Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 14:05

General

  • Target

    203d0f9dc8adb31941ba1e071bc81aba27fc085d88b307066089b5db59ff1d94.exe

  • Size

    3.1MB

  • MD5

    f47f23f478603d4bde1a0f7b7c0ead64

  • SHA1

    a9966b00575a09375eacc8030c6739af574b2778

  • SHA256

    203d0f9dc8adb31941ba1e071bc81aba27fc085d88b307066089b5db59ff1d94

  • SHA512

    a98c0279f202bad99aa30cf6809d5e4b63eaf480aef2680b3caa044a24bfce090d7c4edcec73d670bf5a4c21b36d01d997d937e7c13f5e0564e64173cfe1c791

  • SSDEEP

    49152:uMi4RLQE4wYb/8MKJOJtN9kiSwuSEwrK1:dsRwYIpJOTNrr

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

xworm

Version

5.0

C2

husktools.duckdns.org:7000

Mutex

9W5nR6YNY2Cs1cQg

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    XClient.exe

aes.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

lumma

C2

https://founpiuer.store/api

https://bakedstusteeb.shop/api

https://worddosofrm.shop/api

https://mutterissuen.shop/api

https://standartedby.shop/api

https://nightybinybz.shop/api

https://conceszustyb.shop/api

https://respectabosiz.shop/api

https://moutheventushz.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 1 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 19 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 26 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3452
      • C:\Users\Admin\AppData\Local\Temp\203d0f9dc8adb31941ba1e071bc81aba27fc085d88b307066089b5db59ff1d94.exe
        "C:\Users\Admin\AppData\Local\Temp\203d0f9dc8adb31941ba1e071bc81aba27fc085d88b307066089b5db59ff1d94.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:232
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3020
          • C:\Users\Admin\AppData\Local\Temp\1004090001\DLER214.exe
            "C:\Users\Admin\AppData\Local\Temp\1004090001\DLER214.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2616
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 1684
              5⤵
              • Program crash
              PID:2724
          • C:\Users\Admin\AppData\Local\Temp\1004107001\DLER214.exe
            "C:\Users\Admin\AppData\Local\Temp\1004107001\DLER214.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2188
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 1660
              5⤵
              • Program crash
              PID:2008
          • C:\Users\Admin\AppData\Local\Temp\1004109001\xwo.exe
            "C:\Users\Admin\AppData\Local\Temp\1004109001\xwo.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3196
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              5⤵
              • Drops startup file
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1664
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\XClient.exe"
                6⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:768
              • C:\Users\Admin\AppData\Local\Temp\lovvuk.exe
                "C:\Users\Admin\AppData\Local\Temp\lovvuk.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1220
                • C:\Users\Admin\AppData\Local\Temp\lovvuk.exe
                  "C:\Users\Admin\AppData\Local\Temp\lovvuk.exe"
                  7⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:632
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1220 -s 276
                  7⤵
                  • Program crash
                  PID:920
              • C:\Users\Admin\AppData\Local\Temp\ztyxaj.exe
                "C:\Users\Admin\AppData\Local\Temp\ztyxaj.exe"
                6⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1928
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /d /c blxfpmth.bat 2733965598
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:5008
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\foksdes.exe
                    foksdes.exe ltkqnerwt.nuts 2733965598
                    8⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4716
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 1280
                      9⤵
                      • Program crash
                      PID:2244
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 264
              5⤵
              • Program crash
              PID:4292
          • C:\Users\Admin\AppData\Local\Temp\1004114001\kiwi.exe
            "C:\Users\Admin\AppData\Local\Temp\1004114001\kiwi.exe"
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Drops startup file
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1268
          • C:\Users\Admin\AppData\Local\Temp\1004115001\a6dde77837.exe
            "C:\Users\Admin\AppData\Local\Temp\1004115001\a6dde77837.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4832
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 1472
              5⤵
              • Program crash
              PID:216
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 1500
              5⤵
              • Program crash
              PID:1452
          • C:\Users\Admin\AppData\Local\Temp\1004116001\5fe4dec688.exe
            "C:\Users\Admin\AppData\Local\Temp\1004116001\5fe4dec688.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1196
          • C:\Users\Admin\AppData\Local\Temp\1004117001\03ac2606b1.exe
            "C:\Users\Admin\AppData\Local\Temp\1004117001\03ac2606b1.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:3592
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4152
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1420
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2940
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2696
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2776
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              5⤵
                PID:920
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  6⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  PID:348
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1972 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1416 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c39c3eaa-e8ae-4446-9798-7584d82f9950} 348 "\\.\pipe\gecko-crash-server-pipe.348" gpu
                    7⤵
                      PID:5088
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2400 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0286fe3e-c8e4-423c-b368-30b2f5649ebd} 348 "\\.\pipe\gecko-crash-server-pipe.348" socket
                      7⤵
                        PID:3232
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3180 -childID 1 -isForBrowser -prefsHandle 3340 -prefMapHandle 3336 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1032 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fbc7fed2-d02f-4a88-8f32-fa13b776bd48} 348 "\\.\pipe\gecko-crash-server-pipe.348" tab
                        7⤵
                          PID:3184
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2712 -childID 2 -isForBrowser -prefsHandle 3832 -prefMapHandle 3828 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1032 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4b741f6e-bee9-4d64-a341-0f9efba33109} 348 "\\.\pipe\gecko-crash-server-pipe.348" tab
                          7⤵
                            PID:232
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4904 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4896 -prefMapHandle 4892 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {de33f507-68ab-48d4-815e-dabaa78ec2c0} 348 "\\.\pipe\gecko-crash-server-pipe.348" utility
                            7⤵
                            • Checks processor information in registry
                            PID:5828
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5684 -childID 3 -isForBrowser -prefsHandle 4520 -prefMapHandle 5564 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1032 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {899935d8-9832-4778-b61f-b300e444e5f3} 348 "\\.\pipe\gecko-crash-server-pipe.348" tab
                            7⤵
                              PID:5804
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5748 -childID 4 -isForBrowser -prefsHandle 5756 -prefMapHandle 5760 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1032 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {28e95e90-43b7-4c8b-87d2-562fa7ab88a2} 348 "\\.\pipe\gecko-crash-server-pipe.348" tab
                              7⤵
                                PID:5956
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5964 -childID 5 -isForBrowser -prefsHandle 5480 -prefMapHandle 5732 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1032 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d45d6c6-da96-45f8-9a93-cf2281fddff2} 348 "\\.\pipe\gecko-crash-server-pipe.348" tab
                                7⤵
                                  PID:5964
                          • C:\Users\Admin\AppData\Local\Temp\1004118001\8fe7c84163.exe
                            "C:\Users\Admin\AppData\Local\Temp\1004118001\8fe7c84163.exe"
                            4⤵
                            • Modifies Windows Defender Real-time Protection settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5560
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1640
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2616 -ip 2616
                      1⤵
                        PID:5024
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2188 -ip 2188
                        1⤵
                          PID:4308
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3196 -ip 3196
                          1⤵
                            PID:2756
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:468
                          • C:\Users\Admin\XClient.exe
                            C:\Users\Admin\XClient.exe
                            1⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:1928
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4832 -ip 4832
                            1⤵
                              PID:2152
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4832 -ip 4832
                              1⤵
                                PID:1648
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1220 -ip 1220
                                1⤵
                                  PID:1584
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4716 -ip 4716
                                  1⤵
                                    PID:2912
                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2212
                                  • C:\Users\Admin\XClient.exe
                                    C:\Users\Admin\XClient.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:3148
                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2036
                                  • C:\Users\Admin\XClient.exe
                                    C:\Users\Admin\XClient.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:4436

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\XClient.exe.log

                                    Filesize

                                    841B

                                    MD5

                                    0efd0cfcc86075d96e951890baf0fa87

                                    SHA1

                                    6e98c66d43aa3f01b2395048e754d69b7386b511

                                    SHA256

                                    ff981780f37479af6a428dd121eef68cf6e0b471ae92f080893a55320cc993f7

                                    SHA512

                                    4e79f5a8494aac94f98af8dbbc71bdd0a57b02103757ad970da7e7d4e6a0dc5015ca008256a6bd2c5bdec3a0f5736a994e17b3ef004b0f374a3339e480ac41b1

                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json

                                    Filesize

                                    18KB

                                    MD5

                                    ed5d08070195fa0baeac0d8435366bf3

                                    SHA1

                                    a93ddf8d5547e32661e410662b03bf5ac3b455ea

                                    SHA256

                                    15934bedb826fc914fe96d8fb9aed616843caa6edfd28973e988f9a20da6c267

                                    SHA512

                                    0cc5f8fd010e37be6f13e6a2391bce155488c9c96fb3276279053223687daf191226c5b59cd4dcda298268e4a0edcd00f2b48c785d0028d32eedf01dcb6627e9

                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99

                                    Filesize

                                    13KB

                                    MD5

                                    bdc313a40b3246a84013206d1b62ab09

                                    SHA1

                                    195ec64df860314e583196d2780e18f6d74134ad

                                    SHA256

                                    476f8ba972320f8881a099fd84f77279039746938a0f7307c489c307af92884a

                                    SHA512

                                    e68a4ef1809e262571039680c357e5a23a5439593ace651ed0b6579e6ab2f2eb9ed4974443b3b594c0f5cef5e19dafd8913b28297c717f87821442791d0b04f8

                                  • C:\Users\Admin\AppData\Local\Temp\1004090001\DLER214.exe

                                    Filesize

                                    16KB

                                    MD5

                                    54ec587044fdff4bfd0029946041a109

                                    SHA1

                                    242cc5fdd5c75a02776f1f5e526cc42cf138b313

                                    SHA256

                                    e666b2644c35f564041ad18c5125f1677255f05421ad18785aed42bfb3ac5adf

                                    SHA512

                                    6e2c9f3b3850c021b0db78af02f37e6fe1b32bd046ba5767b0499f2c4af11586e167c80235258b5536bcfece567a18f2e2eca6a107e60d5efb62a65175049046

                                  • C:\Users\Admin\AppData\Local\Temp\1004109001\xwo.exe

                                    Filesize

                                    189KB

                                    MD5

                                    7949220a0b341111716a81695324be27

                                    SHA1

                                    d79653b53e3affa5081d25cdea077299105d0472

                                    SHA256

                                    a22f6db007744f7768782280e66832487b3b193ff20825203bb56210b7c4e923

                                    SHA512

                                    e051e96a0334ce6cc7b6a43dffebfdcf93b40824db9cec64c6a2e71aed24bd26232645edbac14a47afe02fb0d12384da9648ea402df9232892330afce91fe303

                                  • C:\Users\Admin\AppData\Local\Temp\1004114001\kiwi.exe

                                    Filesize

                                    1.4MB

                                    MD5

                                    7d7e24137d26338d8729761d740b0c04

                                    SHA1

                                    a50cf1255b04fec0a34ab695993bff21a4a05ddf

                                    SHA256

                                    f215e0525ac3365a7d33a949db3a7efa90811992e665e243f385fc00dc653c16

                                    SHA512

                                    72c84b53d4a5f488fab1b43ab3e5f4cbd3414d44946d94b3bccff3d29f3083ddcf3ae900efebf2b01585e4836ed0d0085aa1a8dc8650fee18168f3c2bff4b591

                                  • C:\Users\Admin\AppData\Local\Temp\1004115001\a6dde77837.exe

                                    Filesize

                                    3.0MB

                                    MD5

                                    14cd4e2fff22da8e123519459977cabc

                                    SHA1

                                    e5ee816d7305cb4e281ffd7ff2fc83a5f52080e1

                                    SHA256

                                    ee23eea406fdb6ac9ed7dcd61b02a0cd713462079abf900e04ef24b838b7672a

                                    SHA512

                                    001ba3951d159d81485fb297310a75104256c36af5d3c30dc32e104cadf946d7d05b2b37f3d5c46ed305091baae6c08d1cdee0a169010c86cd0ae87f0f3caf44

                                  • C:\Users\Admin\AppData\Local\Temp\1004116001\5fe4dec688.exe

                                    Filesize

                                    2.0MB

                                    MD5

                                    76c243aaeec7a3a40aa9a321018b90e5

                                    SHA1

                                    d981a422f6617e8677af138a32cdc888d51668b7

                                    SHA256

                                    89257c8d1539e39a63211cdbe9436f90ed30ee944633acbb5b874c8d7dc0d888

                                    SHA512

                                    c4e7580c1e0a2ebc738d0b44773fa236e573d6d529efd65d9c7ed60c29d232d4bc81cc0984bc3094b0c974644f40e9913830de5edcffa3c9197ee885c0ab35be

                                  • C:\Users\Admin\AppData\Local\Temp\1004117001\03ac2606b1.exe

                                    Filesize

                                    898KB

                                    MD5

                                    819351449d272b42aec6aa41cba7b090

                                    SHA1

                                    1701a7d03240c740c716c16b350b00d880e9bcb1

                                    SHA256

                                    1ae85567989df934c0f588838517e6347218ed9f0e6b3c378d73e58d74c58d35

                                    SHA512

                                    64e71efccb58de8dd87e83bfac2223be890e8d7a2a0a0e83124fce4f8f95ae1419b0df1db9829de1e76ec72a12dfbab7bb63dab22fcbcb56512b096d6b44aea2

                                  • C:\Users\Admin\AppData\Local\Temp\1004118001\8fe7c84163.exe

                                    Filesize

                                    2.6MB

                                    MD5

                                    870dcfbe6a98455de530b6c63c78005c

                                    SHA1

                                    38d83175f72542b6355dc8c395bad4a13a759b3c

                                    SHA256

                                    74926577267c5850f28187beaa9f865285b3a8b935d3e38b28d0b42bff11275f

                                    SHA512

                                    8c76883567e5cd16e7990a66e6349c245d1c4766eeadaaed8ecf4d115a67c2e4aac768ead2adabc12b166e3fd1aef2f93f469e1242059dabc03c3180b6b06226

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\blxfpmth.bat

                                    Filesize

                                    129B

                                    MD5

                                    e3e7c6abcc98cf2046e4548f6cee4cc1

                                    SHA1

                                    b656c8f851a2b27ace9218c457234f3af3921def

                                    SHA256

                                    dc4335f02e30f1903f5f58100631d6d9fb681f40c831c56c377b279659d7c980

                                    SHA512

                                    0f625f4b86ee55d71e091ca73eff7436caee91646568f2d2e0d9cde73b1aac041238ab24b80ecef4a0f56982602670bf04f11b27cf95799dccc4de70a24151ce

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\exeocfkkt.nuts

                                    Filesize

                                    1B

                                    MD5

                                    69691c7bdcc3ce6d5d8a1361f22d04ac

                                    SHA1

                                    c63ae6dd4fc9f9dda66970e827d13f7c73fe841c

                                    SHA256

                                    08f271887ce94707da822d5263bae19d5519cb3614e0daedc4c7ce5dab7473f1

                                    SHA512

                                    253405e03b91441a6dd354a9b72e040068b1bfe10e83eb1a64a086c05525d8ccae2bf09130c624af50d55c3522a4fbb7c18cfc8dd843e5f4801d9ad2b5164b12

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\exeocfkpe.nuts

                                    Filesize

                                    3B

                                    MD5

                                    158b365b9eedcfaf539f5dedfd82ee97

                                    SHA1

                                    529f5d61ac99f60a8e473368eff1b32095a3e2bf

                                    SHA256

                                    39561f8af034137905f14ca7fd5a2c891bc12982f3f8ef2271e75e93433ffa90

                                    SHA512

                                    a1b231c2e6af432ee7df82e00d568819e12149af707d4c4fdd018b38cc4f9761062c5b7e497bd1b67e466b89e391520b88bf13f18c8b9ff646d82df740c05c09

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\exeocfksj.nuts

                                    Filesize

                                    33B

                                    MD5

                                    500ba63e2664798939744b8a8c9be982

                                    SHA1

                                    54743a77e4186cb327b803efb1ef5b3d4ac163ce

                                    SHA256

                                    4ebc21177ee9907f71a1641a0482603ced98e9d43389cac0ffb0b59f7343eeba

                                    SHA512

                                    9992b70de5867e2a00aff4f79c37ba71e827cbb104c192ebd4a553f91ae06a5b235f34e65d9d1145591c147e9e6726146cb92171945aa67b8f3294116a223fe7

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\exeocfkup.nuts

                                    Filesize

                                    5.2MB

                                    MD5

                                    a919729a18174fbbbc592801f8274939

                                    SHA1

                                    d2d18176e1a56e95449d48d0943030d94bc045f7

                                    SHA256

                                    6f639b042ecff76e4be8c4db5a36bb3ae783624b44df31628f7c52e4489d0f3d

                                    SHA512

                                    36aae913b019420149d53e2018de2585c6dff0c0fca927f05af030b396eed0833b120b0e84fc0bdf397f7eb0074f44fa85603175e5dcf08f437961ab3e5ce7d6

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\foksdes.exe

                                    Filesize

                                    5.2MB

                                    MD5

                                    2890f1847d5d5f8f0e0c036eb0e9d58c

                                    SHA1

                                    656306727fb15c4c43c40b57eb98c016fd1ec6fd

                                    SHA256

                                    f0280e1f5c2568e5fda9f911ab8341b47914a21d30f854136299f510dc843816

                                    SHA512

                                    233d5d07e98dc55c2d4d992f4d86b3bd19850db871e514569fc28e39b4cf8552f2225e38527341f85eb50a357b7781924185de163e540f270e3157545be6bda6

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ltkqnerwt.nuts

                                    Filesize

                                    649KB

                                    MD5

                                    f13abd3bcda49faefe70b33fd1760b39

                                    SHA1

                                    fbd073da05d4df60b3e4646207764c74afbe7be8

                                    SHA256

                                    44c8d64e2353b4d9b5ab35a690d78a48d221ba72364a0939c65fbe0209db7bd8

                                    SHA512

                                    e867e8ac32cec8f186946844908fca7a6752383669227345137024434efd688edb5e5b3975141897465bc9f2adbacde39b1dd59ab84791ccc54878da04915985

                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                    Filesize

                                    3.1MB

                                    MD5

                                    f47f23f478603d4bde1a0f7b7c0ead64

                                    SHA1

                                    a9966b00575a09375eacc8030c6739af574b2778

                                    SHA256

                                    203d0f9dc8adb31941ba1e071bc81aba27fc085d88b307066089b5db59ff1d94

                                    SHA512

                                    a98c0279f202bad99aa30cf6809d5e4b63eaf480aef2680b3caa044a24bfce090d7c4edcec73d670bf5a4c21b36d01d997d937e7c13f5e0564e64173cfe1c791

                                  • C:\Users\Admin\AppData\Local\Temp\lovvuk.exe

                                    Filesize

                                    459KB

                                    MD5

                                    1d97c138b9e3c19f4900a6a348240430

                                    SHA1

                                    84ceb6309b2efc0fdfa1fee6a6420a615d618623

                                    SHA256

                                    77f6caa506303dbdcf644380adf5cb01b122f6f5efa3a54d7492754075243e2b

                                    SHA512

                                    bd8b8ab7717ccc1b9c41ddba7d3b48cd4e565f51b61357b46677905d5faf3eb98ba7bca0b39f0fb05fd97300009568ecc9408fd9113a77d3642e8924e3074f73

                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                    Filesize

                                    479KB

                                    MD5

                                    09372174e83dbbf696ee732fd2e875bb

                                    SHA1

                                    ba360186ba650a769f9303f48b7200fb5eaccee1

                                    SHA256

                                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                    SHA512

                                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                    Filesize

                                    13.8MB

                                    MD5

                                    0a8747a2ac9ac08ae9508f36c6d75692

                                    SHA1

                                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                                    SHA256

                                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                    SHA512

                                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                  • C:\Users\Admin\AppData\Local\Temp\ztyxaj.exe

                                    Filesize

                                    3.6MB

                                    MD5

                                    82c82de31b75a937ed7c32a807a5771c

                                    SHA1

                                    eb2c4ed1a4d35be01575c9fc6ebf755ba642fa6a

                                    SHA256

                                    3b5ba3bc3f7b18f9e415ee3cf10825a9bf8f48bea24335349daacaefbd2fdff1

                                    SHA512

                                    37ea787c7c9ca7b60f5d20908326a3ae0ff35a17c55c3b1fc499b6b5f3a95fad71002a72c194dea73bbfa1ee8de0a49fb1b16a142f8f7426b2defed8c6c0038b

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk

                                    Filesize

                                    760B

                                    MD5

                                    31ab3231e9b0f5d44fc84cb903bf99d2

                                    SHA1

                                    8487b9855dfb095c40515065a119b9930174cd83

                                    SHA256

                                    de5d27672f9d2efaa0cb0aeb6eaf699baa6972ffea3dbc34441143e027638cc3

                                    SHA512

                                    8c177f3bdf57e03560c98773765c864ee7db47ad75b603e17dd837a0144e9d00fd61d1798d9653c40d2e9f38544eebca4c9380bdc74ae1f97235349e3f72d016

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                                    Filesize

                                    12KB

                                    MD5

                                    c45e17d1c33c36b71999765ff09b25de

                                    SHA1

                                    5fb88d578652c88a2d1a22bb16b503750427a9a8

                                    SHA256

                                    eefd53eab7f21c6b2d6a532a515ec5164fb7a12a28c0a9addbafe1f7485beee5

                                    SHA512

                                    cd267b949bc0f977531420a388ab818d53c8f6b827da9a5c7418e73c02d475cbe9779483e104f58f775aec1712fead937717f9e6d00752bba2341f2d0a515484

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    5KB

                                    MD5

                                    c2b94b66ba9ad44e5f617e6e436b1f1b

                                    SHA1

                                    5067f98f2060314c0748462341f591f46b218900

                                    SHA256

                                    d1dba18019f60802fa74049971e8ed35f3f496dc50e17feba3a48fec17e2f61a

                                    SHA512

                                    ffd7329b7ea4853794ed801ef55849f48b171b64734d1e971772849d86ac6b35b93a798a5825e5d023a510b4aa3976ea355d90ec0124b03f9691f33008a7bed6

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    15KB

                                    MD5

                                    534076e470488413b1730a585f167c73

                                    SHA1

                                    6145bd9d4ce44e7203880b4752a16df2bdb26685

                                    SHA256

                                    9f8d379eaf625909174c50234d208ee15827b73ca6ce9a5db937cd51e8e9572a

                                    SHA512

                                    04904da0eab082eec45faf788366b63142d01a296ab7f36aebcb04e6a8f5b93b0bc91a56fd67bed7e2723f6f7893052e54c21aa30126fe47e67cf6597538a0dc

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    15KB

                                    MD5

                                    6b1ca46723bcf5806a145266d6872cf6

                                    SHA1

                                    6dea840a51f8a8a2198ced45ee4e913153ef8cc2

                                    SHA256

                                    cbabdb68577dea3960b10c7107be2c9e049e8abc0c80cbe8677ff45933f958b7

                                    SHA512

                                    266a35ad98bd8290d498cf9bb54728421b9172d9c24c7cb0eea4444e67be3cd4813c5bd6c7ade075a26aa3ffb8111cf4d5d217d1bf42b3c84314c995d6a284f9

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\2f2f8de0-8e4f-4980-96eb-e60996b4ebe3

                                    Filesize

                                    671B

                                    MD5

                                    ff0d2b826adee64ba441207145522454

                                    SHA1

                                    e034261bef0d37f249c0f1b49609284745da1e6a

                                    SHA256

                                    49f7db8db498fe17dd069ae636cf181143772aa0a63c709109cbbabfb644553b

                                    SHA512

                                    6a12c3d51e2e403a31e4ae7352f68e257fba36285573c3935e2023b61f823a1dc3dddedf153f4220a6e233e45f7f77a71b98441521c407befc6a7c64fc73f7aa

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\37cf0d8e-7b8b-4a9d-9379-44656f42d359

                                    Filesize

                                    982B

                                    MD5

                                    e020593510169162d4bfa68017f05c4f

                                    SHA1

                                    218e841631e5374039293d3e09423202d200d935

                                    SHA256

                                    9f117d83935c9ba9661dd08f590e5e7f39e513e28e9340e874ce33484339e94f

                                    SHA512

                                    bada7008f23ff8d6eb59338aa018a433edbabcdae37687d736d86413d18d85cdbbfef9b6302b2d0a90a43e73313226b30b76bd51d6157715b0a89c892eda8634

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\9872747f-0c2f-421c-84aa-6e86fb42b72f

                                    Filesize

                                    28KB

                                    MD5

                                    c4019ebbe942e6c5470c0319cdd18394

                                    SHA1

                                    d9fdd1f01cb9c6d3c5e990e47ae616278c721b84

                                    SHA256

                                    7eb20cc73f16e7fe20eff3ff861657fa72ee752450ef28d801bd9a77090b20aa

                                    SHA512

                                    92c1befd60055edffa3a88b2dc3a3784f59b911d377ec17f5c443ff91cea8189f956f9911a394580bc916c4157f3e73d33b0d6f18adb215b981713921dbc65d7

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                    Filesize

                                    1.1MB

                                    MD5

                                    842039753bf41fa5e11b3a1383061a87

                                    SHA1

                                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                    SHA256

                                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                    SHA512

                                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                    Filesize

                                    116B

                                    MD5

                                    2a461e9eb87fd1955cea740a3444ee7a

                                    SHA1

                                    b10755914c713f5a4677494dbe8a686ed458c3c5

                                    SHA256

                                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                    SHA512

                                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                    Filesize

                                    372B

                                    MD5

                                    bf957ad58b55f64219ab3f793e374316

                                    SHA1

                                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                    SHA256

                                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                    SHA512

                                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                    Filesize

                                    17.8MB

                                    MD5

                                    daf7ef3acccab478aaa7d6dc1c60f865

                                    SHA1

                                    f8246162b97ce4a945feced27b6ea114366ff2ad

                                    SHA256

                                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                    SHA512

                                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                                    Filesize

                                    12KB

                                    MD5

                                    df65b5faebd516f7d206aedddaae9b0a

                                    SHA1

                                    db9c9f29af04d0a25c5ac71bee3417d5775dda23

                                    SHA256

                                    9e327c3accec6f8aa7b0818ccb67ddc28d1123f70a528bdbf6f642c6f00d37ea

                                    SHA512

                                    4c0db0b85d5630e3ab6130c447522bab8099686b437d374e16460b62ce63b791f1bb5dfe7edd3bfd96bc5222b0fc8a5d52375a8f71902d64e88a34bd96f7e769

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                                    Filesize

                                    15KB

                                    MD5

                                    15d7baa48ae53542342bd8e8d367f952

                                    SHA1

                                    e5493de24bcecd5a30cb47cf34e25a454d10c4b4

                                    SHA256

                                    232f0d7ee9e5a5c8001f29eb60bb6628bea0d0e983a6c6e5a2b31277636523ad

                                    SHA512

                                    17e6ed835c49c461f7e60d2edf338991b77f0bd7d3316fc064a9af9a8a2fa90c25006bd4aad939a8bbf6071949281aeaeff028d5c5eeb5c18338d4caabb8318d

                                  • C:\Users\Admin\XClient.exe

                                    Filesize

                                    256KB

                                    MD5

                                    8fdf47e0ff70c40ed3a17014aeea4232

                                    SHA1

                                    e6256a0159688f0560b015da4d967f41cbf8c9bd

                                    SHA256

                                    ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82

                                    SHA512

                                    bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be

                                  • memory/232-4-0x0000000000FE0000-0x00000000012F7000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/232-0-0x0000000000FE0000-0x00000000012F7000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/232-3-0x0000000000FE0000-0x00000000012F7000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/232-18-0x0000000000FE1000-0x0000000001049000-memory.dmp

                                    Filesize

                                    416KB

                                  • memory/232-2-0x0000000000FE1000-0x0000000001049000-memory.dmp

                                    Filesize

                                    416KB

                                  • memory/232-17-0x0000000000FE0000-0x00000000012F7000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/232-1-0x0000000077884000-0x0000000077886000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/468-88-0x0000000000D60000-0x0000000001077000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/468-87-0x0000000000D60000-0x0000000001077000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/1196-1252-0x0000000000D00000-0x0000000001419000-memory.dmp

                                    Filesize

                                    7.1MB

                                  • memory/1196-1249-0x0000000000D00000-0x0000000001419000-memory.dmp

                                    Filesize

                                    7.1MB

                                  • memory/1268-131-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-169-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-147-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-145-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-143-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-141-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-139-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-133-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-151-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-129-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-127-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-125-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-123-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-153-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-121-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-119-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-118-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-1193-0x0000000005900000-0x00000000059B4000-memory.dmp

                                    Filesize

                                    720KB

                                  • memory/1268-1194-0x00000000059F0000-0x0000000005A3C000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/1268-1198-0x0000000005BB0000-0x0000000005C04000-memory.dmp

                                    Filesize

                                    336KB

                                  • memory/1268-114-0x0000000000BD0000-0x0000000000D3C000-memory.dmp

                                    Filesize

                                    1.4MB

                                  • memory/1268-115-0x0000000005620000-0x0000000005760000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-116-0x0000000005D10000-0x00000000062B4000-memory.dmp

                                    Filesize

                                    5.6MB

                                  • memory/1268-117-0x0000000005800000-0x0000000005892000-memory.dmp

                                    Filesize

                                    584KB

                                  • memory/1268-155-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-137-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-135-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-157-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-159-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-161-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-163-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-165-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-167-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-149-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-171-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-173-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-175-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1268-177-0x0000000005620000-0x000000000575B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1640-1205-0x00000000053A0000-0x00000000059B8000-memory.dmp

                                    Filesize

                                    6.1MB

                                  • memory/1640-1204-0x0000000004B60000-0x0000000004C1C000-memory.dmp

                                    Filesize

                                    752KB

                                  • memory/1640-1203-0x0000000002540000-0x0000000002548000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/1640-1202-0x0000000000700000-0x0000000000778000-memory.dmp

                                    Filesize

                                    480KB

                                  • memory/1664-80-0x0000000004FD0000-0x000000000506C000-memory.dmp

                                    Filesize

                                    624KB

                                  • memory/1664-95-0x0000000005B70000-0x0000000005BD6000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/1664-79-0x0000000000400000-0x0000000000410000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1928-93-0x0000000005980000-0x0000000005ADA000-memory.dmp

                                    Filesize

                                    1.4MB

                                  • memory/1928-92-0x00000000018F0000-0x000000000190A000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/1928-91-0x0000000000EF0000-0x0000000000F30000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/2036-5487-0x0000000000D60000-0x0000000001077000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/2212-5468-0x0000000000D60000-0x0000000001077000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/2616-42-0x0000000000860000-0x000000000086A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/2616-41-0x000000007349E000-0x000000007349F000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3020-19-0x0000000000D60000-0x0000000001077000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3020-81-0x0000000000D60000-0x0000000001077000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3020-20-0x0000000000D60000-0x0000000001077000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3020-21-0x0000000000D60000-0x0000000001077000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3020-63-0x0000000000D60000-0x0000000001077000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3020-52-0x0000000000D60000-0x0000000001077000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3020-43-0x0000000000D60000-0x0000000001077000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3020-22-0x0000000000D60000-0x0000000001077000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/4832-1223-0x00000000004E0000-0x00000000007E3000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/4832-1220-0x00000000004E0000-0x00000000007E3000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/5560-1697-0x0000000000620000-0x00000000008CA000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/5560-1668-0x0000000000620000-0x00000000008CA000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/5560-1669-0x0000000000620000-0x00000000008CA000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/5560-1654-0x0000000000620000-0x00000000008CA000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/5560-1700-0x0000000000620000-0x00000000008CA000-memory.dmp

                                    Filesize

                                    2.7MB