C:\Users\Admin\AppData\Local\Temp\1020416001\SdVB3P2.exe

                      Filesize

                      1.8MB

                      MD5

                      8a0feb447f024f32d1ee001a56d7ee23

                      SHA1

                      39086a8133462fbbdbaad4a313789d216497e68a

                      SHA256

                      b474d829617220d8d949fa58a39d9eafde02ec488f0c7a4330950fefed66bd86

                      SHA512

                      09efc757b29341d91d08619e8924b5cbb3acd73f2fe13b1aa21327c4133721102110b17f6717b09e703d1137d4266ab6e563f85bd34e98a1ee03b1b50e7ddbec

                    • C:\Users\Admin\AppData\Local\Temp\1020826001\I0XmI2t.exe

                      Filesize

                      2.9MB

                      MD5

                      75ca34215f6e3916c51c0af34fc17284

                      SHA1

                      3726ba089194df9221b1eed520d62e452d74d509

                      SHA256

                      4d2340448332a51ceafe2cb2562b2441590eff605b7fc0478001ad103f495955

                      SHA512

                      51a8285cd0c989ca4a659fb84f401f81e92bcc9a2b03f3f55da565bc2a9b6fefb115ddb0009d675e265e391c65fb4defc6326037b70b03eb6ed1364f1d7dc679

                    • C:\Users\Admin\AppData\Local\Temp\1020934001\mdjw5me.exe

                      Filesize

                      520KB

                      MD5

                      81b5e34627858d87520f219c18cc5c7f

                      SHA1

                      f2a58e0cfd375756c799112180deb3770cc55cf8

                      SHA256

                      00297db7c9f2087e3c55b655df030155eedadd141ec2d31e47ff53aa82c43cc7

                      SHA512

                      ceb2bdf9a1396c637bf946592661e816446df56e1ba46275aef10b09e8db385c78f39825153c1b74b37bb7750ba5a7a5afc82bf25b1a19a322fd8eae010eec08

                    • C:\Users\Admin\AppData\Local\Temp\1021329001\cd5488bba4.exe

                      Filesize

                      562KB

                      MD5

                      63c8c11ca850435d9b5ec2ea41e50c22

                      SHA1

                      09a92f137462216a052f2a819ce110a0ac2f4022

                      SHA256

                      89f58c08d1ccdc0aa645f11fb84de4c8a1ee328fd8a847aca63523291465a3a4

                      SHA512

                      abdb139e86a3268c4d2bb5581c804219eeefc992e1dab87b3eb059db24015c849ce64d16ed0745df43dc8ac7ae49dcd5fd5660e65924752e669deafa6bbaa803

                    • C:\Users\Admin\AppData\Local\Temp\1021330001\6f5401d6ce.exe

                      Filesize

                      1.8MB

                      MD5

                      15709eba2afaf7cc0a86ce0abf8e53f1

                      SHA1

                      238ebf0d386ecf0e56d0ddb60faca0ea61939bb6

                      SHA256

                      10bff40a9d960d0be3cc81b074a748764d7871208f324de26d365b1f8ea3935a

                      SHA512

                      65edefa20f0bb35bee837951ccd427b94a18528c6e84de222b1aa0af380135491bb29a049009f77e66fcd2abe5376a831d98e39055e1042ccee889321b96e8e9

                    • C:\Users\Admin\AppData\Local\Temp\1021331001\fff4e3aba6.exe

                      Filesize

                      4.2MB

                      MD5

                      3a425626cbd40345f5b8dddd6b2b9efa

                      SHA1

                      7b50e108e293e54c15dce816552356f424eea97a

                      SHA256

                      ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                      SHA512

                      a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                    • C:\Users\Admin\AppData\Local\Temp\1021332001\5007fd9db0.exe

                      Filesize

                      1.7MB

                      MD5

                      9836a7092f4e042596449c941b6a266a

                      SHA1

                      dd920676bae1326313226d3f0aa90fee8cea211f

                      SHA256

                      1c7c9a3880458aaae1e4d98699602fff30b49c18ba586f6dc153b3def4f20668

                      SHA512

                      11519e0d2849d3cc4e8391e50044f0aa74ad278d30d6243c1aa3397487b6e16401fa38a5e4b70f3f57702c4d5657437e60f3fcddd2ed7614d93f8576a74518d7

                    • C:\Users\Admin\AppData\Local\Temp\1021333001\3bde4c445e.exe

                      Filesize

                      2.8MB

                      MD5

                      94b6fb853890025932da40460a6b1442

                      SHA1

                      f02ba57613297cef29e716d6b57cb1812c59c57f

                      SHA256

                      6eb1e816ac328d3f57ead1e3706c4592d6202a553fc809808f6a7fde1d29a98d

                      SHA512

                      9f04f2c30479be62b68db16f21244b0f28033f448a0fe9cb7f1d7daee9c3045f82baabd933c1bfc9fe6511298962e06e6b4c9d23365be5ad154cc1d90d6d7846

                    • C:\Users\Admin\AppData\Local\Temp\1021334001\83ccd36190.exe

                      Filesize

                      946KB

                      MD5

                      561a7131a3ea1d1cf0dcf85ac4b4c73e

                      SHA1

                      145cc8690213ec88e7cff85224687db176df8420

                      SHA256

                      33d2c23c0cb7a85766b1da848d51657e0b990417e9734b635285dbbd114e0731

                      SHA512

                      f336b2cf70a02e552b2fdecba820b4546a78e71a8e5452ca1b6b9b9bbe080741d3d2715883bffddf14211bae61dbbd4b8e0f8de2238d849062b6568ad27aae20

                    • C:\Users\Admin\AppData\Local\Temp\1021335001\6a151eeb5f.exe

                      Filesize

                      2.7MB

                      MD5

                      0ae41be0f598507c39e6a2db6ba41dfb

                      SHA1

                      2afab0e9f9927dc6ddd9e8a122e6add09e863feb

                      SHA256

                      5b87e1f3701c17765ccdb6a09a47b3a56aab3e1d053f022c2c0af3d339699af5

                      SHA512

                      bdaf545a49c4a10bcf56702c6cb1f521286b7b692e1dc79c5f75da05a6fb631784e1e072bff49de6a5892afaa96acea04150e33f46f53e2f8b7b365f348824a5

                    • C:\Users\Admin\AppData\Local\Temp\1021337001\b1ec163c13.exe

                      Filesize

                      591KB

                      MD5

                      3567cb15156760b2f111512ffdbc1451

                      SHA1

                      2fdb1f235fc5a9a32477dab4220ece5fda1539d4

                      SHA256

                      0285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630

                      SHA512

                      e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba

                    • C:\Users\Admin\AppData\Local\Temp\1021338001\f8c9acb5e0.exe

                      Filesize

                      4.2MB

                      MD5

                      b2cf79370b6c115f2f5f44372fc917b0

                      SHA1

                      ab92465543a7e36348ac93de665f7d89149a6ff3

                      SHA256

                      9e81d28cfca40a37cc19537bcacea75f9c578840b138dd8c254e20aaca418ee2

                      SHA512

                      d515f34ce1e16afa3f019bd0c8f66a340592343c170da19b7f8a0bc2f57afc685f6370e9d112d10e3b3adc8daecd3197df454ae8e241f399e073aefee9389708

                    • C:\Users\Admin\AppData\Local\Temp\1021339001\c4688ef85a.exe

                      Filesize

                      1.8MB

                      MD5

                      e7ec13990da9efcc5afae3f49d5ccde0

                      SHA1

                      37d78027c740fa3a6d7e70e15215e30337d2cd4b

                      SHA256

                      f3c3053569ed6d214eda4c527ba7a4c1412a3176a60aa7ca32aef039bb99af97

                      SHA512

                      ef4fa2e363e31e1029d61c08bbc901a017f12d8aedcb0691e52d33973bcf39347b1415660e8eadb0c33c925f1e82865b5bb35addf35143f22dbf41f156b6aa8c

                    • C:\Users\Admin\AppData\Local\Temp\1021340001\75411c9c9c.exe

                      Filesize

                      2.5MB

                      MD5

                      87330f1877c33a5a6203c49075223b16

                      SHA1

                      55b64ee8b2d1302581ab1978e9588191e4e62f81

                      SHA256

                      98f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0

                      SHA512

                      7c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f

                    • C:\Users\Admin\AppData\Local\Temp\1021341001\828f3a59fd.exe

                      Filesize

                      528KB

                      MD5

                      9ab250b0dc1d156e2d123d277eb4d132

                      SHA1

                      3b434ff78208c10f570dfe686455fd3094f3dd48

                      SHA256

                      49bfa0b1c3553208e59b6b881a58c94bb4aa3d09e51c3f510f207b7b24675864

                      SHA512

                      a30fb204b556b0decd7fab56a44e62356c7102bc8146b2dfd88e6545dea7574e043a3254035b7514ee0c686a726b8f5ba99bcd91e8c2c7f39c105e2724080ef0

                    • C:\Users\Admin\AppData\Local\Temp\Cab8900.tmp

                      Filesize

                      70KB

                      MD5

                      49aebf8cbd62d92ac215b2923fb1b9f5

                      SHA1

                      1723be06719828dda65ad804298d0431f6aff976

                      SHA256

                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                      SHA512

                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                    • C:\Users\Admin\AppData\Local\Temp\Tar8A79.tmp

                      Filesize

                      181KB

                      MD5

                      4ea6026cf93ec6338144661bf1202cd1

                      SHA1

                      a1dec9044f750ad887935a01430bf49322fbdcb7

                      SHA256

                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                      SHA512

                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                      Filesize

                      1.6MB

                      MD5

                      72491c7b87a7c2dd350b727444f13bb4

                      SHA1

                      1e9338d56db7ded386878eab7bb44b8934ab1bc7

                      SHA256

                      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                      SHA512

                      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                      Filesize

                      1.7MB

                      MD5

                      b7d1e04629bec112923446fda5391731

                      SHA1

                      814055286f963ddaa5bf3019821cb8a565b56cb8

                      SHA256

                      4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                      SHA512

                      79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                      Filesize

                      1.7MB

                      MD5

                      0dc4014facf82aa027904c1be1d403c1

                      SHA1

                      5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                      SHA256

                      a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                      SHA512

                      cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                      Filesize

                      3.3MB

                      MD5

                      cea368fc334a9aec1ecff4b15612e5b0

                      SHA1

                      493d23f72731bb570d904014ffdacbba2334ce26

                      SHA256

                      07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                      SHA512

                      bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                    • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                      Filesize

                      3.3MB

                      MD5

                      045b0a3d5be6f10ddf19ae6d92dfdd70

                      SHA1

                      0387715b6681d7097d372cd0005b664f76c933c7

                      SHA256

                      94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                      SHA512

                      58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                    • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                      Filesize

                      440B

                      MD5

                      3626532127e3066df98e34c3d56a1869

                      SHA1

                      5fa7102f02615afde4efd4ed091744e842c63f78

                      SHA256

                      2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                      SHA512

                      dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UNYCMUJRZP9P08K506MT.temp

                      Filesize

                      7KB

                      MD5

                      c68d931636b7e22003288276d500c327

                      SHA1

                      62b88a4d8ed4248b5ad760a14593574f054c68a4

                      SHA256

                      303efbda377d525cce71105132ab3ecbffc069bcaf321785fdbe094d41150d02

                      SHA512

                      47cee2e33b9a2ba6e21787df75af791a3de00342c2a2590a3bff6d8afeeb0e87841c5e8f7d96cfcf198be63e83fa0bf1ec85b5d1ae9e5211c5ff4ca2b09552ae

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      2KB

                      MD5

                      a8c45e731e1c06d6438265f0fb82508a

                      SHA1

                      44c2b332e1564036550e62b52c2c8a698cc5f468

                      SHA256

                      0defb65ed5104127646faf0747c247efd0af086a6d0dd03e6ce8d2a8e2667b84

                      SHA512

                      9a9a2c6272e20a3b4bac9664a4bcce3dea3aac05727848b7dedb1f8aca7892eb1dfa78ac36eadf93c760287a5eac9dbe4a6c6caee1f99acbb7008ccdec3a8383

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\162feb14-2031-4b0d-9557-7994fcd5e813

                      Filesize

                      745B

                      MD5

                      c4fc2e6e1ac4fdee44c55ec685d1db1c

                      SHA1

                      8edd0c63948d866f00101ab4494c8e93266e68ee

                      SHA256

                      a27af9a65cc78babc49ac9455eb0932712269c692173bcc72631dba4e3b5d4f7

                      SHA512

                      9c792c9e9524e03b45bbba61b36b641e8d10931eba6d79a5ca6916684f0569df432e00fd2c55dc613f46e8645ec90697532ad7d25b8a891189c1e79b06cdc3a9

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\f615be7f-da20-486b-963a-e26d67fcc810

                      Filesize

                      10KB

                      MD5

                      42dc5a0c236d8b13ebb494cfce991e7c

                      SHA1

                      8957ff0f1b79c3b6f37282ba5f71a9c9ca57a6c1

                      SHA256

                      2de9002f1800132e714f8656b533a49c547c79c0b4cf09fcb8b4bd206565b152

                      SHA512

                      eaa175b520e8db736a59525faf98cbf781d7319510298c0abe9acae44fe91ac4fea94d0c9b201a2f9b50a0f2f1b2192acf779f34ab6cff92f8d6bdf8f19765f6

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\prefs.js

                      Filesize

                      6KB

                      MD5

                      db35c3c8f1199793e64ca3677b6459d7

                      SHA1

                      ef2b58e0f2f013136cdbe1cf63c336b65f03427f

                      SHA256

                      52bb3fa156c2bfe6f1b24838d4daf9b7215aba471fae95c22f97a14c44801483

                      SHA512

                      7f78b583a28c7a449495d9667408cc7798c829570410ea2fee0221fb5d5be2aa66eadce2d608a470d1e11766d3023b2e963eb825458409522265ae6d483b2870

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\prefs.js

                      Filesize

                      6KB

                      MD5

                      15d54db1d01314e01d60e3b3575bb36f

                      SHA1

                      82ea6dd0786d9ac15206f61187ea5867ce91d65d

                      SHA256

                      a9d7b7a55e777c3996e815f030749d537f06050af5aa6a6b7eb05ee177833f4f

                      SHA512

                      c6b5940a69ef50bc695d362c447b718b16c32b983f9b5406399704cfc09d0ae78b38c20b8764bf3ef75e0fcdc8470102060ab985c17a7878e5b0b8a18c5104be

                    • C:\Users\Admin\AppData\Roaming\xw3dk2eu1xoCOXWRCQD\DJj.exe

                      Filesize

                      300KB

                      MD5

                      95b7a7cbc0aff0215004c5a56ea5952c

                      SHA1

                      a1fb08b02975ec4869bcaf387d09d0abcced27e9

                      SHA256

                      e9aa0b4540115b3dcec3af70b6de27e54e4a0fa96d1d3cb33bac121d804c1d61

                      SHA512

                      97ac66de88cac709e37d59c8a388c18d69aa3422d275be3e28b92e87167bcd87a310125e7dca593fe1b66d2f826cb2e22b64d51eac07dc94981dcd123e906961

                    • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                      Filesize

                      2.9MB

                      MD5

                      150a14aee722f93553528f147ac1cfdb

                      SHA1

                      a05fe7ada978105e51f8931a5049668234f5379e

                      SHA256

                      52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c

                      SHA512

                      48c4bdc1b646c8f21f67ed0eb98ff55e8d26a9349004b467caf98178e8092e21aacb0bfacecaaf4009a3fa1d339e8c36d674fb2af81c34fed6a08d8c9c88cd69

                    • \Users\Admin\AppData\Local\Temp\main\7z.exe

                      Filesize

                      458KB

                      MD5

                      619f7135621b50fd1900ff24aade1524

                      SHA1

                      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                      SHA256

                      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                      SHA512

                      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                    • memory/540-390-0x0000000000A50000-0x0000000000D16000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/540-389-0x0000000000A50000-0x0000000000D16000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/584-300-0x0000000000C60000-0x0000000001159000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/584-314-0x0000000000C60000-0x0000000001159000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/700-92-0x0000000000400000-0x0000000000455000-memory.dmp

                      Filesize

                      340KB

                    • memory/700-91-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                      Filesize

                      4KB

                    • memory/700-83-0x0000000000400000-0x0000000000455000-memory.dmp

                      Filesize

                      340KB

                    • memory/700-87-0x0000000000400000-0x0000000000455000-memory.dmp

                      Filesize

                      340KB

                    • memory/700-94-0x0000000000400000-0x0000000000455000-memory.dmp

                      Filesize

                      340KB

                    • memory/700-85-0x0000000000400000-0x0000000000455000-memory.dmp

                      Filesize

                      340KB

                    • memory/700-81-0x0000000000400000-0x0000000000455000-memory.dmp

                      Filesize

                      340KB

                    • memory/700-89-0x0000000000400000-0x0000000000455000-memory.dmp

                      Filesize

                      340KB

                    • memory/704-387-0x0000000002010000-0x0000000002018000-memory.dmp

                      Filesize

                      32KB

                    • memory/704-386-0x000000001B290000-0x000000001B572000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/932-120-0x0000000000B00000-0x0000000000FA6000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/932-222-0x0000000000B00000-0x0000000000FA6000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/932-215-0x0000000000B00000-0x0000000000FA6000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/936-220-0x0000000000850000-0x0000000000CE8000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/936-216-0x0000000000850000-0x0000000000CE8000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1504-162-0x00000000011F0000-0x0000000001242000-memory.dmp

                      Filesize

                      328KB

                    • memory/1996-257-0x00000000010C0000-0x0000000001547000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/1996-322-0x00000000010C0000-0x0000000001547000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/1996-362-0x00000000010C0000-0x0000000001547000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2176-768-0x000000001B300000-0x000000001B5E2000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2248-96-0x000000001B3C0000-0x000000001B6A2000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2248-97-0x00000000022A0000-0x00000000022A8000-memory.dmp

                      Filesize

                      32KB

                    • memory/2268-364-0x000000013F600000-0x000000013FA90000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2268-367-0x000000013F600000-0x000000013FA90000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2324-693-0x0000000000400000-0x0000000000457000-memory.dmp

                      Filesize

                      348KB

                    • memory/2324-692-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                      Filesize

                      4KB

                    • memory/2324-694-0x0000000000400000-0x0000000000457000-memory.dmp

                      Filesize

                      348KB

                    • memory/2324-690-0x0000000000400000-0x0000000000457000-memory.dmp

                      Filesize

                      348KB

                    • memory/2324-688-0x0000000000400000-0x0000000000457000-memory.dmp

                      Filesize

                      348KB

                    • memory/2324-686-0x0000000000400000-0x0000000000457000-memory.dmp

                      Filesize

                      348KB

                    • memory/2324-684-0x0000000000400000-0x0000000000457000-memory.dmp

                      Filesize

                      348KB

                    • memory/2324-682-0x0000000000400000-0x0000000000457000-memory.dmp

                      Filesize

                      348KB

                    • memory/2516-100-0x00000000000A0000-0x0000000000546000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2516-101-0x00000000000A0000-0x0000000000546000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2516-45-0x00000000000A0000-0x0000000000546000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2516-180-0x00000000000A0000-0x0000000000546000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2584-570-0x000000013F600000-0x000000013FA90000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2584-361-0x000000013F600000-0x000000013FA90000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2584-363-0x000000013F600000-0x000000013FA90000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2584-554-0x000000013F600000-0x000000013FA90000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2728-44-0x0000000000DA0000-0x00000000010CF000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2728-385-0x0000000005DA0000-0x0000000006066000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/2728-98-0x0000000000DA0000-0x00000000010CF000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2728-119-0x0000000005C30000-0x00000000060D6000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2728-297-0x0000000005D80000-0x0000000006279000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/2728-337-0x0000000000DA0000-0x00000000010CF000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2728-298-0x0000000005D80000-0x0000000006279000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/2728-350-0x0000000005D60000-0x00000000061E7000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2728-360-0x0000000005D60000-0x00000000061E7000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2728-121-0x0000000005C30000-0x00000000060D6000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2728-213-0x0000000005D50000-0x00000000061E8000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2728-212-0x0000000005C30000-0x00000000060D6000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2728-256-0x0000000005D60000-0x00000000061E7000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2728-217-0x0000000000DA0000-0x00000000010CF000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2728-95-0x0000000005AE0000-0x0000000005F86000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2728-254-0x0000000005D60000-0x00000000061E7000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2728-388-0x0000000005DA0000-0x0000000006066000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/2728-578-0x0000000005DA0000-0x0000000006066000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/2728-43-0x0000000005AE0000-0x0000000005F86000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2728-211-0x0000000005D50000-0x00000000061E8000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2728-40-0x0000000005AE0000-0x0000000005F86000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2728-41-0x0000000000DA0000-0x00000000010CF000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2728-402-0x0000000000DA0000-0x00000000010CF000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2728-32-0x0000000000DA0000-0x00000000010CF000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2728-23-0x0000000000DA0000-0x00000000010CF000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2728-22-0x0000000000DA0000-0x00000000010CF000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2728-21-0x0000000000DA0000-0x00000000010CF000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2728-19-0x0000000000DA0000-0x00000000010CF000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2728-18-0x0000000000DA1000-0x0000000000DCF000-memory.dmp

                      Filesize

                      184KB

                    • memory/2728-17-0x0000000000DA0000-0x00000000010CF000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2728-223-0x0000000005D50000-0x00000000061E8000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2728-99-0x0000000005AE0000-0x0000000005F86000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2728-653-0x0000000000DA0000-0x00000000010CF000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2728-607-0x0000000000DA0000-0x00000000010CF000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2728-238-0x0000000000DA0000-0x00000000010CF000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2728-577-0x0000000005DA0000-0x0000000006066000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/2752-190-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/2752-192-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                      Filesize

                      4KB

                    • memory/2752-182-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/2752-186-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/2752-188-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/2752-184-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/2752-193-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/2752-195-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/3056-2-0x0000000000051000-0x000000000007F000-memory.dmp

                      Filesize

                      184KB

                    • memory/3056-3-0x0000000000050000-0x000000000037F000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/3056-1-0x0000000077AB0000-0x0000000077AB2000-memory.dmp

                      Filesize

                      8KB

                    • memory/3056-5-0x0000000000050000-0x000000000037F000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/3056-13-0x0000000006800000-0x0000000006B2F000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/3056-16-0x0000000000050000-0x000000000037F000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/3056-0-0x0000000000050000-0x000000000037F000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/3096-560-0x00000000022A0000-0x00000000022A8000-memory.dmp

                      Filesize

                      32KB

                    • memory/3096-559-0x000000001B310000-0x000000001B5F2000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/3164-698-0x0000000010000000-0x000000001001C000-memory.dmp

                      Filesize

                      112KB

                    • memory/3164-702-0x0000000000400000-0x0000000000C53000-memory.dmp

                      Filesize

                      8.3MB

                    • memory/3352-585-0x0000000000350000-0x00000000003A2000-memory.dmp

                      Filesize

                      328KB

                    • memory/3736-703-0x0000000140000000-0x0000000140770000-memory.dmp

                      Filesize

                      7.4MB

                    • memory/3736-710-0x0000000140000000-0x0000000140770000-memory.dmp

                      Filesize

                      7.4MB

                    • memory/3736-704-0x0000000140000000-0x0000000140770000-memory.dmp

                      Filesize

                      7.4MB

                    • memory/3736-706-0x0000000140000000-0x0000000140770000-memory.dmp

                      Filesize

                      7.4MB

                    • memory/3820-719-0x000000001B220000-0x000000001B502000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/3820-720-0x0000000002230000-0x0000000002238000-memory.dmp

                      Filesize

                      32KB

                    • memory/3864-668-0x0000000000370000-0x0000000000FD5000-memory.dmp

                      Filesize

                      12.4MB