Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2024, 03:02
Static task
static1
General
-
Target
1b7da4409b7936bdb02e213a8c31642f59738604f673c3725fe14597ce0423b9.exe
-
Size
6.0MB
-
MD5
b821c29918dec77b5a3da73d613bb833
-
SHA1
fc5916883c3d0622e1cd546d1e05c221a4df331f
-
SHA256
1b7da4409b7936bdb02e213a8c31642f59738604f673c3725fe14597ce0423b9
-
SHA512
5256519b959c5f541622c0136ded2a261f60fe80cb6366cdf35a4db165bf441a2e7f529a598a927ae36c28b20b78c8602b3389730e99d69eed8d941721d2280a
-
SSDEEP
98304:XdBMpxqdqBTrP3sjv8rrDk2a4i3K0pwskECQi97YqVPEi3axcxSF/P1r8a2Lz6U8:XdGY6Tr//f4nTwsk90qVciKKSW6
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8d776ac4ee.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 8d776ac4ee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8d776ac4ee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8d776ac4ee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8d776ac4ee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8d776ac4ee.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2w4515.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d3aa356448.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ daa059a175.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1o75e9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3Z45b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8d776ac4ee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8d776ac4ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1o75e9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2w4515.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d3aa356448.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3Z45b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1o75e9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d3aa356448.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3Z45b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2w4515.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion daa059a175.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion daa059a175.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8d776ac4ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 1o75e9.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 12 IoCs
pid Process 5064 z3c95.exe 3488 Y4e01.exe 4476 1o75e9.exe 5108 skotes.exe 3744 2w4515.exe 2404 d3aa356448.exe 4940 daa059a175.exe 1112 8d776ac4ee.exe 2444 skotes.exe 1616 3Z45b.exe 4952 4J955a.exe 7148 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 1o75e9.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 3Z45b.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 2w4515.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine d3aa356448.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine daa059a175.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 8d776ac4ee.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8d776ac4ee.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 8d776ac4ee.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daa059a175.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004512001\\daa059a175.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8d776ac4ee.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004514001\\8d776ac4ee.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1b7da4409b7936bdb02e213a8c31642f59738604f673c3725fe14597ce0423b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z3c95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Y4e01.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d3aa356448.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004511001\\d3aa356448.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000023b83-125.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4476 1o75e9.exe 5108 skotes.exe 3744 2w4515.exe 2404 d3aa356448.exe 4940 daa059a175.exe 1112 8d776ac4ee.exe 2444 skotes.exe 1616 3Z45b.exe 7148 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1o75e9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 3980 3744 WerFault.exe 90 372 3744 WerFault.exe 90 4264 2404 WerFault.exe 103 2692 2404 WerFault.exe 103 4212 3744 WerFault.exe 90 1136 3744 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1o75e9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2w4515.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y4e01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3aa356448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d776ac4ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4J955a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3Z45b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b7da4409b7936bdb02e213a8c31642f59738604f673c3725fe14597ce0423b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z3c95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daa059a175.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 640 taskkill.exe 2700 taskkill.exe 5028 taskkill.exe 5056 taskkill.exe 4252 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4476 1o75e9.exe 4476 1o75e9.exe 5108 skotes.exe 5108 skotes.exe 3744 2w4515.exe 3744 2w4515.exe 2404 d3aa356448.exe 2404 d3aa356448.exe 4940 daa059a175.exe 4940 daa059a175.exe 1112 8d776ac4ee.exe 1112 8d776ac4ee.exe 1112 8d776ac4ee.exe 1112 8d776ac4ee.exe 1112 8d776ac4ee.exe 2444 skotes.exe 2444 skotes.exe 1616 3Z45b.exe 1616 3Z45b.exe 4952 4J955a.exe 4952 4J955a.exe 4952 4J955a.exe 4952 4J955a.exe 7148 skotes.exe 7148 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1112 8d776ac4ee.exe Token: SeDebugPrivilege 2700 taskkill.exe Token: SeDebugPrivilege 5028 taskkill.exe Token: SeDebugPrivilege 5056 taskkill.exe Token: SeDebugPrivilege 4252 taskkill.exe Token: SeDebugPrivilege 640 taskkill.exe Token: SeDebugPrivilege 4356 firefox.exe Token: SeDebugPrivilege 4356 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4476 1o75e9.exe 4952 4J955a.exe 4952 4J955a.exe 4952 4J955a.exe 4952 4J955a.exe 4952 4J955a.exe 4952 4J955a.exe 4952 4J955a.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4952 4J955a.exe 4952 4J955a.exe 4952 4J955a.exe 4952 4J955a.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4952 4J955a.exe 4952 4J955a.exe 4952 4J955a.exe 4952 4J955a.exe 4952 4J955a.exe 4952 4J955a.exe 4952 4J955a.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4356 firefox.exe 4952 4J955a.exe 4952 4J955a.exe 4952 4J955a.exe 4952 4J955a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4356 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3116 wrote to memory of 5064 3116 1b7da4409b7936bdb02e213a8c31642f59738604f673c3725fe14597ce0423b9.exe 84 PID 3116 wrote to memory of 5064 3116 1b7da4409b7936bdb02e213a8c31642f59738604f673c3725fe14597ce0423b9.exe 84 PID 3116 wrote to memory of 5064 3116 1b7da4409b7936bdb02e213a8c31642f59738604f673c3725fe14597ce0423b9.exe 84 PID 5064 wrote to memory of 3488 5064 z3c95.exe 86 PID 5064 wrote to memory of 3488 5064 z3c95.exe 86 PID 5064 wrote to memory of 3488 5064 z3c95.exe 86 PID 3488 wrote to memory of 4476 3488 Y4e01.exe 87 PID 3488 wrote to memory of 4476 3488 Y4e01.exe 87 PID 3488 wrote to memory of 4476 3488 Y4e01.exe 87 PID 4476 wrote to memory of 5108 4476 1o75e9.exe 89 PID 4476 wrote to memory of 5108 4476 1o75e9.exe 89 PID 4476 wrote to memory of 5108 4476 1o75e9.exe 89 PID 3488 wrote to memory of 3744 3488 Y4e01.exe 90 PID 3488 wrote to memory of 3744 3488 Y4e01.exe 90 PID 3488 wrote to memory of 3744 3488 Y4e01.exe 90 PID 5108 wrote to memory of 2404 5108 skotes.exe 103 PID 5108 wrote to memory of 2404 5108 skotes.exe 103 PID 5108 wrote to memory of 2404 5108 skotes.exe 103 PID 5108 wrote to memory of 4940 5108 skotes.exe 113 PID 5108 wrote to memory of 4940 5108 skotes.exe 113 PID 5108 wrote to memory of 4940 5108 skotes.exe 113 PID 5108 wrote to memory of 4848 5108 skotes.exe 114 PID 5108 wrote to memory of 4848 5108 skotes.exe 114 PID 5108 wrote to memory of 4848 5108 skotes.exe 114 PID 5108 wrote to memory of 1112 5108 skotes.exe 115 PID 5108 wrote to memory of 1112 5108 skotes.exe 115 PID 5108 wrote to memory of 1112 5108 skotes.exe 115 PID 5064 wrote to memory of 1616 5064 z3c95.exe 125 PID 5064 wrote to memory of 1616 5064 z3c95.exe 125 PID 5064 wrote to memory of 1616 5064 z3c95.exe 125 PID 3116 wrote to memory of 4952 3116 1b7da4409b7936bdb02e213a8c31642f59738604f673c3725fe14597ce0423b9.exe 126 PID 3116 wrote to memory of 4952 3116 1b7da4409b7936bdb02e213a8c31642f59738604f673c3725fe14597ce0423b9.exe 126 PID 3116 wrote to memory of 4952 3116 1b7da4409b7936bdb02e213a8c31642f59738604f673c3725fe14597ce0423b9.exe 126 PID 4952 wrote to memory of 2700 4952 4J955a.exe 127 PID 4952 wrote to memory of 2700 4952 4J955a.exe 127 PID 4952 wrote to memory of 2700 4952 4J955a.exe 127 PID 4952 wrote to memory of 5028 4952 4J955a.exe 129 PID 4952 wrote to memory of 5028 4952 4J955a.exe 129 PID 4952 wrote to memory of 5028 4952 4J955a.exe 129 PID 4952 wrote to memory of 5056 4952 4J955a.exe 131 PID 4952 wrote to memory of 5056 4952 4J955a.exe 131 PID 4952 wrote to memory of 5056 4952 4J955a.exe 131 PID 4952 wrote to memory of 4252 4952 4J955a.exe 133 PID 4952 wrote to memory of 4252 4952 4J955a.exe 133 PID 4952 wrote to memory of 4252 4952 4J955a.exe 133 PID 4952 wrote to memory of 640 4952 4J955a.exe 135 PID 4952 wrote to memory of 640 4952 4J955a.exe 135 PID 4952 wrote to memory of 640 4952 4J955a.exe 135 PID 4952 wrote to memory of 1520 4952 4J955a.exe 137 PID 4952 wrote to memory of 1520 4952 4J955a.exe 137 PID 1520 wrote to memory of 4356 1520 firefox.exe 138 PID 1520 wrote to memory of 4356 1520 firefox.exe 138 PID 1520 wrote to memory of 4356 1520 firefox.exe 138 PID 1520 wrote to memory of 4356 1520 firefox.exe 138 PID 1520 wrote to memory of 4356 1520 firefox.exe 138 PID 1520 wrote to memory of 4356 1520 firefox.exe 138 PID 1520 wrote to memory of 4356 1520 firefox.exe 138 PID 1520 wrote to memory of 4356 1520 firefox.exe 138 PID 1520 wrote to memory of 4356 1520 firefox.exe 138 PID 1520 wrote to memory of 4356 1520 firefox.exe 138 PID 1520 wrote to memory of 4356 1520 firefox.exe 138 PID 4356 wrote to memory of 2952 4356 firefox.exe 139 PID 4356 wrote to memory of 2952 4356 firefox.exe 139 PID 4356 wrote to memory of 2952 4356 firefox.exe 139 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b7da4409b7936bdb02e213a8c31642f59738604f673c3725fe14597ce0423b9.exe"C:\Users\Admin\AppData\Local\Temp\1b7da4409b7936bdb02e213a8c31642f59738604f673c3725fe14597ce0423b9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3c95.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3c95.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y4e01.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y4e01.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1o75e9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1o75e9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\1004511001\d3aa356448.exe"C:\Users\Admin\AppData\Local\Temp\1004511001\d3aa356448.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 15887⤵
- Program crash
PID:4264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 15687⤵
- Program crash
PID:2692
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004512001\daa059a175.exe"C:\Users\Admin\AppData\Local\Temp\1004512001\daa059a175.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\1004514001\8d776ac4ee.exe"C:\Users\Admin\AppData\Local\Temp\1004514001\8d776ac4ee.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2w4515.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2w4515.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 16125⤵
- Program crash
PID:372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 16045⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 16125⤵
- Program crash
PID:4212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 16925⤵
- Program crash
PID:1136
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Z45b.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Z45b.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J955a.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J955a.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2060 -parentBuildID 20240401114208 -prefsHandle 1984 -prefMapHandle 1976 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c360c3a0-db1d-4afc-9b6f-61a7c73ff0c0} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" gpu5⤵PID:2952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2488 -parentBuildID 20240401114208 -prefsHandle 2472 -prefMapHandle 2468 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d2db2bf7-dcf9-457a-bea7-74ad8a5d8f85} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" socket5⤵PID:2580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2864 -childID 1 -isForBrowser -prefsHandle 3036 -prefMapHandle 3116 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {33517b31-9dfd-4c28-9d76-7a1d672ae717} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" tab5⤵PID:3576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4012 -childID 2 -isForBrowser -prefsHandle 3996 -prefMapHandle 2776 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {388bb376-32fa-4f7e-a52d-7d3ae5acd294} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" tab5⤵PID:4208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3992 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4772 -prefMapHandle 4180 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a9ca3df-1cf8-4f78-8e9b-6bf233a95cda} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" utility5⤵
- Checks processor information in registry
PID:4360
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5592 -childID 3 -isForBrowser -prefsHandle 4820 -prefMapHandle 5544 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d97f2605-1e21-4cb3-b93c-7da097ca20d8} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" tab5⤵PID:3848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5692 -childID 4 -isForBrowser -prefsHandle 5656 -prefMapHandle 4796 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a2f872f-f88d-48e3-adf4-adc2a15f2cc7} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" tab5⤵PID:6140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5868 -childID 5 -isForBrowser -prefsHandle 5876 -prefMapHandle 5880 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe56f6fa-fdf5-450f-8406-befc463e2758} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" tab5⤵PID:5236
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3744 -ip 37441⤵PID:1956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3744 -ip 37441⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2404 -ip 24041⤵PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2404 -ip 24041⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3744 -ip 37441⤵PID:3964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3744 -ip 37441⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:7148
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD55f40ca4f2874bf87823af20eaaca6478
SHA151628bd9c60c1cf17c667d025d0a63098b505b2d
SHA256a497e51de0aa1dfc7e347bd21ec818fc9b8c0590774b2da6294a37817037abfa
SHA5129971e9d69c2ac00e5da65262ccab8adc7fa091db8faf7b9e204ba9ea4ee301a6d6f790d603692f61a0675c28798440b35d6078f5c5cb1b856eb442b45d2c58e0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD57ea49f05d48bec27af59e948867f42fd
SHA154cc473a04ae65a163a01d3861526acaf5442eaf
SHA2569d609bfb8ec70268092bb51719cf2515b46169054f7e95d794275bb191fdf8df
SHA512ef9b572b4cb25da5cfc9e8e9ac41b223bcd2dcc3f73c5317373dbd06e4d5ad7404d1f54a28cb0111471f746fe2dc50e0bf387b097f947587a7a91f6e490b8092
-
Filesize
3.0MB
MD5a17f03daddf4ffd5b038f13ca94cca7d
SHA1ba20321c4f47082502dadddec7a70769c21e253a
SHA2564149dded7fd91b0eca160fff8d1e48d81bd206ef719bd54d1d5f86bc023eb4f9
SHA5127a4d981c68e5be25078a18ae2844c1842c491f93137b7b3037a3ae2af9dd1074ce37f33bcf79c7bb9e47eb83a3ceb595918171f09039c2d1d398e7d892479a54
-
Filesize
2.1MB
MD5d21a2eb1558c04af68aa39932c381a77
SHA18a1c7f2c06fcf55ccdfb8155a2aa2ec94cb8c5bb
SHA256ba62e9e2f8ace5672fbc814db0b5fbd5a2d0a5d2d8ef55fd359e91ac756b4bbc
SHA512bffa84774f7857c827702c1f21619f55e4fe7b8fab650b1e8598ab5d5c327b9ddf80724a3be0acb605c5e177b330830276c59e999754fc28809f1781feba2fc7
-
Filesize
2.6MB
MD5941e61557ef13f76a606c961a64ed6ab
SHA14e95ec0b08c384f4c9752b21df3a50c1a049d00a
SHA256a9f670416324be30fb1ebf3aceb1d7874624461fd3cd7fb094bf8ec917a9720f
SHA5127f804f2dcbb3f8ae209bdddea61259a5c94648661c29f44a6425cd89fcd4ab93f2550a0f05558dfa6071cfd2ebf9831b42e19d967a76f12fbdda62df68d323c3
-
Filesize
898KB
MD564ad9ef8dcac308f74eefef859c797e9
SHA150e9852b733e233cffb9e7a28e1d7240cc197f8c
SHA256f776a56670e3a59f7392fd42dda4d72a5de85aefc1bbc30c603dbd2916dc9a18
SHA51282f180f36cd44519d7014fc19ad0ebc184c4077c370b4923feec2946af722fa8fcbb2a9892a5d2f39dc584c28aab6c8846d8aee6898f8d50776205226b80135d
-
Filesize
5.5MB
MD542070ffad8aa29b730d00882411370a6
SHA1c186d886387a3218935eae4d21f3162f4f3f13f9
SHA256e43a9168e3d99f3a8df9cd9bec868e0825d20712b02e06fbe5f12d05d31718de
SHA512ea661c6d0fc88b5ca64e0fa6f46207dfba2b104bbfe9e9e01c4bd00b8f8fa5d4f56529dfce734729333841f72ecab8b1f5e70f657b8a46ac834e461e40e925de
-
Filesize
2.0MB
MD55c656fca21313b706060727ffe93f6bb
SHA1481b192814532355b6e2045091ee300f307349e8
SHA256bfcf6c46d64eb87be63df45a15ff9c2a89bd66af62942756ec4dbd45cdfe6ebd
SHA512a7035a9bfb230ed1621dfabcfa43ee07b62e95b82858f2cac1bdaba16c5654574f5af0f445082d5ba6695bc5734a8e0d99d05a810ba27344ec0fe709e20cd589
-
Filesize
3.4MB
MD5a60cee17959dcac2524b4d90658355df
SHA197190824d32abce3817efb9318dd8dcdb83d5160
SHA256a259cc538fa7e761822a8145b28dbc78bac3f50ff95ce74bd57391d72c46b923
SHA5127d28ff316a4f357c51565a31fc58773f3b8acc2e24334a095cd42fe834654bf644764f9b4edb1c03599883099bd3beb6c30b1e98656e86a9ec6b8a16fa424e56
-
Filesize
3.2MB
MD56f213f2f520f485c1c32fd6bcf6481f1
SHA141c95b88aafa1698829b61e6bfb2aac933c7a73c
SHA256de1ef71fb0bca243198ae1dc1c0a18247656737d532a5c885cee5dd224e43aa4
SHA5121e5cc7a0601fa491a8ee9340f52321f24168dd0f75d9df7903958a869b768a66108dc9d118b7824475b0e53d81dd08f69e583226d19cbaba70adcb1ef41901d3
-
Filesize
3.0MB
MD58cf8b11e1553e2381b0c2376d013e951
SHA133d8bc52fe1fc709ee086a5a84d39024b6e2db92
SHA256d3ea3d360b4e4c6bc1da5adbd8c8bbe689b0541166e2a77dac821517be81de98
SHA512a876d770734998f8397efea36c94bf7b61d14aa317f4b9e62b95333171068b626ebe2336c6fefc3a0f02f16b454df5c852b9fe4cbb3af59fe1d11ae2f77303a4
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize6KB
MD5acf465906d5a7d6bc78d20f2628628da
SHA147aa26b754cd001e7f8a78b5f06a312abb660186
SHA256c2d8655810a6ca2d0dc6fda3218e2ea5f10d08a5d69e2bd1fcbabb6d15964662
SHA5127804e7ef8c265a775281bb9f017393dd5390428074160be04300012eefa3ff9bee57a53687b5da3a34a0bf2d13df642eca503fd408ac77c86e5fe5db225aab23
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize8KB
MD5a0e77f7bc9343e215df36f532f000751
SHA12c1ce95d954c2fded0380f9927061f163c344998
SHA2567aceb6694fcb3a450c63b0b679ae0e87f5276ef5d2bc2bfb01241889064c61e9
SHA512331ecd2dcbf862f061fd618a204f8d15dc0fdc2d577f36a993dc8d826b446a5f27c6f2369b60378d41919ff1c74f8c42294da3be24dc47dc5342628c8886f925
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD5396f058f7cba1ce16d7a42ccf7452011
SHA164b75ea8a7e4726c61b4d3469bb28e75a4bc0380
SHA2563ee16d276e991f3e253819cac41720e3287c9b00b4329a1b7832ffb947ec73e5
SHA512718228b3f4a5cfd3cda191bcd2d472bbe0a68271723038b40fc02e967acb7aa52b6b98622c07cd6f818b276bf98377e640d6546b8130bf46a1184833ddb715d4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize25KB
MD5f97512482297fa17b99b09e35667f69f
SHA1401e57cad533067e4b7e422c2afb00283c290af2
SHA2562678d99ca4ff09bbc37fd63f55d46b71092436d05dd766b09c2eaa778e48d2df
SHA5129b6915f902a73e1866a3d7ecdd831a80f6159e0e4263c2050786dc162e5e91669e3d4b2b50c5d590661066ac614864759c37e9c30328f3a45b18e6b656958ade
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize26KB
MD50426a8fdf22de6f77dcf022253c8db96
SHA11952e3e75bcf6ed96058fdfaccc0f37f843f7993
SHA25613d76b8f667a9adabc641b292d3e962fca4735387a566f85d5cde952d8ac3b46
SHA512a3aff9af364488a220fc9a828d67ad21d73e64b160615bcd568843c7737304dca1c566bef3350d65f58b7fd650004762a2e6c05030ce3d8a2b8aedba8aa8674a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5865168378033543e6ab2827d06fdbc16
SHA1a4b73f0148ccf663d2939d08ae920767ade6b934
SHA2567aebd2e608866d21805d9462c13dba8e05f2688ccdb0f476a9a88c54b520b5e7
SHA51235591afdbec4cee69d35ff9151b8956a1a253ebfb9d417317cf509882b1cf7e907445da16759b2b6a4eb8720eea15b07fd3790d706f1fef45decc2674b0731a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD57429c923a171c7d58a28f864c49fad3f
SHA1cd8095b69ab4e4907ada190f7f49ced439eebf45
SHA256d87eec4ce465988309df3878e7d1c6d25515de2961ed4174f6e63e6b37368850
SHA512fc45d67a66b54d0b873a534f2d3f2061217a9a608e55ffcda08a6174802fc92598ac595ee7c4d5062ac7c03d2ca65244955e0f8d2813107d25d2c11d3d45bcbd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD53916676c8bb97af6593806a13675fae3
SHA1d37299af8f8a5538f2e22903ace404ddc65106fb
SHA25641f6f42b65fcfc43a9859304061ed845987d00f298e89c4f76bb2e34fe08f559
SHA51266f9cdca523a7cc4e2694070ad2e548fe46d65599ebb687e0376d73ae3f4264f31753ef51ca995bd6ac768e1373af60636d9a50882670851a5e729a4b7629990
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize26KB
MD50435e00daff504c4c800131f94c0b3cd
SHA1447387d277ce63a8b1e0d21b2de34d2875aa6ff0
SHA256769fbca0d8798a142903de5e4508c749edebcc66d8362830eb86ca4cf4a26de0
SHA51299a1b07dbc877e2da6276c5b562ed6541e3bdf7b9663c955123a949750e61d0b0bdec597b49987a1af6cbe2c947c3e09a5a47484f150fb89358cfb15f506a25b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize26KB
MD5b7eabc0e72c4954e9d0305136c40df1f
SHA124ff75cc2294e1d3c94a3b0c68497c5dac5ade2d
SHA256a66457834f1bc8e91ddc486108b3cf1390c4b0d6714016cc2d2e619c1ac62710
SHA5120465329bdf1dfdbad20586b1c37587aef16a4101b9eb950220a015f482c505f00310b5f77db42b2a1898a2033510bd66b62056c60abb60bd62c0e483f1143079
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\04076026-30cf-4a0d-a799-01a17fcdcb4c
Filesize659B
MD52263e5ec3cc02792a7b8cd083536ea2b
SHA1c6848ea6ecc59217f0e882ef18b187661ebe91b8
SHA25619890b45c9ac9df8613d249f9faf8dfcd80549adbb22ff747181353b341569f5
SHA512db247b4db02543dafbb8d1289007801a2e13a0f9acf69d9b3ae14c864bfe28198e73c94fad531edbbcd91e1cb73bb04b90480634a28312e30c009fbe9ae368c7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\1f4b82cc-933e-4d82-a2a7-9de29860a989
Filesize982B
MD59c2efdf8a1795aed0a92d401b8ccf063
SHA11742e396c47e9e91f1c11cd88d9427e975b2497e
SHA2566f650c8ea8c0cbdcad0df98b03cebc17755baa248f143e36d8b2944cdfb37564
SHA5120fb0d93f9361e852e12ac42eae6bcc98c1da94f9ed4b7e1dfdd805b983a8219ed452531ac414dccfe5f2f3df2d11c2e4e1f18bde6a02bbed6362bfb1dd74ef24
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5b6b504cbe5d966fa7e95f5b1d0a3cf93
SHA10a7a84dd5a4dc195474da0a69d08d64369b07b86
SHA256b6cd41c2a1cf353cafc960c2f1ee6ec0aa7eb1819f71d99a4c7eb1cbc8596d51
SHA5123e497339d75be12756ad9694941b07bb0039252bdb5694c9fa67945f1705340402842a41500ab191fff068a271ecb5bdfb1f700cedade457f6dc64aaaba685b6
-
Filesize
12KB
MD59395d82cea332a9213cd3f844c9efd4e
SHA17cd47b7f95912fb9f2483e829113b3df44fd15a2
SHA256de0243285b315fa1b6ec9bdc27a93b2d1ec3037e357a69a34c0de23f3e5b411d
SHA5121534c789ceca33f6c5179cf247466aeb2128325d3e609e0f390c2d0cfb65a82017108528a9bb911600f1b2e90ef5d31e8c62752773ff58fb9cc2adf101c69602
-
Filesize
15KB
MD5fab9d9faf9888a52d068af2ca9193398
SHA1d0673dcfd5ec56260d6c1da530e84e4202b7cd34
SHA256fe8f45bb5b5ddd003531619ec5e7b8e80fd7c67ec7cca0157d321edea7b1e2d1
SHA5123b458d9576ca1d73dae074c6f9614247c538f67a434f2423fe45862dbcad644c02b738ec57bae1287344b5cbd79eb4aa4df655711fa39a7466ec0c86e696b35f
-
Filesize
10KB
MD5802e8343dc7b4aefb2f2a056c75b8dfd
SHA17cae60203fd9075f2d9a500aeed72e2207f0317c
SHA256a641041802cd13a5f455f5f284f5ab84ab350ffa20aa5c2779441225234f750b
SHA512a5c3567870a94f9777761cb14e63ff0e0a662dcd6394177944707fae84e15ff7a019268bb649d6dd3190ce50445b8094e64b610378e096acdf53ae0be3999ac1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.1MB
MD5faa16f9d60290277e4c685d509d93bab
SHA11246f6ca7877c8b05d2ddefeb3fad483ea0d6240
SHA25676bac075ff7dc0601b6d95ca3a0c5d8b4e62c54a1d501b38ee3d862036a02421
SHA51232ba1464d79f148d1c397a6f5d7af220be4a528bf1dca691e6f09e5a72b8cefdbb2eec77496081dbaf3029c6ac1cb67424102443ff5a123110328c64ec67498c