Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/11/2024, 20:06

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    83c6178fb84fe7cb7b907b7538adf183

  • SHA1

    a4f726accdca9ae01a1cd7f18a2d7061dd30caf1

  • SHA256

    14df41fc65584367f11a4b221e2ecc7414639449fafd05692f82c47f19c3422a

  • SHA512

    e3e686cdb8c59adef54788e9f46f0c7516b57aca88ed288376f28d0eb0f25ead37d886f6aa18988c631f4d636e368af1a014c0a97365f773946ba55c59cfa687

  • SSDEEP

    49152:HSK1KLt41Nv3S5QReH7v9thEsO8YjUYb7XI6ZbRMfKcZeTUx:yK1yaK5QgbvusmjUYnZbRw1X

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3428
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        "C:\Users\Admin\AppData\Local\Temp\file.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4200
          • C:\Users\Admin\AppData\Local\Temp\1010753001\WqtakkK.exe
            "C:\Users\Admin\AppData\Local\Temp\1010753001\WqtakkK.exe"
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3584
          • C:\Users\Admin\AppData\Local\Temp\1010758001\037f01bc28.exe
            "C:\Users\Admin\AppData\Local\Temp\1010758001\037f01bc28.exe"
            4⤵
            • Enumerates VirtualBox registry keys
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3416
          • C:\Users\Admin\AppData\Local\Temp\1010759001\ce5459a8a6.exe
            "C:\Users\Admin\AppData\Local\Temp\1010759001\ce5459a8a6.exe"
            4⤵
            • Enumerates VirtualBox registry keys
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4348
          • C:\Users\Admin\AppData\Local\Temp\1010760001\c2fe383603.exe
            "C:\Users\Admin\AppData\Local\Temp\1010760001\c2fe383603.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4172
          • C:\Users\Admin\AppData\Local\Temp\1010761001\96136ef23d.exe
            "C:\Users\Admin\AppData\Local\Temp\1010761001\96136ef23d.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2728
          • C:\Users\Admin\AppData\Local\Temp\1010762001\85b0f4a6b2.exe
            "C:\Users\Admin\AppData\Local\Temp\1010762001\85b0f4a6b2.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4648
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1652
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4632
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1380
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4064
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4052
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1416
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                6⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1948
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1932 -prefMapHandle 1924 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b19154b-b406-4d69-867c-da6faca9f17f} 1948 "\\.\pipe\gecko-crash-server-pipe.1948" gpu
                  7⤵
                    PID:2004
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2424 -prefMapHandle 2420 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b77725a4-a6ee-4417-a421-4ea89573aa37} 1948 "\\.\pipe\gecko-crash-server-pipe.1948" socket
                    7⤵
                      PID:3332
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1636 -childID 1 -isForBrowser -prefsHandle 3024 -prefMapHandle 2944 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e856293-d7d1-4799-a055-be93506b96b7} 1948 "\\.\pipe\gecko-crash-server-pipe.1948" tab
                      7⤵
                        PID:3864
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4008 -childID 2 -isForBrowser -prefsHandle 4000 -prefMapHandle 3996 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4bcae51c-ff5e-4e0b-8fa3-f34b6306a6b2} 1948 "\\.\pipe\gecko-crash-server-pipe.1948" tab
                        7⤵
                          PID:4652
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4756 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4752 -prefMapHandle 4736 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a03eacf0-5cfe-4f6d-b3a2-7971ce44db37} 1948 "\\.\pipe\gecko-crash-server-pipe.1948" utility
                          7⤵
                          • Checks processor information in registry
                          PID:1452
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5480 -childID 3 -isForBrowser -prefsHandle 5264 -prefMapHandle 5444 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef661a85-a1d2-4cbc-934f-9d59439ec5f4} 1948 "\\.\pipe\gecko-crash-server-pipe.1948" tab
                          7⤵
                            PID:2596
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5688 -childID 4 -isForBrowser -prefsHandle 5608 -prefMapHandle 5616 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1323cf3e-e7d5-4ded-851d-0be96f3fcea1} 1948 "\\.\pipe\gecko-crash-server-pipe.1948" tab
                            7⤵
                              PID:4772
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5808 -childID 5 -isForBrowser -prefsHandle 5884 -prefMapHandle 5880 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {35eda903-b2e7-4b13-9556-050d35190fc2} 1948 "\\.\pipe\gecko-crash-server-pipe.1948" tab
                              7⤵
                                PID:3056
                        • C:\Users\Admin\AppData\Local\Temp\1010763001\15caa1a87c.exe
                          "C:\Users\Admin\AppData\Local\Temp\1010763001\15caa1a87c.exe"
                          4⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2060
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:3736
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 1320
                        3⤵
                        • Program crash
                        PID:4904
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 1348
                        3⤵
                        • Program crash
                        PID:2952
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3736 -ip 3736
                    1⤵
                      PID:4524
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3736 -ip 3736
                      1⤵
                        PID:4440
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3312
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5240

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json

                        Filesize

                        19KB

                        MD5

                        59b18c72d4da3885b239c3d04e0d919d

                        SHA1

                        3ac11c04876e23c54252d5aa51277f67bbb2fe3c

                        SHA256

                        7312679d28d7c8ef1131f895bab853b42eb57bd5bcb7a5b549b36352e765e691

                        SHA512

                        9923e3ec1f32ac66f945adcd0f38da104a8f6d9801588afa735afbad3d34035eb39c0f04472e2118e8f3c90a249917311d7c0d10594f243ab6717fb4164cc79c

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                        Filesize

                        13KB

                        MD5

                        900dd4c515bfe33edd596d65fb856a17

                        SHA1

                        aa7d39c066234495940287a05c672649a059a248

                        SHA256

                        8695317dab19421339c8c2d3020c56ac151cdc6e2e6061d24c7b0b485d5126a3

                        SHA512

                        eca85197164ebed1ae69968458ac187b5c31e1deb3bbd7680330b631c3d4fe7cc82181cc22cd062c059d55a1cdac1a496a8c39e8ca0502d9513d1057771068cc

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                        Filesize

                        13KB

                        MD5

                        f520964043e5cab29544fa21f1273591

                        SHA1

                        0b2381f3e84225ef67a4eca5f42c2bc58306cc83

                        SHA256

                        65d110c92e53788de9e56cbe33536b5530cbda314190ff837e1fb2d8f502d6a4

                        SHA512

                        bf71c14095e8df2d27aede7c6b82f2fbf987d6102548b676a302ec1d6e5b44ee5af5b5ad475ec1680fc061b6e746ba370a40bb55c386bf7575a0aed01df1d60e

                      • C:\Users\Admin\AppData\Local\Temp\1010753001\WqtakkK.exe

                        Filesize

                        5.3MB

                        MD5

                        30a8bfc34575ec41e0c2cd9306d47e2b

                        SHA1

                        53fd06385e7ef53308c8e8a6c127675531e01f7a

                        SHA256

                        01edf2c34309e30754e4731c7d00375c536cee1a51c5666a54085029347b9542

                        SHA512

                        69d9da40744c8bff5bb363467d0c48141624f450df36639ca2c49e3d104041e632a00c01b19769b000d627d37dd521cf87f629d69cee236e11d28e1113ae4fd5

                      • C:\Users\Admin\AppData\Local\Temp\1010758001\037f01bc28.exe

                        Filesize

                        4.2MB

                        MD5

                        6610b85f35e0e905ae4aa5796bdd74d3

                        SHA1

                        c6ec77fd3cc44a63cf15004226f9727531aac130

                        SHA256

                        f79d418541986b8ede0f71551d75782cb1f02ebf06c3508d35649ecd569f88e1

                        SHA512

                        12788928ab6c02de567cfa2d86e120cae45ed16694f640327df21c6acd4c500a7b14875d6fdd001c0c12cd8de89af335d4224e936bb2b229117afc3c5709f199

                      • C:\Users\Admin\AppData\Local\Temp\1010759001\ce5459a8a6.exe

                        Filesize

                        4.2MB

                        MD5

                        0b71a02caf459de57403643dd8ce0f4c

                        SHA1

                        1e14dbdc9c6b5127344726b1e187e519153d93e8

                        SHA256

                        58230b6c55117274a65a5c494d72306be6ad9c1e16053628f976a88c43925bad

                        SHA512

                        751dbbf975344306244f679107531bd508b2cad5fd3a12930470e74c8387069407a88245b8e011336674a98aebaf762460bf6f5020fcf3e33a1ba6338223e806

                      • C:\Users\Admin\AppData\Local\Temp\1010760001\c2fe383603.exe

                        Filesize

                        1.7MB

                        MD5

                        1d0451e5d4d4d6003480dc9746e6542a

                        SHA1

                        c12efb8c7765ca90b8ffbfa3cdb14d3830104e8e

                        SHA256

                        31c434fa385f0e012b82c47e667bd6843524a53a5a73a4ec881d42ecc450ac26

                        SHA512

                        9c9f5864017c78fc33c204e1f4f273864bd96491acd8f242e127ca757f7940d9a6cba72ee9e675f2ed03e5ce013696a6b1c14a95c8fa4f5082007de3a34c7356

                      • C:\Users\Admin\AppData\Local\Temp\1010761001\96136ef23d.exe

                        Filesize

                        1.7MB

                        MD5

                        c265223caa20a6255a1559cd8f8f8575

                        SHA1

                        6d5ec5ea84cf2d09a01cfcfcc16cdebaeafeb830

                        SHA256

                        e98c82b31e39c3c13f4a53047f253e3106b9e1f2505349aa908edd7ed4ed6d5c

                        SHA512

                        be80340f88b0f4f217d83c760c5033c04c1addb5058895ef28d2068cf446ecf671f042bdfb090a86c7ec778bdb3966558e08d994a751c9443daf036ea7ffb054

                      • C:\Users\Admin\AppData\Local\Temp\1010762001\85b0f4a6b2.exe

                        Filesize

                        900KB

                        MD5

                        28375e313d6722ad38dbf09bf174dead

                        SHA1

                        1bcf10fa07b69a48d8763144749a4238c4ab79bb

                        SHA256

                        145f51b753edd265d3d14aa6055389ed0b9d0687e69b04630d15d29bc0044ce7

                        SHA512

                        676f56a670b3a8c1edc12190de69f3f5d2c5df0f046d722eaa11d670bea90b7d7340b18b075c6d2816b13e1cfd3dea9c81464c2d1bee67736269bf2dcc4ca52b

                      • C:\Users\Admin\AppData\Local\Temp\1010763001\15caa1a87c.exe

                        Filesize

                        2.6MB

                        MD5

                        54f0e8c533c3906a79d6cf9f396b8733

                        SHA1

                        48d3eedad2e291b0094ee442bdd1cf43b758dd6d

                        SHA256

                        9fc5435d172e3ee9af173f68712e52d22b91a59c9c0fd55aae9762706f274411

                        SHA512

                        095615ce99ab6ff2046d95a917d4f9266a3963273c464504a15046e729099ab5251c7dfffe728a17d9448f3da517bb127fe17e749daa462575fce6a900f5c40d

                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                        Filesize

                        1.8MB

                        MD5

                        83c6178fb84fe7cb7b907b7538adf183

                        SHA1

                        a4f726accdca9ae01a1cd7f18a2d7061dd30caf1

                        SHA256

                        14df41fc65584367f11a4b221e2ecc7414639449fafd05692f82c47f19c3422a

                        SHA512

                        e3e686cdb8c59adef54788e9f46f0c7516b57aca88ed288376f28d0eb0f25ead37d886f6aa18988c631f4d636e368af1a014c0a97365f773946ba55c59cfa687

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                        Filesize

                        479KB

                        MD5

                        09372174e83dbbf696ee732fd2e875bb

                        SHA1

                        ba360186ba650a769f9303f48b7200fb5eaccee1

                        SHA256

                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                        SHA512

                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                        Filesize

                        13.8MB

                        MD5

                        0a8747a2ac9ac08ae9508f36c6d75692

                        SHA1

                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                        SHA256

                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                        SHA512

                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                        Filesize

                        6KB

                        MD5

                        37a10fd2f8f463632641e436fc238d77

                        SHA1

                        b69abc4b7cd1a29885e8aee176421a6c11cd845a

                        SHA256

                        0d4e428719d7f7ad76630242b67481d074f672573b9ed1cd0b17b7fb7b24e322

                        SHA512

                        e16d8065cabf12515c74705e3829c184a0c06be6e28eccf98491a0223814787ecdc02f6fe5428204f4f547fa0d9f71bfd5afe5180501d57c74b4a7b60e7e6300

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                        Filesize

                        10KB

                        MD5

                        72fd9ae86debaeafa1af4cab84794dae

                        SHA1

                        c3e47ff65e9d9e27c1a52402b652e7c9aa27766e

                        SHA256

                        6b33f7d6dedb2cec05e10d3e47e58d60c732f40f6ff7af7edf9abecdd30b9100

                        SHA512

                        4e5456fc93e156e6d242a2952803cbc5720579cc31126b040ea38426e7407ebb317157a2400098d698fd9db0b6cad36c742225ca2d9d85f45a362f82a620615f

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        15KB

                        MD5

                        263eee23d5bf0246dbe9a67a8a98c32a

                        SHA1

                        e09705d5970f77981081053e2fde2eebcdbce499

                        SHA256

                        aab79531c732e7c6fbca62be0186d4a5427f96eb8f47ce0c697fd7206f55a2aa

                        SHA512

                        482116d3b585cef7f95d7d318869f5a229296efcf6dd9e8709208b1ef4a1affaee11e929e2967f74831e8a24f725a9f62cc58df309b2d55f866f8027fc5989dc

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        15KB

                        MD5

                        b87b9bc90622e1fa436c5faa2375db40

                        SHA1

                        59ecef2771618502e2d44dbed22d4220ff6f828c

                        SHA256

                        dab1577caabe9052eaf62666aa05ff07108fde65c918b6b6f49a8cc112d88c1e

                        SHA512

                        dd0a8a28b46ad0ab511faef7da0d75959bf37c6a38ef9d7001907c2af9c8e0258dd0a234b18ccb44f5c4a042e25e1701e9839e5622f2a0f4d235b40236a5746e

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        5KB

                        MD5

                        6931e6f7349ff50209380dc6dd7b5ba4

                        SHA1

                        2241d9fcd07fbf02af0befc2d040751ce188c3ba

                        SHA256

                        d712acd0df1f8792d093f2a84f86ccac991466e59e37eaac78802d74214c3d8d

                        SHA512

                        e8ff5b50158aeaaec3db8227ac609ff6a7e94ab2ef7fba664b22770fb98ca7d581a4e52a609c343bdab8deaaed859bc301a3705d2ceca16f082c506d784557b2

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\3607a06d-a152-4314-98b3-d6fd6a91f129

                        Filesize

                        27KB

                        MD5

                        6a2831a06bf354d6e99e856b5fc8692e

                        SHA1

                        cff120438577466d442270a6e177bf8f24a89e1c

                        SHA256

                        df864269ff8d8eac9b23bb6c62a70ce11f66eba97cba36d7131a12af3822a756

                        SHA512

                        339ab1461528f3ae058a869e834381ab9d1b94e9efcd6b10880d29ed0886cd90d16358d8f33757eeeebc10fb3472513279a14cd998c1428d4cfbcec4a16a8da4

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\5c4c917c-ac8c-4975-91cc-5f99cfaa7119

                        Filesize

                        671B

                        MD5

                        ed95f11d41067fd069d4c479d1c5e650

                        SHA1

                        e2d2c21bd732b74c5d9f4eb29aeb8ed4332b1267

                        SHA256

                        66e2f4479bdc15d3ba94427005f306ddfdb87ddf707076d805cc19ab8c4b981b

                        SHA512

                        b16615709224fe3e4f91c409ba3e91dbadebe1dd3c28383bcd8fade0fcde8c41b1397958dd4eb541cc0ddcd1a3ec47eae2982ee656afdf1a588ff095694cf947

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\dfb63761-6735-47fe-9887-b1e8224fe2d5

                        Filesize

                        982B

                        MD5

                        55bd05d0ab2e684d0777e8a0813f6f18

                        SHA1

                        e1180f7e114e5767eb1fcf7aced025177fb91bd6

                        SHA256

                        d6a73e0c0a9e299d060c9d884c718c7f37bdde68baf3b0fcccb6c1ee9f1f3124

                        SHA512

                        30b38b7334328640db8983b210b6da959676391ca75c53b7068cf005b130824f4591c06d63b76bb4ba8a5fe3189233f2c077aca1a34b1b09b37d71cb9e25d247

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                        Filesize

                        1.1MB

                        MD5

                        842039753bf41fa5e11b3a1383061a87

                        SHA1

                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                        SHA256

                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                        SHA512

                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                        Filesize

                        116B

                        MD5

                        2a461e9eb87fd1955cea740a3444ee7a

                        SHA1

                        b10755914c713f5a4677494dbe8a686ed458c3c5

                        SHA256

                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                        SHA512

                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                        Filesize

                        372B

                        MD5

                        bf957ad58b55f64219ab3f793e374316

                        SHA1

                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                        SHA256

                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                        SHA512

                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                        Filesize

                        17.8MB

                        MD5

                        daf7ef3acccab478aaa7d6dc1c60f865

                        SHA1

                        f8246162b97ce4a945feced27b6ea114366ff2ad

                        SHA256

                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                        SHA512

                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                        Filesize

                        12KB

                        MD5

                        2fd2d23fed4dfbd3dd4ed52fd5e3d5e7

                        SHA1

                        a13bce6398226f9b760c78ab69e6aee00690055e

                        SHA256

                        5faf3c4a65b7d726042fa25fe0d0f1aff53cf5c4f38af61dac8c1bda0c83aead

                        SHA512

                        aaecd63693c017d5b4c20b08d5441340465765e4dd1dfac8bd9749d6b84856243acef9a8cb69ef012a6c847c99c8343b3aea76952175ba5bd1e344ea59853860

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                        Filesize

                        15KB

                        MD5

                        6ef5f88af4463ecd680ef3540a144172

                        SHA1

                        54c2bd2fd0c1d6d013535b7c4149eaab8621d9c2

                        SHA256

                        81d2ee5e8e6a6d0a498b313182a751d0472a38df497addb24f4d7eb10401961c

                        SHA512

                        f73781d3debf109124a03092a989af32fa2b9d8c0cce65991ac9d04eca7a328b96b3c9637a9481c9351c117642932443be1787f3b33038860625a83201833a85

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                        Filesize

                        10KB

                        MD5

                        b95a73700a52c8ed0717e8c1d82326f1

                        SHA1

                        e8f88ef51837856ac9bf2b64a4d3b00844fb0052

                        SHA256

                        c00df0e32276e02c55f0f447ed4a3c7c0bf5ab03e9c2d1740e541e74ef92d4d0

                        SHA512

                        ba1232213fbd17c387f2c1d944f3ebe548d6046bcdf881c0dbe1ef7c78979f2d8541a4c0feb7a126582c4fb6c5d89dd640cb7a281960c4e18e619a155d4823ee

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                        Filesize

                        10KB

                        MD5

                        105cfaa58f0769ce828a9c207f4ba473

                        SHA1

                        df4720d842541a0494b07e08516be924b8e53695

                        SHA256

                        ac7a1699c27793edfc28de3127fa82d2c5bff3b1ffaf8baecd5a5614193937a5

                        SHA512

                        ff77d80c46e4e167cbf4e016803c42fd77e1f70e143d754c533d16ac2a0bd43e2c5db13823c5f9c25f806af48e4817349fe4f4cfde47b5a568b0d73f2afd9f7d

                      • memory/1680-0-0x0000000000480000-0x000000000092F000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1680-2-0x0000000000481000-0x00000000004AF000-memory.dmp

                        Filesize

                        184KB

                      • memory/1680-1-0x00000000777B4000-0x00000000777B6000-memory.dmp

                        Filesize

                        8KB

                      • memory/1680-3-0x0000000000480000-0x000000000092F000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1680-4-0x0000000000480000-0x000000000092F000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1680-16-0x0000000000480000-0x000000000092F000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2060-1726-0x0000000000E90000-0x000000000113C000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2060-1729-0x0000000000E90000-0x000000000113C000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2060-1707-0x0000000000E90000-0x000000000113C000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2060-1704-0x0000000000E90000-0x000000000113C000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2060-1706-0x0000000000E90000-0x000000000113C000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2728-1309-0x0000000000FE0000-0x0000000001660000-memory.dmp

                        Filesize

                        6.5MB

                      • memory/2728-1306-0x0000000000FE0000-0x0000000001660000-memory.dmp

                        Filesize

                        6.5MB

                      • memory/3312-1719-0x00000000007D0000-0x0000000000C7F000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/3312-1717-0x00000000007D0000-0x0000000000C7F000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/3416-1254-0x00000000005C0000-0x000000000124C000-memory.dmp

                        Filesize

                        12.5MB

                      • memory/3416-1251-0x00000000005C0000-0x000000000124C000-memory.dmp

                        Filesize

                        12.5MB

                      • memory/3584-111-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-91-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-55-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-53-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-51-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-87-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-75-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-63-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-1227-0x0000000005070000-0x00000000050F0000-memory.dmp

                        Filesize

                        512KB

                      • memory/3584-1228-0x00000000050F0000-0x000000000513C000-memory.dmp

                        Filesize

                        304KB

                      • memory/3584-1229-0x0000000005140000-0x0000000005194000-memory.dmp

                        Filesize

                        336KB

                      • memory/3584-61-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-65-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-67-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-69-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-44-0x00000000002C0000-0x000000000044A000-memory.dmp

                        Filesize

                        1.5MB

                      • memory/3584-71-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-45-0x00000000733CE000-0x00000000733CF000-memory.dmp

                        Filesize

                        4KB

                      • memory/3584-46-0x0000000005200000-0x00000000057A4000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/3584-47-0x0000000004D30000-0x0000000004DC2000-memory.dmp

                        Filesize

                        584KB

                      • memory/3584-73-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-77-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-79-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-81-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-83-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-85-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-89-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-57-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-93-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-95-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-97-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-99-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-101-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-103-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-105-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-109-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-107-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-59-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-50-0x0000000004E40000-0x0000000004F49000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3584-49-0x0000000004E40000-0x0000000004F4E000-memory.dmp

                        Filesize

                        1.1MB

                      • memory/3584-48-0x0000000004CE0000-0x0000000004CEA000-memory.dmp

                        Filesize

                        40KB

                      • memory/4172-1285-0x00000000009F0000-0x0000000000E73000-memory.dmp

                        Filesize

                        4.5MB

                      • memory/4172-1291-0x00000000009F0000-0x0000000000E73000-memory.dmp

                        Filesize

                        4.5MB

                      • memory/4200-20-0x00000000007D0000-0x0000000000C7F000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/4200-43-0x00000000007D0000-0x0000000000C7F000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/4200-24-0x00000000007D0000-0x0000000000C7F000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/4200-22-0x00000000007D0000-0x0000000000C7F000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/4200-23-0x00000000007D0000-0x0000000000C7F000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/4200-21-0x00000000007D0000-0x0000000000C7F000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/4200-19-0x00000000007D1000-0x00000000007FF000-memory.dmp

                        Filesize

                        184KB

                      • memory/4200-18-0x00000000007D0000-0x0000000000C7F000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/4348-1270-0x0000000000790000-0x00000000013F5000-memory.dmp

                        Filesize

                        12.4MB

                      • memory/4348-1289-0x0000000000790000-0x00000000013F5000-memory.dmp

                        Filesize

                        12.4MB

                      • memory/5240-4839-0x00000000007D0000-0x0000000000C7F000-memory.dmp

                        Filesize

                        4.7MB