Analysis

  • max time kernel
    42s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 11:13

General

  • Target

    file.exe

  • Size

    2.8MB

  • MD5

    76c2f75bf3efb5964c432f7661d22d58

  • SHA1

    521badd0c5d9f85986a7845b3163b82b87c0589d

  • SHA256

    939310706200640f603a1fb3e6528c3a4bafa87e0d610e817a7824cf2e089bc7

  • SHA512

    e9462f252fdb9f4591b0b96a97cee084e88299c066b7d1d0e862bc9b78fed2e1159d91fc74fa906f0b942f36560fffda2dc49dd059e48dc309489c9047955e51

  • SSDEEP

    49152:GcUejriX8cBywn04rFnpO3vNcDmq//ICH44JTD8K6QlO:GcUejrk8cANeDO3lamggM441De

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

amadey

Version

5.12

Botnet

d5db2d

C2

http://212.193.31.8

Attributes
  • install_dir

    e458d263c0

  • install_file

    Gxtuum.exe

  • strings_key

    0e18a2a9dd22cd0f87c9fba7075c3b39

  • url_paths

    /3ofn3jf3e2ljk2/index.php

rc4.plain

Extracted

Family

xworm

C2

xclient.fahrerscheinonlineholen.de:2489

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

  • telegram

    https://api.telegram.org/bot8174428401:AAHxlGtOg4tsy0J0kYm7h8822BuHfnk8vKQ/sendMessage?chat_id=1434988227

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

hgzuiajogwnqs

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/dDuwSpUA

aes.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect Xworm Payload 3 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Async RAT payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 17 IoCs
  • Suspicious use of SendNotifyMessage 14 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Users\Admin\AppData\Local\Temp\1018586001\KDLBJP7.exe
        "C:\Users\Admin\AppData\Local\Temp\1018586001\KDLBJP7.exe"
        3⤵
        • Executes dropped EXE
        PID:1928
      • C:\Users\Admin\AppData\Local\Temp\1018676001\systemetape.exe
        "C:\Users\Admin\AppData\Local\Temp\1018676001\systemetape.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2724
      • C:\Users\Admin\AppData\Local\Temp\1018833001\WEX7mCI.exe
        "C:\Users\Admin\AppData\Local\Temp\1018833001\WEX7mCI.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1660
        • C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
          "C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:328
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\48cb35e3030a2b\clip64.dll, Main
            5⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:1744
      • C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe
        "C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:628
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1888
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'vQeyqr1.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1584
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2068
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3000
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2568
      • C:\Users\Admin\AppData\Local\Temp\1019311001\a1600af010.exe
        "C:\Users\Admin\AppData\Local\Temp\1019311001\a1600af010.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:1600
      • C:\Users\Admin\AppData\Local\Temp\1019312001\8b03cf3ea5.exe
        "C:\Users\Admin\AppData\Local\Temp\1019312001\8b03cf3ea5.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2060
      • C:\Users\Admin\AppData\Local\Temp\1019313001\5ddc9415f3.exe
        "C:\Users\Admin\AppData\Local\Temp\1019313001\5ddc9415f3.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1152
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:848
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1536
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:916
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1048
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2532
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
            PID:108
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
              5⤵
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:2344
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2344.0.1043321534\800340645" -parentBuildID 20221007134813 -prefsHandle 1244 -prefMapHandle 1236 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c55085d9-2356-4155-be7d-328c174f77c9} 2344 "\\.\pipe\gecko-crash-server-pipe.2344" 1332 106d6b58 gpu
                6⤵
                  PID:2524
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2344.1.1037602703\696430570" -parentBuildID 20221007134813 -prefsHandle 1536 -prefMapHandle 1532 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8398a1a4-76a3-40fc-93b0-d44b8fab8c74} 2344 "\\.\pipe\gecko-crash-server-pipe.2344" 1548 f4eb558 socket
                  6⤵
                    PID:2736
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2344.2.2042377034\1997423445" -childID 1 -isForBrowser -prefsHandle 1968 -prefMapHandle 1964 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {74a3c62b-472c-427e-9394-e9d88021ddd8} 2344 "\\.\pipe\gecko-crash-server-pipe.2344" 2000 1065f158 tab
                    6⤵
                      PID:2096
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2344.3.1321080278\570791553" -childID 2 -isForBrowser -prefsHandle 2620 -prefMapHandle 2616 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1e82ba24-54f2-4e64-ab64-58395b60f50c} 2344 "\\.\pipe\gecko-crash-server-pipe.2344" 2636 e5fc58 tab
                      6⤵
                        PID:1256
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2344.4.338108986\1260960734" -childID 3 -isForBrowser -prefsHandle 3648 -prefMapHandle 3624 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1694d244-1fce-4ed2-978c-a276a50a2472} 2344 "\\.\pipe\gecko-crash-server-pipe.2344" 3660 1ecf8e58 tab
                        6⤵
                          PID:3364
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2344.5.1469247502\417249430" -childID 4 -isForBrowser -prefsHandle 3784 -prefMapHandle 3788 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d584064b-0eeb-4369-8c0e-68f3d3aaacb4} 2344 "\\.\pipe\gecko-crash-server-pipe.2344" 3776 1ecfa658 tab
                          6⤵
                            PID:3372
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2344.6.1944299746\1748047627" -childID 5 -isForBrowser -prefsHandle 3932 -prefMapHandle 3936 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3c133c0-9e03-4b46-a87b-3d120449a62a} 2344 "\\.\pipe\gecko-crash-server-pipe.2344" 3692 1ecfac58 tab
                            6⤵
                              PID:3408
                      • C:\Users\Admin\AppData\Local\Temp\1019314001\397181413d.exe
                        "C:\Users\Admin\AppData\Local\Temp\1019314001\397181413d.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1716
                      • C:\Users\Admin\AppData\Local\Temp\1019315001\6d676c83a2.exe
                        "C:\Users\Admin\AppData\Local\Temp\1019315001\6d676c83a2.exe"
                        3⤵
                          PID:964

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                      Filesize

                      15KB

                      MD5

                      96c542dec016d9ec1ecc4dddfcbaac66

                      SHA1

                      6199f7648bb744efa58acf7b96fee85d938389e4

                      SHA256

                      7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                      SHA512

                      cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                    • C:\Users\Admin\AppData\Local\Temp\1018586001\KDLBJP7.exe

                      Filesize

                      2.5MB

                      MD5

                      87330f1877c33a5a6203c49075223b16

                      SHA1

                      55b64ee8b2d1302581ab1978e9588191e4e62f81

                      SHA256

                      98f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0

                      SHA512

                      7c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f

                    • C:\Users\Admin\AppData\Local\Temp\1018676001\systemetape.exe

                      Filesize

                      1.2MB

                      MD5

                      545b933cac5def6ec43ca2cb6eac9d8e

                      SHA1

                      f2740a1062032cc280d54c4cfe6a1ff3c6ce1c76

                      SHA256

                      efce8cc629bb9f443613c7ec97b65020b514b9ee497d472ef24fed21bceb86c4

                      SHA512

                      f4853f10933edbf7df0ca6138bb423e5dfb18cf6431068a776a0c53ea226f176d263b9514066b88861360b161ba922b618f306f1936a95e1071fc70926418caa

                    • C:\Users\Admin\AppData\Local\Temp\1018833001\WEX7mCI.exe

                      Filesize

                      429KB

                      MD5

                      51ff79b406cb223dd49dd4c947ec97b0

                      SHA1

                      b9b0253480a1b6cbdd673383320fecae5efb3dce

                      SHA256

                      2e3a5dfa44d59681a60d78b8b08a1af3878d8e270c02d7e31a0876a85eb42a7e

                      SHA512

                      c2b8d15b0dc1b0846f39ce007be2deb41d5b6ae76af90d618f29da8691ed987c42f3c270f0ea7f4d10cbd2d3877118f4133803c9c965b6ff236ff8cfafd9367c

                    • C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe

                      Filesize

                      88KB

                      MD5

                      07e410214a2aeb8f577e407154252f3c

                      SHA1

                      697fac558b66c0476c3f04d80764fa75eb6de77d

                      SHA256

                      12e340e551abbf8a61a6dd73d45c94e88aa217ceae070ba0748360d24c706114

                      SHA512

                      470b208122d6177e4635038418e4966a63725c7f9b21b4d41f3c89b953bae9a23e141424b358110de3a8d1624c125224a7471bb44ef7039c313d03e844a20ecc

                    • C:\Users\Admin\AppData\Local\Temp\1019311001\a1600af010.exe

                      Filesize

                      1.8MB

                      MD5

                      3a57d7b29d649f2cff4dad5fb12e3db8

                      SHA1

                      fe28c4f877d653121be505f83e68c8471d0880d3

                      SHA256

                      60206d6ebc7b429c88c0c176a1a65951d986aa7702ca469a08c2f04579801c8e

                      SHA512

                      1ce68b9ba62dd54d99c1454e160d42dad4afefc7c46a63696a76f4359159be31d64ee2f1f622e68c64024c728ed3d919ae0c65c82f09ab3cf48ca8d16dc6b6ac

                    • C:\Users\Admin\AppData\Local\Temp\1019312001\8b03cf3ea5.exe

                      Filesize

                      2.7MB

                      MD5

                      9e1a015a00b2699812aedac1ea4e6060

                      SHA1

                      d3236de3ec97a7cbe724aa5de47ab27ac72f5bdc

                      SHA256

                      fad1e054eb8f33990d2a36b413323688a60c36eeb7cd1c6816de7160d827ff4c

                      SHA512

                      086add1bcf765419313e1aaf57fe5fd117bff6295e662da04803ea0ed50756aaada1ffa529a818ff4fdcf07c3c4801d5608143a3c5b48135fa3a670704c9a079

                    • C:\Users\Admin\AppData\Local\Temp\1019313001\5ddc9415f3.exe

                      Filesize

                      950KB

                      MD5

                      ff65cdcec1a74a811b7d5eff45eac5a7

                      SHA1

                      7d3aa480ff46f8d967b1e53e4043118dcdafe40b

                      SHA256

                      db3a6696ac07c977613a2c6fa7d94c08fc9e7020c8e16370da31a6f4bbbc7702

                      SHA512

                      fbed023e71596510609fdf6565f0c618d3fc6daf3256dc460b7e35cafc09d3f9648421876864e0f5681c4b17b9d1cf3ae10c755626a142d8dcad408508b72539

                    • C:\Users\Admin\AppData\Local\Temp\1019314001\397181413d.exe

                      Filesize

                      2.7MB

                      MD5

                      52af280ee5567af82852e91966b07fb6

                      SHA1

                      a4185834bebf39b2c49015118ce3ff951abcf458

                      SHA256

                      f7aeb1deb13256554ea4dfd702ccbbadff4ff20c72aa594d741c9b5238c1c024

                      SHA512

                      a85a125ec61509c4de344cc6785780a3a75646666df0490e308cccd521b80c559d3b832c3ecd2aea49256e051aa76d05fa1b8784e0a70527a666d3b28efe6500

                    • C:\Users\Admin\AppData\Local\Temp\1019315001\6d676c83a2.exe

                      Filesize

                      4.2MB

                      MD5

                      3a425626cbd40345f5b8dddd6b2b9efa

                      SHA1

                      7b50e108e293e54c15dce816552356f424eea97a

                      SHA256

                      ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                      SHA512

                      a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                    • C:\Users\Admin\AppData\Local\Temp\Cab3758.tmp

                      Filesize

                      70KB

                      MD5

                      49aebf8cbd62d92ac215b2923fb1b9f5

                      SHA1

                      1723be06719828dda65ad804298d0431f6aff976

                      SHA256

                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                      SHA512

                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                    • C:\Users\Admin\AppData\Local\Temp\Tar37E7.tmp

                      Filesize

                      181KB

                      MD5

                      4ea6026cf93ec6338144661bf1202cd1

                      SHA1

                      a1dec9044f750ad887935a01430bf49322fbdcb7

                      SHA256

                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                      SHA512

                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                      Filesize

                      2.8MB

                      MD5

                      76c2f75bf3efb5964c432f7661d22d58

                      SHA1

                      521badd0c5d9f85986a7845b3163b82b87c0589d

                      SHA256

                      939310706200640f603a1fb3e6528c3a4bafa87e0d610e817a7824cf2e089bc7

                      SHA512

                      e9462f252fdb9f4591b0b96a97cee084e88299c066b7d1d0e862bc9b78fed2e1159d91fc74fa906f0b942f36560fffda2dc49dd059e48dc309489c9047955e51

                    • C:\Users\Admin\AppData\Roaming\48cb35e3030a2b\clip64.dll

                      Filesize

                      124KB

                      MD5

                      7fe5b933ed9391ea24647479c80e904e

                      SHA1

                      963721e46b8056e2e883c598e95d7daa7bdf8d9b

                      SHA256

                      2e12355cb9b11c923dc06f195399d678bc46680e982856d9405f64e7563fe8b3

                      SHA512

                      82d92d0c5155fff5ce97099cb9e78422ff328e0c516fbab7634e624215366c2191ec6ff6fe8d939268275c6770accb208af7ac69c3cc13c9188a49ef41339bb0

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UB99F4T8FQ9511TWOX05.temp

                      Filesize

                      7KB

                      MD5

                      49407d557857065b3055dba4c3a5b4c3

                      SHA1

                      7c936563739d867d8ced8292e628bedfea1c8dc5

                      SHA256

                      43ad91149ce3e247d19e45198c6fd2bed14ab8831d46f04f87223da7e1131a0a

                      SHA512

                      29319efa9455c2a85e4b7619d0f7deb385d19a0294c955a8f3e2e0db4ecd1b6e1ab3ca99d429740b46f940c5795abf7f5279dc7e72296072adb5354e67e3b25c

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      2KB

                      MD5

                      2db14f61ce467eae55f06cdc8c8d2ac6

                      SHA1

                      8df3aff3b59da880c4c7e16bb5ff4b06bd3e33c9

                      SHA256

                      7e9eb7e9a0fc7ed44e4bf999f0bcc5ee804067711ac81cd3ead046d5b11aed66

                      SHA512

                      b8406875b6ffaf0c745e415f34b2c38025065825c7b56a71e70f38616c1e64bcb3345bafc74aa95d6d9cecb58af8b255fe0984369791ad107d95198a9b12003e

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\1802e5e4-52da-4c7c-83f0-0b1fc82e01e4

                      Filesize

                      11KB

                      MD5

                      5b3b630bd12761fd934dd23861ce70d6

                      SHA1

                      0696092463419f57bf076614a4bee8922343adb1

                      SHA256

                      5a6991c3376ac22baa89cd833bda2a01bb33554b9bd4981b9085cf4f74d32c3e

                      SHA512

                      4ace4c65cab3f6b8d469f6ff3fae2f6bb8e6913fbc10e0c67628637c8f86da2cdd6cc7e8377af66b737f4bd759709997cae911ec18300de1f79bff10c14bbd2b

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\ce081e1b-5c7f-4f1d-90a5-7ea524efd149

                      Filesize

                      745B

                      MD5

                      fc4aad5153eff9fc138a16a1ff4f5061

                      SHA1

                      a3a71a4aa57bd6df8ad15f08a2ef5aca34ca9eb5

                      SHA256

                      ecc9cf5972b0d961aa6185f01b864aa9d5a2697193e58575bfcc7afe67926217

                      SHA512

                      ed786aec490ef07917584ad4c83de585b34f1ab016f52532a86bed97af1acb4e253af9fc2a3929770328fffa3dfb00f46202ff38cb3c3adc0731e7cadb939d92

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs-1.js

                      Filesize

                      6KB

                      MD5

                      090ca23bd8d3d1125cba947e32643200

                      SHA1

                      066ad2d2ad243d0f8aed9daf1dc94ff3bfb69423

                      SHA256

                      5f9cb8761b58f65f2fad11be75fd3ed7642d1d61beef40821efcad97174c27ad

                      SHA512

                      5f6aeddd60caf918924f402cf29f9cb0bac8bca9ef8f666966306f0e49f4a264ecddf4f426dfebf231da81b5d76d1a704e20f4c0351262035e45a50586e3897b

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs.js

                      Filesize

                      6KB

                      MD5

                      b5ca49c840bff1c53d72dda05f574a93

                      SHA1

                      42ec734e1d1dfed4c41c752ce9b8dedb587bc6b3

                      SHA256

                      7c898c284f5ae6d3359062611a40f7efc513f3da1989c4b313d295afcb056c46

                      SHA512

                      42bc4394c8bb0ab146f85500cf6a178867c27b3c44d9a504d4d2772639d097e22427c9fe88655c084a58515f533126b43f6d433e5670f95dfaea6dc3da706d18

                    • memory/628-1275-0x0000000000360000-0x000000000037C000-memory.dmp

                      Filesize

                      112KB

                    • memory/628-1592-0x000000001A810000-0x000000001A828000-memory.dmp

                      Filesize

                      96KB

                    • memory/628-1597-0x000000001A8B0000-0x000000001A8CC000-memory.dmp

                      Filesize

                      112KB

                    • memory/1584-1310-0x0000000002790000-0x0000000002798000-memory.dmp

                      Filesize

                      32KB

                    • memory/1584-1309-0x000000001B690000-0x000000001B972000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/1600-1402-0x0000000001000000-0x00000000014A4000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1600-1302-0x0000000001000000-0x00000000014A4000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1600-1351-0x0000000001000000-0x00000000014A4000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1716-1449-0x0000000001190000-0x0000000001454000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/1716-1447-0x0000000001190000-0x0000000001454000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/1716-1448-0x0000000001190000-0x0000000001454000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/1872-0-0x00000000010D0000-0x00000000013E3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/1872-5-0x00000000010D0000-0x00000000013E3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/1872-4-0x00000000010D0000-0x00000000013E3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/1872-16-0x00000000010D0000-0x00000000013E3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/1872-3-0x00000000010D0000-0x00000000013E3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/1872-2-0x00000000010D1000-0x00000000010FF000-memory.dmp

                      Filesize

                      184KB

                    • memory/1872-1-0x0000000077240000-0x0000000077242000-memory.dmp

                      Filesize

                      8KB

                    • memory/1888-1298-0x000000001B720000-0x000000001BA02000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/1888-1300-0x00000000026E0000-0x00000000026E8000-memory.dmp

                      Filesize

                      32KB

                    • memory/1928-1295-0x0000000000130000-0x0000000000230000-memory.dmp

                      Filesize

                      1024KB

                    • memory/1928-41-0x0000000000130000-0x0000000000230000-memory.dmp

                      Filesize

                      1024KB

                    • memory/2060-1347-0x0000000000B70000-0x0000000001063000-memory.dmp

                      Filesize

                      4.9MB

                    • memory/2060-1349-0x0000000000B70000-0x0000000001063000-memory.dmp

                      Filesize

                      4.9MB

                    • memory/2724-67-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-58-0x0000000001340000-0x0000000001474000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2724-73-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-71-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-69-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-77-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-65-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-63-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-61-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-60-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-79-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-1251-0x0000000000A60000-0x0000000000AAC000-memory.dmp

                      Filesize

                      304KB

                    • memory/2724-1250-0x0000000001280000-0x000000000130A000-memory.dmp

                      Filesize

                      552KB

                    • memory/2724-81-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-83-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-85-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-87-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-115-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-89-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-59-0x0000000004B60000-0x0000000004C78000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-91-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-93-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-95-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-97-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-99-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-101-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-103-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-75-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-121-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-119-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-105-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-117-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-107-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-109-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-111-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2724-113-0x0000000004B60000-0x0000000004C73000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2868-1343-0x00000000066B0000-0x0000000006BA3000-memory.dmp

                      Filesize

                      4.9MB

                    • memory/2868-1346-0x00000000066B0000-0x0000000006B54000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2868-1344-0x00000000066B0000-0x0000000006BA3000-memory.dmp

                      Filesize

                      4.9MB

                    • memory/2868-1418-0x00000000066B0000-0x0000000006BA3000-memory.dmp

                      Filesize

                      4.9MB

                    • memory/2868-1345-0x00000000066B0000-0x0000000006B54000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2868-1444-0x00000000066B0000-0x0000000006974000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/2868-1297-0x00000000066B0000-0x0000000006B54000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2868-1446-0x00000000066B0000-0x0000000006974000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/2868-1299-0x00000000066B0000-0x0000000006B54000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2868-43-0x0000000000F40000-0x0000000001253000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2868-42-0x0000000000F40000-0x0000000001253000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2868-40-0x0000000000F40000-0x0000000001253000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2868-24-0x0000000000F40000-0x0000000001253000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2868-23-0x0000000000F40000-0x0000000001253000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2868-21-0x0000000000F40000-0x0000000001253000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2868-22-0x0000000000F40000-0x0000000001253000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2868-19-0x0000000000F40000-0x0000000001253000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2868-18-0x0000000000F40000-0x0000000001253000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2868-17-0x0000000000F40000-0x0000000001253000-memory.dmp

                      Filesize

                      3.1MB