Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2024 18:58

General

  • Target

    file.exe

  • Size

    3.0MB

  • MD5

    e788e5dd84c8c180b072cce3c16d329d

  • SHA1

    2685fe8dcd081268a54560180232d574d048acd1

  • SHA256

    01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547

  • SHA512

    6810df6bef6de35897a69187f7c73ab3b4e3c9982b742fbc64b7c81d206ca19ed482f9286c1232527a556a28b9b4d41f0982d942b10fd95a2c6d490a9f4ad96f

  • SSDEEP

    24576:xbzBHYF64bhWZSHBUJXJBwTEHFAhDFjglJv+vxunnXPb6ETZf8AzjpE+Nocoazwa:pQ9WZRBwT6+RR6lXPb60HpEsocxwGT

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

lumma

C2

https://founpiuer.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • XMRig Miner payload 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 36 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Users\Admin\AppData\Local\Temp\1004354001\sxqnmytm.exe
        "C:\Users\Admin\AppData\Local\Temp\1004354001\sxqnmytm.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Windows\Temp\{09A41B20-DB77-4CE0-9DBC-D9039A41ACC9}\.cr\sxqnmytm.exe
          "C:\Windows\Temp\{09A41B20-DB77-4CE0-9DBC-D9039A41ACC9}\.cr\sxqnmytm.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\1004354001\sxqnmytm.exe" -burn.filehandle.attached=180 -burn.filehandle.self=188
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2360
          • C:\Windows\Temp\{A54BF19C-7DB4-4D21-A274-A3BA798D4D83}\.ba\ActiveISO.exe
            "C:\Windows\Temp\{A54BF19C-7DB4-4D21-A274-A3BA798D4D83}\.ba\ActiveISO.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2016
            • C:\Users\Admin\AppData\Roaming\remoteFastzq5\ActiveISO.exe
              C:\Users\Admin\AppData\Roaming\remoteFastzq5\ActiveISO.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:2036
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\SysWOW64\cmd.exe
                7⤵
                • Drops startup file
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                PID:2964
                • C:\Users\Admin\AppData\Local\Temp\DriverProtectv1.exe
                  C:\Users\Admin\AppData\Local\Temp\DriverProtectv1.exe
                  8⤵
                  • Loads dropped DLL
                  PID:1408
      • C:\Users\Admin\AppData\Local\Temp\1004423001\85eac2926a.exe
        "C:\Users\Admin\AppData\Local\Temp\1004423001\85eac2926a.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1176
      • C:\Users\Admin\AppData\Local\Temp\1004424001\e4e971cb8b.exe
        "C:\Users\Admin\AppData\Local\Temp\1004424001\e4e971cb8b.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1248
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
        3⤵
          PID:2440
        • C:\Users\Admin\AppData\Local\Temp\1004426001\8cea15e2cc.exe
          "C:\Users\Admin\AppData\Local\Temp\1004426001\8cea15e2cc.exe"
          3⤵
          • Modifies Windows Defender Real-time Protection settings
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Windows security modification
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2520
        • C:\Users\Admin\AppData\Local\Temp\1004427001\chrome.exe
          "C:\Users\Admin\AppData\Local\Temp\1004427001\chrome.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1988
          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2968
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1064
            • C:\Windows\system32\wusa.exe
              wusa /uninstall /kb:890830 /quiet /norestart
              5⤵
              • Drops file in Windows directory
              PID:856
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop UsoSvc
            4⤵
            • Launches sc.exe
            PID:1948
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop WaaSMedicSvc
            4⤵
            • Launches sc.exe
            PID:2620
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop wuauserv
            4⤵
            • Launches sc.exe
            PID:1256
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop bits
            4⤵
            • Launches sc.exe
            PID:1644
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop dosvc
            4⤵
            • Launches sc.exe
            PID:2076
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
            4⤵
            • Power Settings
            • Suspicious use of AdjustPrivilegeToken
            PID:2556
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
            4⤵
            • Power Settings
            • Suspicious use of AdjustPrivilegeToken
            PID:2552
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
            4⤵
            • Power Settings
            • Suspicious use of AdjustPrivilegeToken
            PID:2584
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
            4⤵
            • Power Settings
            • Suspicious use of AdjustPrivilegeToken
            PID:2572
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe delete "GDRQRNRG"
            4⤵
            • Launches sc.exe
            PID:2532
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe create "GDRQRNRG" binpath= "C:\ProgramData\xrvqzpvhzdcy\rfopgxavqojn.exe" start= "auto"
            4⤵
            • Launches sc.exe
            PID:1728
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop eventlog
            4⤵
            • Launches sc.exe
            PID:1764
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe start "GDRQRNRG"
            4⤵
            • Launches sc.exe
            PID:2348
    • C:\ProgramData\xrvqzpvhzdcy\rfopgxavqojn.exe
      C:\ProgramData\xrvqzpvhzdcy\rfopgxavqojn.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1668
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1004
        • C:\Windows\system32\wusa.exe
          wusa /uninstall /kb:890830 /quiet /norestart
          3⤵
          • Drops file in Windows directory
          PID:1248
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop UsoSvc
        2⤵
        • Launches sc.exe
        PID:1360
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop WaaSMedicSvc
        2⤵
        • Launches sc.exe
        PID:760
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop wuauserv
        2⤵
        • Launches sc.exe
        PID:580
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop bits
        2⤵
        • Launches sc.exe
        PID:336
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop dosvc
        2⤵
        • Launches sc.exe
        PID:2084
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
        2⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:1048
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
        2⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:264
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
        2⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:2900
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
        2⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:2544
      • C:\Windows\system32\conhost.exe
        C:\Windows\system32\conhost.exe
        2⤵
          PID:2436
        • C:\Windows\system32\notepad.exe
          notepad.exe
          2⤵
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2708

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\1004354001\sxqnmytm.exe

        Filesize

        14.4MB

        MD5

        155422526c81faf880ec711b7044ef44

        SHA1

        67b6a590e3aac3cca79d849ef1ac9f51f4e6702b

        SHA256

        3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a

        SHA512

        0a53e0b00e5c32782be998a082cc33bf5b19d162f81e39104f6fd6f64b1ea4947e69298493dcb49a1386904cc345c63395044c01be2d49c89647d7890522dbdc

      • C:\Users\Admin\AppData\Local\Temp\1004423001\85eac2926a.exe

        Filesize

        3.0MB

        MD5

        08e058cf084f3844eaf16768b8d0fee6

        SHA1

        e3234cfd97054c5d59d669631415da44f2643958

        SHA256

        309dd4a3446c087863dbaa7c5712e884bbc73bc20df663aac8d2aafb6b92278a

        SHA512

        912d29c9c8389bf3895a4766d24cebf100167efbebdbd27dc09e8099b027e02bcd00506490d426ac627e97ea0704eb0dc94d0c858318fb8f5bda1b2a184a8c95

      • C:\Users\Admin\AppData\Local\Temp\1004424001\e4e971cb8b.exe

        Filesize

        2.0MB

        MD5

        15cbd9b38ee0965dd301e40b1febe423

        SHA1

        fa6fb0fe1ab51063ad15c4cc36d7f2988622bffd

        SHA256

        fd23f8fa45a5d50250de890fcb6fbfa841c929e19936dc0eaacaca1c6f3f3a2e

        SHA512

        81a15df2bf1002092fc7ac6aec533a4c7ca2f6bde8bb29fdd027ba2db4d73760e4547bb72f0cf2d9440974759fb515bf06be3c1a7cf8f52c63008ebc0b49c19e

      • C:\Users\Admin\AppData\Local\Temp\1004426001\8cea15e2cc.exe

        Filesize

        2.7MB

        MD5

        bc08cdfa0f7e0ff8ce4ce2b6e34d2cf0

        SHA1

        42c3e1f582916dd1b7472d0608a69ba027089790

        SHA256

        bb8a90f875cf35b9bf9ffb88fe4cce38531a87303aeb96baf1dce2d2d8e52c89

        SHA512

        883bbf0b0f31b8866cea28c1d1aa382cf4426bcb4caf2f94302cfed5e95f190254585dc126d57440fead81928bce6d7b9d4db0a1c33e190b3414a2c62e3d6d67

      • C:\Users\Admin\AppData\Local\Temp\1004427001\chrome.exe

        Filesize

        5.0MB

        MD5

        d0fc461b72469a7863f1cfc160289437

        SHA1

        a4995f29d631ac92748b4171c1f985709e36f0bc

        SHA256

        f038f6caf4194e8382830057a069646a213fd2d3bd30855d7ae59c052019bb25

        SHA512

        e138b7b329f4c779e90bfe1447395bcaeac1dcdd97849576ab8dd51baaad45050b400442964fc66efabf125be3cd41e14a2aaeda7477e95482aa13dcaf01e80e

      • C:\Windows\Temp\{09A41B20-DB77-4CE0-9DBC-D9039A41ACC9}\.cr\sxqnmytm.exe

        Filesize

        14.3MB

        MD5

        73e9ab1674c64f040da642b6a4690356

        SHA1

        e5a508bf8a7170cbacd6e6ab0259073a2a07b3cf

        SHA256

        04bb4867d35e77e8e391f3829cf07a542a73815fc8be975a7733790d6e04243c

        SHA512

        f1df00e8f0b7b1c577429028cd550788dbf4f1da1e8aa97b8ab845e68c56663c350c562f26237a278a0b44b33f06dcb9667a50db4ddaf747da71053e4189afec

      • C:\Windows\Temp\{A54BF19C-7DB4-4D21-A274-A3BA798D4D83}\.ba\ActiveISO.exe

        Filesize

        1.2MB

        MD5

        b84dfabe933d1160f624693d94779ce5

        SHA1

        ac0133c09708fe4a3c626e3ba4cdf44d3a0e065f

        SHA256

        588cb61b36a001384a2833bd5df8d7982ca79d6ae17a3d83a94e01b1e79684bd

        SHA512

        eeaeef8d6b5fa02dedf9818babaa4b5ffdb87300521883aa290289dcc720b3d543279085ed3fc649b74654143e678502e56eb3f92c4baf53c075977de33c1b0e

      • C:\Windows\Temp\{A54BF19C-7DB4-4D21-A274-A3BA798D4D83}\.ba\Qt5Gui.dll

        Filesize

        6.2MB

        MD5

        34893cb3d9a2250f0edecd68aedb72c7

        SHA1

        37161412df2c1313a54749fe6f33e4dbf41d128a

        SHA256

        ca8334b2e63bc01f0749afeb9e87943c29882131efe58608ea25732961b2df34

        SHA512

        484e32832d69ec1799bd1bcc694418801c443c732ed59ecd76b3f67abf0b1c97d64ae123728dfa99013df846ba45be310502ef6f8da42155da2e89f2a1e8cb2c

      • C:\Windows\Temp\{A54BF19C-7DB4-4D21-A274-A3BA798D4D83}\.ba\Qt5Network.dll

        Filesize

        1.3MB

        MD5

        fe5ed4c5da03077f98c3efa91ecefd81

        SHA1

        e23e839ec0602662788f761ebe7dd4b39c018a7f

        SHA256

        d992aaeb21cb567113126c2912cf75e892c8e3ead5d50147a11abe704b9e2e2b

        SHA512

        22514732a0edf8fc2b8770139599132429080b86d2844143d21bb834cbddaaa077d763969960e39e2050a69493c1aae191600e5df6107bde90fae589a054f071

      • C:\Windows\Temp\{A54BF19C-7DB4-4D21-A274-A3BA798D4D83}\.ba\Qt5Widgets.dll

        Filesize

        5.3MB

        MD5

        c502bb8a4a7dc3724ab09292cd3c70d6

        SHA1

        ff44fddeec2d335ec0eaa861714b561f899675fd

        SHA256

        4266918226c680789d49cf2407a7fec012b0ed872adafb84c7719e645f9b2e6d

        SHA512

        73bef89503ce032fba278876b7dab9eac275632df7a72c77093d433c932272da997e8fbeb431a09d84baac7b2ab2e55222ff687893311949a5603e738bfa6617

      • C:\Windows\Temp\{A54BF19C-7DB4-4D21-A274-A3BA798D4D83}\.ba\VCRUNTIME140.dll

        Filesize

        96KB

        MD5

        f12681a472b9dd04a812e16096514974

        SHA1

        6fd102eb3e0b0e6eef08118d71f28702d1a9067c

        SHA256

        d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

        SHA512

        7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

      • C:\Windows\Temp\{A54BF19C-7DB4-4D21-A274-A3BA798D4D83}\.ba\jri

        Filesize

        4.3MB

        MD5

        66f309482f529590cf5ad56549effbef

        SHA1

        76c9117e6356203daed79c1caecb4808436aef36

        SHA256

        d704f5f01487ca3340454240868515de1a43a1b65e5b4a97a74ab409c8441f82

        SHA512

        9b2068943a6f6db6b9e885a3b3b7ea6da9f7a9971767780e02184e10674395b3dd7f3b539c04d9acbacf8f39042fdb90f3c9cb5986c2076846626ea5decb3d01

      • C:\Windows\Temp\{A54BF19C-7DB4-4D21-A274-A3BA798D4D83}\.ba\yodpxub

        Filesize

        21KB

        MD5

        65ced4e3e5b641b3fee1e135e3604a1a

        SHA1

        860173020684e54f4eb9bc9e4fdab348b371214d

        SHA256

        1a5991a30e9d339cbb0143d4bd134509cf4effc7fead7f4f7dcc059990efd669

        SHA512

        cc4ec199a58a20d2c4543fd247b329422ce3ad15695c74d2aa4fc89dc780a274527b020157e6c23f8a2a4839209f5d742694881768dd12c9b80c622da17f31e6

      • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

        Filesize

        3.0MB

        MD5

        e788e5dd84c8c180b072cce3c16d329d

        SHA1

        2685fe8dcd081268a54560180232d574d048acd1

        SHA256

        01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547

        SHA512

        6810df6bef6de35897a69187f7c73ab3b4e3c9982b742fbc64b7c81d206ca19ed482f9286c1232527a556a28b9b4d41f0982d942b10fd95a2c6d490a9f4ad96f

      • \Windows\Temp\{A54BF19C-7DB4-4D21-A274-A3BA798D4D83}\.ba\Bichromate.dll

        Filesize

        1.4MB

        MD5

        86b7452f87b5c7f79f8b8a3ad326035e

        SHA1

        a81ba71c0b3f93c6bcdc004ede3f98f205dd31ca

        SHA256

        58a6b1fe90145f8ae431d05952d1751e705ae46a81be1c2257f5e1e0ce0292c7

        SHA512

        4c0e8166a8ee81c9e851fe7d25915b1d85bbe3b274e88160ff948ddb8a15f67122a52ba3906da6a090f8ba064915c8df1780103e474bf8e6f3dd673fc304ce7b

      • \Windows\Temp\{A54BF19C-7DB4-4D21-A274-A3BA798D4D83}\.ba\Qt5Core.dll

        Filesize

        5.8MB

        MD5

        6e8bfe548ca4de868c82279e5d127db0

        SHA1

        120cbd2177493859c40b943bed3d124555cc5bd9

        SHA256

        f7bddcd19a740e179827a99c23cc045d6f4ab8d5b6699592b1a1e8fcb6ddc22f

        SHA512

        9f4736a432ea496c010a5a37a87da1fcee6bafb2c6600eacaa8a0b0e9d47eb8bf0b044cf34d6212d871d4b1bd93339d148b67c72a8226145929d117756ece6b0

      • \Windows\Temp\{A54BF19C-7DB4-4D21-A274-A3BA798D4D83}\.ba\Qt5PrintSupport.dll

        Filesize

        316KB

        MD5

        d0634933db2745397a603d5976bee8e7

        SHA1

        ddec98433bcfec1d9e38557d803bc73e1ff883b6

        SHA256

        7d91d3d341dbba568e2d19382e9d58a42a0d78064c3ad7adfe3c7bb14742c2b1

        SHA512

        9271370cd22115f68bd62572640525e086a05d75f5bc768f06e20b90b48a182f29a658a07099c7bc1e99bf0ffcf1229709524e2af6745d6fed7b41c1addd09f1

      • \Windows\Temp\{A54BF19C-7DB4-4D21-A274-A3BA798D4D83}\.ba\StarBurn.dll

        Filesize

        1.4MB

        MD5

        41e19ba2364f2c834b2487e1d02bb99a

        SHA1

        6c61d603dddfe384a93ad33775b70681d0a396d9

        SHA256

        c040a25377028b0c28db81a012de786c803a0e9d6f87ce460335a621d31f5340

        SHA512

        6ebf4a9e80f16c6a03ff357d2da9a34a4227bfd65eb66d1d335349a77ba066d069ba0d47d46229b3c77b59052c42d388678662f970b418d8cc3cfb1223427d8c

      • \Windows\Temp\{A54BF19C-7DB4-4D21-A274-A3BA798D4D83}\.ba\msvcp140.dll

        Filesize

        557KB

        MD5

        7db24201efea565d930b7ec3306f4308

        SHA1

        880c8034b1655597d0eebe056719a6f79b60e03c

        SHA256

        72fe4598f0b75d31ce2dc621e8ef161338c6450bb017cd06895745690603729e

        SHA512

        bac5729a3eb53e9bc7b680671d028cabef5ea102dfaa48a7c453b67f8ecb358db9f8fb16b3b1d9ea5a2dff34f459f6ac87f3a563c736d81d31048766198ff11e

      • \Windows\Temp\{A54BF19C-7DB4-4D21-A274-A3BA798D4D83}\.ba\vcruntime140_1.dll

        Filesize

        37KB

        MD5

        75e78e4bf561031d39f86143753400ff

        SHA1

        324c2a99e39f8992459495182677e91656a05206

        SHA256

        1758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e

        SHA512

        ce4daf46bce44a89d21308c63e2de8b757a23be2630360209c4a25eb13f1f66a04fbb0a124761a33bbf34496f2f2a02b8df159b4b62f1b6241e1dbfb0e5d9756

      • memory/1176-82-0x0000000000800000-0x0000000000B07000-memory.dmp

        Filesize

        3.0MB

      • memory/1176-85-0x0000000000800000-0x0000000000B07000-memory.dmp

        Filesize

        3.0MB

      • memory/1248-107-0x0000000000180000-0x00000000008B3000-memory.dmp

        Filesize

        7.2MB

      • memory/1248-105-0x0000000000180000-0x00000000008B3000-memory.dmp

        Filesize

        7.2MB

      • memory/1408-294-0x0000000000160000-0x0000000000443000-memory.dmp

        Filesize

        2.9MB

      • memory/1408-293-0x0000000000160000-0x0000000000443000-memory.dmp

        Filesize

        2.9MB

      • memory/1408-291-0x000007FFFFFDF000-0x000007FFFFFE0000-memory.dmp

        Filesize

        4KB

      • memory/1408-292-0x000007FFFFFDF000-0x000007FFFFFE0000-memory.dmp

        Filesize

        4KB

      • memory/1668-219-0x0000000000950000-0x0000000000958000-memory.dmp

        Filesize

        32KB

      • memory/1668-218-0x0000000019EB0000-0x000000001A192000-memory.dmp

        Filesize

        2.9MB

      • memory/2016-172-0x000007FEF5FD0000-0x000007FEF651E000-memory.dmp

        Filesize

        5.3MB

      • memory/2036-209-0x000007FEF6160000-0x000007FEF66AE000-memory.dmp

        Filesize

        5.3MB

      • memory/2176-210-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-101-0x0000000006590000-0x0000000006CC3000-memory.dmp

        Filesize

        7.2MB

      • memory/2176-111-0x0000000005F30000-0x0000000006237000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-25-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-300-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-125-0x0000000005F30000-0x00000000061F2000-memory.dmp

        Filesize

        2.8MB

      • memory/2176-299-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-298-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-129-0x0000000006590000-0x0000000006CC3000-memory.dmp

        Filesize

        7.2MB

      • memory/2176-130-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-131-0x0000000005F30000-0x000000000623A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-24-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-147-0x0000000005F30000-0x00000000061F2000-memory.dmp

        Filesize

        2.8MB

      • memory/2176-297-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-296-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-152-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-23-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-21-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-20-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-19-0x0000000000121000-0x0000000000189000-memory.dmp

        Filesize

        416KB

      • memory/2176-295-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-81-0x0000000005F30000-0x0000000006237000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-18-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-83-0x0000000005F30000-0x0000000006237000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-26-0x0000000000121000-0x0000000000189000-memory.dmp

        Filesize

        416KB

      • memory/2176-286-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-106-0x0000000005F30000-0x0000000006237000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-285-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-110-0x0000000005F30000-0x000000000623A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-100-0x0000000006590000-0x0000000006CC3000-memory.dmp

        Filesize

        7.2MB

      • memory/2176-27-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2176-94-0x0000000000120000-0x000000000042A000-memory.dmp

        Filesize

        3.0MB

      • memory/2436-223-0x0000000140000000-0x000000014000E000-memory.dmp

        Filesize

        56KB

      • memory/2436-221-0x0000000140000000-0x000000014000E000-memory.dmp

        Filesize

        56KB

      • memory/2436-225-0x0000000140000000-0x000000014000E000-memory.dmp

        Filesize

        56KB

      • memory/2436-220-0x0000000140000000-0x000000014000E000-memory.dmp

        Filesize

        56KB

      • memory/2436-227-0x0000000140000000-0x000000014000E000-memory.dmp

        Filesize

        56KB

      • memory/2436-222-0x0000000140000000-0x000000014000E000-memory.dmp

        Filesize

        56KB

      • memory/2500-14-0x0000000006D40000-0x000000000704A000-memory.dmp

        Filesize

        3.0MB

      • memory/2500-1-0x0000000077D20000-0x0000000077D22000-memory.dmp

        Filesize

        8KB

      • memory/2500-2-0x00000000013D1000-0x0000000001439000-memory.dmp

        Filesize

        416KB

      • memory/2500-16-0x00000000013D0000-0x00000000016DA000-memory.dmp

        Filesize

        3.0MB

      • memory/2500-17-0x00000000013D1000-0x0000000001439000-memory.dmp

        Filesize

        416KB

      • memory/2500-0-0x00000000013D0000-0x00000000016DA000-memory.dmp

        Filesize

        3.0MB

      • memory/2500-4-0x00000000013D0000-0x00000000016DA000-memory.dmp

        Filesize

        3.0MB

      • memory/2500-3-0x00000000013D0000-0x00000000016DA000-memory.dmp

        Filesize

        3.0MB

      • memory/2520-126-0x0000000000C80000-0x0000000000F42000-memory.dmp

        Filesize

        2.8MB

      • memory/2520-127-0x0000000000C80000-0x0000000000F42000-memory.dmp

        Filesize

        2.8MB

      • memory/2520-128-0x0000000000C80000-0x0000000000F42000-memory.dmp

        Filesize

        2.8MB

      • memory/2520-149-0x0000000000C80000-0x0000000000F42000-memory.dmp

        Filesize

        2.8MB

      • memory/2520-151-0x0000000000C80000-0x0000000000F42000-memory.dmp

        Filesize

        2.8MB

      • memory/2708-236-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2708-231-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2708-232-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2708-242-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2708-243-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2708-230-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2708-233-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2708-237-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2708-240-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2708-238-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2708-239-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2708-235-0x00000000002F0000-0x0000000000310000-memory.dmp

        Filesize

        128KB

      • memory/2708-229-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2708-228-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2708-234-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2964-288-0x0000000074D00000-0x0000000074E74000-memory.dmp

        Filesize

        1.5MB

      • memory/2964-244-0x0000000077B30000-0x0000000077CD9000-memory.dmp

        Filesize

        1.7MB

      • memory/2968-216-0x0000000001EB0000-0x0000000001EB8000-memory.dmp

        Filesize

        32KB

      • memory/2968-215-0x000000001B5A0000-0x000000001B882000-memory.dmp

        Filesize

        2.9MB