Analysis

  • max time kernel
    20s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 05:26

General

  • Target

    6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe

  • Size

    1.8MB

  • MD5

    68c848d7232e6525935d7e337f37d624

  • SHA1

    6cef0f74d1fbb478d975eaf516a881c3fd833b15

  • SHA256

    6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3

  • SHA512

    1aac64871ab488cbf1ca2c17c591fb9780291435a7464a956e19d9bf78a58d3800b7955a8fc7d9c7a2efd7f83e2bd65d05bf0ecfcbdce9c1e0bbb847eac79310

  • SSDEEP

    49152:4DGXEI7OU0hl2LQAGNWGFuC/ywcldX2wZads+gH5:+LI7f0+qFAC/Asi5

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe
    "C:\Users\Admin\AppData\Local\Temp\6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:764
      • C:\Users\Admin\AppData\Local\Temp\1007851001\acde65e8ef.exe
        "C:\Users\Admin\AppData\Local\Temp\1007851001\acde65e8ef.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4420
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          PID:5744
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff4c84cc40,0x7fff4c84cc4c,0x7fff4c84cc58
            5⤵
              PID:5768
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1960,i,10613994999794760986,5915446086932053143,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1956 /prefetch:2
              5⤵
                PID:6100
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1824,i,10613994999794760986,5915446086932053143,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1996 /prefetch:3
                5⤵
                  PID:3468
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,10613994999794760986,5915446086932053143,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2456 /prefetch:8
                  5⤵
                    PID:3916
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,10613994999794760986,5915446086932053143,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:3840
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,10613994999794760986,5915446086932053143,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3260 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:4848
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4508,i,10613994999794760986,5915446086932053143,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4564 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:3076
                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                  "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                  4⤵
                    PID:2644
                  • C:\Windows\SysWOW64\schtasks.exe
                    "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                    4⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:4432
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 1848
                    4⤵
                    • Program crash
                    PID:5188
                • C:\Users\Admin\AppData\Local\Temp\1007856001\cb1e66f484.exe
                  "C:\Users\Admin\AppData\Local\Temp\1007856001\cb1e66f484.exe"
                  3⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:540
                • C:\Users\Admin\AppData\Local\Temp\1007857001\6cb79cf513.exe
                  "C:\Users\Admin\AppData\Local\Temp\1007857001\6cb79cf513.exe"
                  3⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:436
                • C:\Users\Admin\AppData\Local\Temp\1007858001\1ea40064ae.exe
                  "C:\Users\Admin\AppData\Local\Temp\1007858001\1ea40064ae.exe"
                  3⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:4912
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM firefox.exe /T
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    PID:3636
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM chrome.exe /T
                    4⤵
                    • Kills process with taskkill
                    PID:4224
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM msedge.exe /T
                    4⤵
                    • Kills process with taskkill
                    PID:3348
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM opera.exe /T
                    4⤵
                    • Kills process with taskkill
                    PID:3308
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM brave.exe /T
                    4⤵
                    • Kills process with taskkill
                    PID:3344
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                    4⤵
                      PID:1836
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                        5⤵
                          PID:668
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1964 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {45778960-9b0a-4f6b-b9a0-f16f0aeac09e} 668 "\\.\pipe\gecko-crash-server-pipe.668" gpu
                            6⤵
                              PID:2008
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2404 -parentBuildID 20240401114208 -prefsHandle 2400 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {92892e16-5ea3-4d14-9cb4-cef8d8008099} 668 "\\.\pipe\gecko-crash-server-pipe.668" socket
                              6⤵
                                PID:980
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3368 -childID 1 -isForBrowser -prefsHandle 3284 -prefMapHandle 3364 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {10ccef32-a590-4226-a5e4-b5c0642d4dbe} 668 "\\.\pipe\gecko-crash-server-pipe.668" tab
                                6⤵
                                  PID:2608
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3708 -childID 2 -isForBrowser -prefsHandle 3720 -prefMapHandle 3736 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9667608c-ac2d-4be4-98c1-a5ce14c8b52a} 668 "\\.\pipe\gecko-crash-server-pipe.668" tab
                                  6⤵
                                    PID:2292
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4640 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4552 -prefMapHandle 4544 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8ea9885-ea73-4730-971d-b64951ebf397} 668 "\\.\pipe\gecko-crash-server-pipe.668" utility
                                    6⤵
                                      PID:2932
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 3 -isForBrowser -prefsHandle 5344 -prefMapHandle 3760 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c65e8c9-1529-4310-94a8-8052cbf0603b} 668 "\\.\pipe\gecko-crash-server-pipe.668" tab
                                      6⤵
                                        PID:5844
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5464 -childID 4 -isForBrowser -prefsHandle 5472 -prefMapHandle 5476 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4fa5b80b-d56a-4b1d-b407-2c1c0ce6c97c} 668 "\\.\pipe\gecko-crash-server-pipe.668" tab
                                        6⤵
                                          PID:5856
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5656 -childID 5 -isForBrowser -prefsHandle 5664 -prefMapHandle 5668 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2847a326-646e-4bda-a16c-a15585657813} 668 "\\.\pipe\gecko-crash-server-pipe.668" tab
                                          6⤵
                                            PID:5868
                                    • C:\Users\Admin\AppData\Local\Temp\1007859001\25aaa6a2ff.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1007859001\25aaa6a2ff.exe"
                                      3⤵
                                        PID:5936
                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    1⤵
                                      PID:3116
                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                      1⤵
                                        PID:1224
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4420 -ip 4420
                                        1⤵
                                          PID:1480
                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                          1⤵
                                            PID:5484
                                          • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                            C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                            1⤵
                                              PID:5672

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                              Filesize

                                              2B

                                              MD5

                                              d751713988987e9331980363e24189ce

                                              SHA1

                                              97d170e1550eee4afc0af065b78cda302a97674c

                                              SHA256

                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                              SHA512

                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json

                                              Filesize

                                              27KB

                                              MD5

                                              f1afa889518cb64e94d6c5be55d4df39

                                              SHA1

                                              13d00ab6fe9696b4152f9149e4e34d16fac2c446

                                              SHA256

                                              4e3f3c9f0cd2ba5bffb99df78e3e3c77203e27eb39f9bd37992c92951c79b1b9

                                              SHA512

                                              24af17aa444713f23426a827dbb31726cc16ecf042e235fffdb14d97cb0110e6f3d6c3d8f7afb2d43067509f2080fb487756873e6259f18a03675c42150cee62

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                              Filesize

                                              13KB

                                              MD5

                                              eb99acf849b299e921a02b1466f1e135

                                              SHA1

                                              21af7c7ba9ed35ddd6be57bb5f85edc4224db6d4

                                              SHA256

                                              43e74c2aa5ae76ace1de39a9f8da964f491a91deab1f2b95e319c242d3130851

                                              SHA512

                                              982a8fbb69d92904ea9a13978931fd1807653c499c98080e200e5429f033fd2403c68e0b1dff6f78f0f0224727ad829e6fd1a32732948ed745f0024c0e3ad638

                                            • C:\Users\Admin\AppData\Local\Temp\1007851001\acde65e8ef.exe

                                              Filesize

                                              4.2MB

                                              MD5

                                              7dfd0e3781e268e2e6d5f6e8712455fb

                                              SHA1

                                              beb4b1e543d14e26c3ddccfe324eb8f3ba67194f

                                              SHA256

                                              273813e96ea6dad4fdbeb9d791929caf69b193f488d9adc7cf66cf00a8b5b098

                                              SHA512

                                              fe62997c3cde4125871681f8c85986e5f598cd6e03cdf76d916cf228ff85bbbd56450fed2585837b48f74167e0d8404e7e247d9087be5dad41d67cd391b2e57d

                                            • C:\Users\Admin\AppData\Local\Temp\1007856001\cb1e66f484.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              4658dfd86a5c61df7f4dc30347017718

                                              SHA1

                                              2e998b513681d11bfe238b4dd95849bc78fc8296

                                              SHA256

                                              970d268afd9c4051c591faa72ba2da6351852ec16ba8f664bb5813a0238ea243

                                              SHA512

                                              dfcfceda932596cce40bf9d9ccf6bd2c58c43a6184cd75875f5797ae0ee0d1699662bf5b4b19f644d068439fc85a2c5431805881b8874e100ce4e2d111609ca5

                                            • C:\Users\Admin\AppData\Local\Temp\1007857001\6cb79cf513.exe

                                              Filesize

                                              1.7MB

                                              MD5

                                              3b43c7942554833f316cf7108b571f8b

                                              SHA1

                                              f6f15b0a739eac16980144cbc1b7e2579fe9141a

                                              SHA256

                                              a782058a0f3fe32eddc56aa22a302f5c1d7f718e434cf2c547336ace69a680e2

                                              SHA512

                                              f12e5b6a73c6c75a1641b31446aac4111d1326b6186f9b3a70b4527256f6f4a9325382daedd89524afc2f4137536a8e6350849a18a9da769ddb834e85c7b0226

                                            • C:\Users\Admin\AppData\Local\Temp\1007858001\1ea40064ae.exe

                                              Filesize

                                              901KB

                                              MD5

                                              2fc35a6db90cebc471ecfb0f4b67d539

                                              SHA1

                                              605048a60ca39c75842027d47ae1f9b45194591b

                                              SHA256

                                              85e6e158869ed15870cdfef9adffc26df902d42f12540bf0e087e749526b4309

                                              SHA512

                                              00b257d36ccb6ad3c20550e52163e3612cad14443978d42a6290462340aa9cfd2392dcf5f27c6cc6f8a4a14d5cca090f2d646debb0bd532e11dbc7fca116ceee

                                            • C:\Users\Admin\AppData\Local\Temp\1007859001\25aaa6a2ff.exe

                                              Filesize

                                              2.6MB

                                              MD5

                                              b6232971846816075fb9476cb82148fb

                                              SHA1

                                              32fdc8249eb381bdc6733092b6be00d3bdab5d2e

                                              SHA256

                                              1a1fa8992c84f43a7d642d63ccbc350eccf35263a9aa097709ad75fa13bc69d7

                                              SHA512

                                              7f861f5086dddbd0939f303a78b1ad00464d666171448e7d386318b988a09434ace95288dbe0f4dc51cca39dacbed97b405b111e149ca31d3ca1ff4f3cab781a

                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              68c848d7232e6525935d7e337f37d624

                                              SHA1

                                              6cef0f74d1fbb478d975eaf516a881c3fd833b15

                                              SHA256

                                              6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3

                                              SHA512

                                              1aac64871ab488cbf1ca2c17c591fb9780291435a7464a956e19d9bf78a58d3800b7955a8fc7d9c7a2efd7f83e2bd65d05bf0ecfcbdce9c1e0bbb847eac79310

                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                              Filesize

                                              479KB

                                              MD5

                                              09372174e83dbbf696ee732fd2e875bb

                                              SHA1

                                              ba360186ba650a769f9303f48b7200fb5eaccee1

                                              SHA256

                                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                              SHA512

                                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                              Filesize

                                              6.9MB

                                              MD5

                                              ab37ad005cd751dbb27f500e3b949c13

                                              SHA1

                                              363480512e5c4415b50b44c34f905ec74cd40092

                                              SHA256

                                              301736a7d86ec8704f02cce4449b7ce872fbb2c443db9f57ec811d68131d72cb

                                              SHA512

                                              39b7c6d26d294427efdc50e6a777fccc695883cf911067846a907fc0f499638bcab5a2e5c1658c8e7598ee226c3ad7f78427578b7d1270f61d8f800c9c74ef6a

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                                              Filesize

                                              18KB

                                              MD5

                                              4c327bb82b896df006468858dc6104e3

                                              SHA1

                                              f25901dc2ccc3b475d3058bab98695e5e73f7b8f

                                              SHA256

                                              7a9d9495c293438e94076ed9ebfdaabcaad56a2699e5007f10a5d5f4649cdce3

                                              SHA512

                                              14a0803ffa91f2c1500f7515e164c2e0cb8d0dc8f211ef1c09dec14722f98843ad9bfe6b1ac4500645b5212e6246f7069e42327dfdc9332c0f68f77f1a9ce94e

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                                              Filesize

                                              10KB

                                              MD5

                                              7d2a77433b37c2703409c47696a9b929

                                              SHA1

                                              5f199a585933cd82a4ed95ade4fb41a6d101b060

                                              SHA256

                                              3806509be84d154f7e584b464b5d256104cffa9d2de7b5bfe8c114161724e023

                                              SHA512

                                              19a793514b69b70759bbfb2920a5338bb53883f8687b46f5e5b8e2a175e78de45a7805592f27fc435fdc9f935cb9be91cc218d9184bf35bd2009d83d1b2d4f5e

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                              Filesize

                                              15KB

                                              MD5

                                              4f42280313ff4b1befcfd13f18122002

                                              SHA1

                                              1c55d3a869ca30d44fd4d8658fe02f766dbdd9c5

                                              SHA256

                                              418bff36f93810aa2e2341254845313b7eaad5d0dd79d590e42f5d54dde6c1cf

                                              SHA512

                                              4a2bd0cc67dc45168ea5d17b4db922a9d3d6dd161d4eef59b45b8c15b20830e981345da111696de8ec661208813cc18b3ef9b2b121d535cf3f1126973acc66fd

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                              Filesize

                                              15KB

                                              MD5

                                              a194115d82c74a924c59b273615a4033

                                              SHA1

                                              9cb0e290b298d3b43b86f0dce27793001715228f

                                              SHA256

                                              699df82f93b25aa880843cb88364614877c6852c058a6c10d3cc2619b9bf58f2

                                              SHA512

                                              df35bfa49520c6172e404338cd5eb9e578d8d1fe58b552beb53269838be6cd24a4581f633990ee75f1fe85ec9383990f9fbcb556d7c96042541390abb044c82a

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                              Filesize

                                              5KB

                                              MD5

                                              66c77a3931ee7de9a62112e3fbe41df6

                                              SHA1

                                              c6b7c51b2622971d22b8610efb53c4a0764fb126

                                              SHA256

                                              49e148fb0ea330daa54d2ffa9f42d79be41e5a15e2e4ba31227fdd2b68ef268c

                                              SHA512

                                              a25af731c8f1c88dea3727cc41abcc76447c665f0295aec07fae077016ae54d6302700dd667644e7195f25885ca3a35967fca5d7e57b7ef69a31c1b6c7a54bc1

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                              Filesize

                                              6KB

                                              MD5

                                              7a221ab905970c44b11d4cdb3c0743b4

                                              SHA1

                                              dc3928f4b1995cbbecdbb886906f01bdaa3f8d55

                                              SHA256

                                              f8ef96315a0135c669427192422348e67e2fd8d9b1575386a7acd36bedea124e

                                              SHA512

                                              261d59b6176f8751d1ac5b87dc559e3552c5c0e22f68ba063e2b30e204a2328d0491d6959dfb462a343b65a26efdfafa9787e6d000bc5fcf0552587f1bbe56d5

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\86fea6e1-401a-4e67-9d39-371ca7cfcfaf

                                              Filesize

                                              671B

                                              MD5

                                              8c39d1c20e0b4588aa503c8c9dcf902d

                                              SHA1

                                              4176db0c4aa6f10db99ca02d26e0097834d7e31e

                                              SHA256

                                              779faa795c02083c290b4f88595c32b401aa13b109aec58def90154e12efd0ff

                                              SHA512

                                              5a9485b4e26fc553df87aa46ac8156318b883f00e8586c15e388b8318da22b111a21328737acc9283a330d13437e418d1d9777a414e47e5c73315d6bdcc55f7f

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\ba1d97bf-2c64-49a8-8e51-9f0d61dd0958

                                              Filesize

                                              982B

                                              MD5

                                              d0a6ab813d9a63f603d0aed28a7191c3

                                              SHA1

                                              630cf72ae1eee1839231e9c66f33ef9f916ebf15

                                              SHA256

                                              05175bfd1bbb6cdce6c5c910344ffb11edf81e68a926520c2d60bc81e270a39e

                                              SHA512

                                              01834d360a44fd00bb58d9e75b2eba09df9c57977ab19dd4dcbf61bd7d68541712fb445f2cf4789db577c7bc4ff1903ba8e98045c7bb5ed7eca3511a130e3aa1

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\f9b0e79c-e043-4ebe-acff-3bb6cda7d2c4

                                              Filesize

                                              26KB

                                              MD5

                                              7067a15227f0995a3e90542a642eb46c

                                              SHA1

                                              515c6ae6cbf7ee900155edd0125a9d741993bf8e

                                              SHA256

                                              ceb4d2fbaba2a930ffb69ba36ec9412c69af99b96e8f52d6013b8b9404968747

                                              SHA512

                                              d1f30a117bcee2a1a37c8c3c14a1b7b3f21494a26dda2170c5bfd4aed8422464e0c3fa4bab11c2f3ba41a086ef7d769891283a6faced70bdd91dce33b61e35ab

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                              Filesize

                                              1.1MB

                                              MD5

                                              842039753bf41fa5e11b3a1383061a87

                                              SHA1

                                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                              SHA256

                                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                              SHA512

                                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                              Filesize

                                              116B

                                              MD5

                                              2a461e9eb87fd1955cea740a3444ee7a

                                              SHA1

                                              b10755914c713f5a4677494dbe8a686ed458c3c5

                                              SHA256

                                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                              SHA512

                                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                              Filesize

                                              372B

                                              MD5

                                              bf957ad58b55f64219ab3f793e374316

                                              SHA1

                                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                              SHA256

                                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                              SHA512

                                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                              Filesize

                                              8.9MB

                                              MD5

                                              ffeb63768c7f4cfbe934769988ce305d

                                              SHA1

                                              5fc8ed105f1664087183c6b1ee37ea804510bd9a

                                              SHA256

                                              9ca3872f7b578bf9002bdeaab27707073afe07783553755127bb803f117e9a84

                                              SHA512

                                              f56d5fc93af12612ac1f196cdeaf09b8bfb0605a4f414d3f8b5afb93f3a71c72806e972a841780f3d45a75e3a9149890533ffe32140f3294cd2254fb6864e367

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                                              Filesize

                                              11KB

                                              MD5

                                              8cc65d46feb8b58e99d44d1f8bc76911

                                              SHA1

                                              7fb4dfff5e1db5928575cb724edfe34935fa7ecb

                                              SHA256

                                              7584d053c7db87ae1cdd96ef2a2a0c56d0cf1d76f293fbd97ecd232c19c0ebaa

                                              SHA512

                                              0f293cf36c84ee42dac2db5e536f65ffcb8c397f6c3b8629b6ff3fb351a9b3c8f96bf33ac4d61120ee2dc95ee275bb017ddefe8c04d4af75f02311d56a1324ae

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                                              Filesize

                                              10KB

                                              MD5

                                              2c3f8dd930d08f58de4ea0360a3d392c

                                              SHA1

                                              9b59193cf989a6c7f6d7c2c676369aca267b98e3

                                              SHA256

                                              23cbc27be050b8ea6e11a9db4722ab827ee0d9bd615d98b4d0412b425a84db0f

                                              SHA512

                                              6c83ab7d36e109c5f8e64f24b01a5628b0c20814c29918fc78d3b8bdf1b9c066f6de3c89acb40e3a38dcd1d687ab1203d7c39ca1e5c72b416677791661de023f

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                                              Filesize

                                              15KB

                                              MD5

                                              65015be7a6aa4bb99f1cc4d39bdd9d6a

                                              SHA1

                                              1862c76de3c4262718696a92871a34fb3b305d57

                                              SHA256

                                              992e5b19590f23b7d4b630e08ce27e44da839339561b0fee0c41898fed46a022

                                              SHA512

                                              d2e22c862e6a2d654dfd77ac55cd1e00fff7a385d4da21d2b5f6f4b094c440d6a76d30c40c210d4aecaac31287fa5bce8aa36695d3972af146aabd2e1dae4636

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs.js

                                              Filesize

                                              11KB

                                              MD5

                                              28b7535e36c57a587cfbdd8a5043d0f0

                                              SHA1

                                              8c4e99ecd0698976a12de6030826d0085ccf6535

                                              SHA256

                                              1b805a7453ada6c31342449c6138012b121e45ad865e2d19bff61299d22edc08

                                              SHA512

                                              19d7296df3ba5e8f1e5f7f061176d4c0be5686d76376a61b523e47a3de43d11490b1c2f55ebe1b9cb6d1ab869090cf4a501cae064e2f524910ab8eb609dd8d23

                                            • memory/436-75-0x00000000009F0000-0x0000000001095000-memory.dmp

                                              Filesize

                                              6.6MB

                                            • memory/436-78-0x00000000009F0000-0x0000000001095000-memory.dmp

                                              Filesize

                                              6.6MB

                                            • memory/540-59-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/540-77-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-19-0x0000000000061000-0x000000000008F000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/764-1020-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-517-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-3077-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-3083-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-43-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-3051-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-3065-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-3062-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-99-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-500-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-41-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-2343-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-16-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-20-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-3080-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-3074-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-36-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-23-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-22-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-21-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/764-3037-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/916-2-0x00000000005C1000-0x00000000005EF000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/916-3-0x00000000005C0000-0x0000000000A6E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/916-18-0x00000000005C0000-0x0000000000A6E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/916-1-0x00000000779C4000-0x00000000779C6000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/916-4-0x00000000005C0000-0x0000000000A6E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/916-0-0x00000000005C0000-0x0000000000A6E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2644-3060-0x0000000073340000-0x0000000073474000-memory.dmp

                                              Filesize

                                              1.2MB

                                            • memory/2644-3059-0x0000000000B80000-0x0000000000B92000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/3116-768-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/3116-791-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/4420-499-0x00000000008F0000-0x000000000152D000-memory.dmp

                                              Filesize

                                              12.2MB

                                            • memory/4420-2152-0x00000000008F0000-0x000000000152D000-memory.dmp

                                              Filesize

                                              12.2MB

                                            • memory/4420-840-0x00000000008F0000-0x000000000152D000-memory.dmp

                                              Filesize

                                              12.2MB

                                            • memory/4420-3036-0x00000000008F0000-0x000000000152D000-memory.dmp

                                              Filesize

                                              12.2MB

                                            • memory/4420-713-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                              Filesize

                                              10.4MB

                                            • memory/4420-3044-0x00000000008F0000-0x000000000152D000-memory.dmp

                                              Filesize

                                              12.2MB

                                            • memory/4420-3050-0x00000000008F0000-0x000000000152D000-memory.dmp

                                              Filesize

                                              12.2MB

                                            • memory/4420-40-0x00000000008F0000-0x000000000152D000-memory.dmp

                                              Filesize

                                              12.2MB

                                            • memory/4420-512-0x00000000008F0000-0x000000000152D000-memory.dmp

                                              Filesize

                                              12.2MB

                                            • memory/4420-90-0x00000000008F0000-0x000000000152D000-memory.dmp

                                              Filesize

                                              12.2MB

                                            • memory/4420-79-0x00000000008F0000-0x000000000152D000-memory.dmp

                                              Filesize

                                              12.2MB

                                            • memory/4420-42-0x00000000008F1000-0x0000000000B69000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/5484-3067-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/5484-3068-0x0000000000060000-0x000000000050E000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/5672-3071-0x0000000000B80000-0x0000000000B92000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/5936-444-0x0000000000350000-0x0000000000600000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/5936-445-0x0000000000350000-0x0000000000600000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/5936-410-0x0000000000350000-0x0000000000600000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/5936-508-0x0000000000350000-0x0000000000600000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/5936-511-0x0000000000350000-0x0000000000600000-memory.dmp

                                              Filesize

                                              2.7MB