Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/11/2024, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
83c6178fb84fe7cb7b907b7538adf183
-
SHA1
a4f726accdca9ae01a1cd7f18a2d7061dd30caf1
-
SHA256
14df41fc65584367f11a4b221e2ecc7414639449fafd05692f82c47f19c3422a
-
SHA512
e3e686cdb8c59adef54788e9f46f0c7516b57aca88ed288376f28d0eb0f25ead37d886f6aa18988c631f4d636e368af1a014c0a97365f773946ba55c59cfa687
-
SSDEEP
49152:HSK1KLt41Nv3S5QReH7v9thEsO8YjUYb7XI6ZbRMfKcZeTUx:yK1yaK5QgbvusmjUYnZbRw1X
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 15caa1a87c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 15caa1a87c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 15caa1a87c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 15caa1a87c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 15caa1a87c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 15caa1a87c.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3584 created 3428 3584 WqtakkK.exe 56 -
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 037f01bc28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF ce5459a8a6.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 037f01bc28.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ce5459a8a6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c2fe383603.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 96136ef23d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 15caa1a87c.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ce5459a8a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 96136ef23d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c2fe383603.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 96136ef23d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 15caa1a87c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 037f01bc28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 037f01bc28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ce5459a8a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c2fe383603.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 15caa1a87c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 10 IoCs
pid Process 4200 skotes.exe 3584 WqtakkK.exe 3416 037f01bc28.exe 4348 ce5459a8a6.exe 4172 c2fe383603.exe 2728 96136ef23d.exe 4648 85b0f4a6b2.exe 2060 15caa1a87c.exe 3312 skotes.exe 5240 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine c2fe383603.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 96136ef23d.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 037f01bc28.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine ce5459a8a6.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 15caa1a87c.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 15caa1a87c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 15caa1a87c.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c2fe383603.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010760001\\c2fe383603.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\96136ef23d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010761001\\96136ef23d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\85b0f4a6b2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010762001\\85b0f4a6b2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\15caa1a87c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010763001\\15caa1a87c.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023cf0-1314.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 1680 file.exe 4200 skotes.exe 3416 037f01bc28.exe 4348 ce5459a8a6.exe 4172 c2fe383603.exe 2728 96136ef23d.exe 2060 15caa1a87c.exe 3312 skotes.exe 5240 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3584 set thread context of 3736 3584 WqtakkK.exe 89 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4904 3736 WerFault.exe 89 2952 3736 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WqtakkK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce5459a8a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96136ef23d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2fe383603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85b0f4a6b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15caa1a87c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 037f01bc28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1652 taskkill.exe 4632 taskkill.exe 1380 taskkill.exe 4064 taskkill.exe 4052 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1680 file.exe 1680 file.exe 4200 skotes.exe 4200 skotes.exe 3584 WqtakkK.exe 3416 037f01bc28.exe 3416 037f01bc28.exe 3416 037f01bc28.exe 3416 037f01bc28.exe 3416 037f01bc28.exe 3416 037f01bc28.exe 3416 037f01bc28.exe 3416 037f01bc28.exe 3416 037f01bc28.exe 3416 037f01bc28.exe 4348 ce5459a8a6.exe 4348 ce5459a8a6.exe 4348 ce5459a8a6.exe 4348 ce5459a8a6.exe 4348 ce5459a8a6.exe 4348 ce5459a8a6.exe 4348 ce5459a8a6.exe 4348 ce5459a8a6.exe 4348 ce5459a8a6.exe 4348 ce5459a8a6.exe 4172 c2fe383603.exe 4172 c2fe383603.exe 2728 96136ef23d.exe 2728 96136ef23d.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 2060 15caa1a87c.exe 2060 15caa1a87c.exe 2060 15caa1a87c.exe 2060 15caa1a87c.exe 2060 15caa1a87c.exe 3312 skotes.exe 3312 skotes.exe 5240 skotes.exe 5240 skotes.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3584 WqtakkK.exe Token: SeDebugPrivilege 3584 WqtakkK.exe Token: SeDebugPrivilege 1652 taskkill.exe Token: SeDebugPrivilege 4632 taskkill.exe Token: SeDebugPrivilege 1380 taskkill.exe Token: SeDebugPrivilege 4064 taskkill.exe Token: SeDebugPrivilege 4052 taskkill.exe Token: SeDebugPrivilege 1948 firefox.exe Token: SeDebugPrivilege 1948 firefox.exe Token: SeDebugPrivilege 2060 15caa1a87c.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 1680 file.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 1948 firefox.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe 4648 85b0f4a6b2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1948 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1680 wrote to memory of 4200 1680 file.exe 82 PID 1680 wrote to memory of 4200 1680 file.exe 82 PID 1680 wrote to memory of 4200 1680 file.exe 82 PID 4200 wrote to memory of 3584 4200 skotes.exe 85 PID 4200 wrote to memory of 3584 4200 skotes.exe 85 PID 4200 wrote to memory of 3584 4200 skotes.exe 85 PID 3584 wrote to memory of 3736 3584 WqtakkK.exe 89 PID 3584 wrote to memory of 3736 3584 WqtakkK.exe 89 PID 3584 wrote to memory of 3736 3584 WqtakkK.exe 89 PID 3584 wrote to memory of 3736 3584 WqtakkK.exe 89 PID 3584 wrote to memory of 3736 3584 WqtakkK.exe 89 PID 3584 wrote to memory of 3736 3584 WqtakkK.exe 89 PID 3584 wrote to memory of 3736 3584 WqtakkK.exe 89 PID 3584 wrote to memory of 3736 3584 WqtakkK.exe 89 PID 3584 wrote to memory of 3736 3584 WqtakkK.exe 89 PID 3584 wrote to memory of 3736 3584 WqtakkK.exe 89 PID 4200 wrote to memory of 3416 4200 skotes.exe 97 PID 4200 wrote to memory of 3416 4200 skotes.exe 97 PID 4200 wrote to memory of 3416 4200 skotes.exe 97 PID 4200 wrote to memory of 4348 4200 skotes.exe 98 PID 4200 wrote to memory of 4348 4200 skotes.exe 98 PID 4200 wrote to memory of 4348 4200 skotes.exe 98 PID 4200 wrote to memory of 4172 4200 skotes.exe 100 PID 4200 wrote to memory of 4172 4200 skotes.exe 100 PID 4200 wrote to memory of 4172 4200 skotes.exe 100 PID 4200 wrote to memory of 2728 4200 skotes.exe 102 PID 4200 wrote to memory of 2728 4200 skotes.exe 102 PID 4200 wrote to memory of 2728 4200 skotes.exe 102 PID 4200 wrote to memory of 4648 4200 skotes.exe 103 PID 4200 wrote to memory of 4648 4200 skotes.exe 103 PID 4200 wrote to memory of 4648 4200 skotes.exe 103 PID 4648 wrote to memory of 1652 4648 85b0f4a6b2.exe 104 PID 4648 wrote to memory of 1652 4648 85b0f4a6b2.exe 104 PID 4648 wrote to memory of 1652 4648 85b0f4a6b2.exe 104 PID 4648 wrote to memory of 4632 4648 85b0f4a6b2.exe 106 PID 4648 wrote to memory of 4632 4648 85b0f4a6b2.exe 106 PID 4648 wrote to memory of 4632 4648 85b0f4a6b2.exe 106 PID 4648 wrote to memory of 1380 4648 85b0f4a6b2.exe 108 PID 4648 wrote to memory of 1380 4648 85b0f4a6b2.exe 108 PID 4648 wrote to memory of 1380 4648 85b0f4a6b2.exe 108 PID 4648 wrote to memory of 4064 4648 85b0f4a6b2.exe 110 PID 4648 wrote to memory of 4064 4648 85b0f4a6b2.exe 110 PID 4648 wrote to memory of 4064 4648 85b0f4a6b2.exe 110 PID 4648 wrote to memory of 4052 4648 85b0f4a6b2.exe 112 PID 4648 wrote to memory of 4052 4648 85b0f4a6b2.exe 112 PID 4648 wrote to memory of 4052 4648 85b0f4a6b2.exe 112 PID 4648 wrote to memory of 1416 4648 85b0f4a6b2.exe 114 PID 4648 wrote to memory of 1416 4648 85b0f4a6b2.exe 114 PID 1416 wrote to memory of 1948 1416 firefox.exe 115 PID 1416 wrote to memory of 1948 1416 firefox.exe 115 PID 1416 wrote to memory of 1948 1416 firefox.exe 115 PID 1416 wrote to memory of 1948 1416 firefox.exe 115 PID 1416 wrote to memory of 1948 1416 firefox.exe 115 PID 1416 wrote to memory of 1948 1416 firefox.exe 115 PID 1416 wrote to memory of 1948 1416 firefox.exe 115 PID 1416 wrote to memory of 1948 1416 firefox.exe 115 PID 1416 wrote to memory of 1948 1416 firefox.exe 115 PID 1416 wrote to memory of 1948 1416 firefox.exe 115 PID 1416 wrote to memory of 1948 1416 firefox.exe 115 PID 1948 wrote to memory of 2004 1948 firefox.exe 116 PID 1948 wrote to memory of 2004 1948 firefox.exe 116 PID 1948 wrote to memory of 2004 1948 firefox.exe 116 PID 1948 wrote to memory of 2004 1948 firefox.exe 116 PID 1948 wrote to memory of 2004 1948 firefox.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\1010753001\WqtakkK.exe"C:\Users\Admin\AppData\Local\Temp\1010753001\WqtakkK.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\1010758001\037f01bc28.exe"C:\Users\Admin\AppData\Local\Temp\1010758001\037f01bc28.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Users\Admin\AppData\Local\Temp\1010759001\ce5459a8a6.exe"C:\Users\Admin\AppData\Local\Temp\1010759001\ce5459a8a6.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
-
C:\Users\Admin\AppData\Local\Temp\1010760001\c2fe383603.exe"C:\Users\Admin\AppData\Local\Temp\1010760001\c2fe383603.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\1010761001\96136ef23d.exe"C:\Users\Admin\AppData\Local\Temp\1010761001\96136ef23d.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\1010762001\85b0f4a6b2.exe"C:\Users\Admin\AppData\Local\Temp\1010762001\85b0f4a6b2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1932 -prefMapHandle 1924 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b19154b-b406-4d69-867c-da6faca9f17f} 1948 "\\.\pipe\gecko-crash-server-pipe.1948" gpu7⤵PID:2004
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2424 -prefMapHandle 2420 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b77725a4-a6ee-4417-a421-4ea89573aa37} 1948 "\\.\pipe\gecko-crash-server-pipe.1948" socket7⤵PID:3332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1636 -childID 1 -isForBrowser -prefsHandle 3024 -prefMapHandle 2944 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e856293-d7d1-4799-a055-be93506b96b7} 1948 "\\.\pipe\gecko-crash-server-pipe.1948" tab7⤵PID:3864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4008 -childID 2 -isForBrowser -prefsHandle 4000 -prefMapHandle 3996 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4bcae51c-ff5e-4e0b-8fa3-f34b6306a6b2} 1948 "\\.\pipe\gecko-crash-server-pipe.1948" tab7⤵PID:4652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4756 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4752 -prefMapHandle 4736 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a03eacf0-5cfe-4f6d-b3a2-7971ce44db37} 1948 "\\.\pipe\gecko-crash-server-pipe.1948" utility7⤵
- Checks processor information in registry
PID:1452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5480 -childID 3 -isForBrowser -prefsHandle 5264 -prefMapHandle 5444 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef661a85-a1d2-4cbc-934f-9d59439ec5f4} 1948 "\\.\pipe\gecko-crash-server-pipe.1948" tab7⤵PID:2596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5688 -childID 4 -isForBrowser -prefsHandle 5608 -prefMapHandle 5616 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1323cf3e-e7d5-4ded-851d-0be96f3fcea1} 1948 "\\.\pipe\gecko-crash-server-pipe.1948" tab7⤵PID:4772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5808 -childID 5 -isForBrowser -prefsHandle 5884 -prefMapHandle 5880 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {35eda903-b2e7-4b13-9556-050d35190fc2} 1948 "\\.\pipe\gecko-crash-server-pipe.1948" tab7⤵PID:3056
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010763001\15caa1a87c.exe"C:\Users\Admin\AppData\Local\Temp\1010763001\15caa1a87c.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 13203⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 13483⤵
- Program crash
PID:2952
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3736 -ip 37361⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3736 -ip 37361⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3312
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5240
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD559b18c72d4da3885b239c3d04e0d919d
SHA13ac11c04876e23c54252d5aa51277f67bbb2fe3c
SHA2567312679d28d7c8ef1131f895bab853b42eb57bd5bcb7a5b549b36352e765e691
SHA5129923e3ec1f32ac66f945adcd0f38da104a8f6d9801588afa735afbad3d34035eb39c0f04472e2118e8f3c90a249917311d7c0d10594f243ab6717fb4164cc79c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5900dd4c515bfe33edd596d65fb856a17
SHA1aa7d39c066234495940287a05c672649a059a248
SHA2568695317dab19421339c8c2d3020c56ac151cdc6e2e6061d24c7b0b485d5126a3
SHA512eca85197164ebed1ae69968458ac187b5c31e1deb3bbd7680330b631c3d4fe7cc82181cc22cd062c059d55a1cdac1a496a8c39e8ca0502d9513d1057771068cc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5f520964043e5cab29544fa21f1273591
SHA10b2381f3e84225ef67a4eca5f42c2bc58306cc83
SHA25665d110c92e53788de9e56cbe33536b5530cbda314190ff837e1fb2d8f502d6a4
SHA512bf71c14095e8df2d27aede7c6b82f2fbf987d6102548b676a302ec1d6e5b44ee5af5b5ad475ec1680fc061b6e746ba370a40bb55c386bf7575a0aed01df1d60e
-
Filesize
5.3MB
MD530a8bfc34575ec41e0c2cd9306d47e2b
SHA153fd06385e7ef53308c8e8a6c127675531e01f7a
SHA25601edf2c34309e30754e4731c7d00375c536cee1a51c5666a54085029347b9542
SHA51269d9da40744c8bff5bb363467d0c48141624f450df36639ca2c49e3d104041e632a00c01b19769b000d627d37dd521cf87f629d69cee236e11d28e1113ae4fd5
-
Filesize
4.2MB
MD56610b85f35e0e905ae4aa5796bdd74d3
SHA1c6ec77fd3cc44a63cf15004226f9727531aac130
SHA256f79d418541986b8ede0f71551d75782cb1f02ebf06c3508d35649ecd569f88e1
SHA51212788928ab6c02de567cfa2d86e120cae45ed16694f640327df21c6acd4c500a7b14875d6fdd001c0c12cd8de89af335d4224e936bb2b229117afc3c5709f199
-
Filesize
4.2MB
MD50b71a02caf459de57403643dd8ce0f4c
SHA11e14dbdc9c6b5127344726b1e187e519153d93e8
SHA25658230b6c55117274a65a5c494d72306be6ad9c1e16053628f976a88c43925bad
SHA512751dbbf975344306244f679107531bd508b2cad5fd3a12930470e74c8387069407a88245b8e011336674a98aebaf762460bf6f5020fcf3e33a1ba6338223e806
-
Filesize
1.7MB
MD51d0451e5d4d4d6003480dc9746e6542a
SHA1c12efb8c7765ca90b8ffbfa3cdb14d3830104e8e
SHA25631c434fa385f0e012b82c47e667bd6843524a53a5a73a4ec881d42ecc450ac26
SHA5129c9f5864017c78fc33c204e1f4f273864bd96491acd8f242e127ca757f7940d9a6cba72ee9e675f2ed03e5ce013696a6b1c14a95c8fa4f5082007de3a34c7356
-
Filesize
1.7MB
MD5c265223caa20a6255a1559cd8f8f8575
SHA16d5ec5ea84cf2d09a01cfcfcc16cdebaeafeb830
SHA256e98c82b31e39c3c13f4a53047f253e3106b9e1f2505349aa908edd7ed4ed6d5c
SHA512be80340f88b0f4f217d83c760c5033c04c1addb5058895ef28d2068cf446ecf671f042bdfb090a86c7ec778bdb3966558e08d994a751c9443daf036ea7ffb054
-
Filesize
900KB
MD528375e313d6722ad38dbf09bf174dead
SHA11bcf10fa07b69a48d8763144749a4238c4ab79bb
SHA256145f51b753edd265d3d14aa6055389ed0b9d0687e69b04630d15d29bc0044ce7
SHA512676f56a670b3a8c1edc12190de69f3f5d2c5df0f046d722eaa11d670bea90b7d7340b18b075c6d2816b13e1cfd3dea9c81464c2d1bee67736269bf2dcc4ca52b
-
Filesize
2.6MB
MD554f0e8c533c3906a79d6cf9f396b8733
SHA148d3eedad2e291b0094ee442bdd1cf43b758dd6d
SHA2569fc5435d172e3ee9af173f68712e52d22b91a59c9c0fd55aae9762706f274411
SHA512095615ce99ab6ff2046d95a917d4f9266a3963273c464504a15046e729099ab5251c7dfffe728a17d9448f3da517bb127fe17e749daa462575fce6a900f5c40d
-
Filesize
1.8MB
MD583c6178fb84fe7cb7b907b7538adf183
SHA1a4f726accdca9ae01a1cd7f18a2d7061dd30caf1
SHA25614df41fc65584367f11a4b221e2ecc7414639449fafd05692f82c47f19c3422a
SHA512e3e686cdb8c59adef54788e9f46f0c7516b57aca88ed288376f28d0eb0f25ead37d886f6aa18988c631f4d636e368af1a014c0a97365f773946ba55c59cfa687
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD537a10fd2f8f463632641e436fc238d77
SHA1b69abc4b7cd1a29885e8aee176421a6c11cd845a
SHA2560d4e428719d7f7ad76630242b67481d074f672573b9ed1cd0b17b7fb7b24e322
SHA512e16d8065cabf12515c74705e3829c184a0c06be6e28eccf98491a0223814787ecdc02f6fe5428204f4f547fa0d9f71bfd5afe5180501d57c74b4a7b60e7e6300
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize10KB
MD572fd9ae86debaeafa1af4cab84794dae
SHA1c3e47ff65e9d9e27c1a52402b652e7c9aa27766e
SHA2566b33f7d6dedb2cec05e10d3e47e58d60c732f40f6ff7af7edf9abecdd30b9100
SHA5124e5456fc93e156e6d242a2952803cbc5720579cc31126b040ea38426e7407ebb317157a2400098d698fd9db0b6cad36c742225ca2d9d85f45a362f82a620615f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5263eee23d5bf0246dbe9a67a8a98c32a
SHA1e09705d5970f77981081053e2fde2eebcdbce499
SHA256aab79531c732e7c6fbca62be0186d4a5427f96eb8f47ce0c697fd7206f55a2aa
SHA512482116d3b585cef7f95d7d318869f5a229296efcf6dd9e8709208b1ef4a1affaee11e929e2967f74831e8a24f725a9f62cc58df309b2d55f866f8027fc5989dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5b87b9bc90622e1fa436c5faa2375db40
SHA159ecef2771618502e2d44dbed22d4220ff6f828c
SHA256dab1577caabe9052eaf62666aa05ff07108fde65c918b6b6f49a8cc112d88c1e
SHA512dd0a8a28b46ad0ab511faef7da0d75959bf37c6a38ef9d7001907c2af9c8e0258dd0a234b18ccb44f5c4a042e25e1701e9839e5622f2a0f4d235b40236a5746e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD56931e6f7349ff50209380dc6dd7b5ba4
SHA12241d9fcd07fbf02af0befc2d040751ce188c3ba
SHA256d712acd0df1f8792d093f2a84f86ccac991466e59e37eaac78802d74214c3d8d
SHA512e8ff5b50158aeaaec3db8227ac609ff6a7e94ab2ef7fba664b22770fb98ca7d581a4e52a609c343bdab8deaaed859bc301a3705d2ceca16f082c506d784557b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\3607a06d-a152-4314-98b3-d6fd6a91f129
Filesize27KB
MD56a2831a06bf354d6e99e856b5fc8692e
SHA1cff120438577466d442270a6e177bf8f24a89e1c
SHA256df864269ff8d8eac9b23bb6c62a70ce11f66eba97cba36d7131a12af3822a756
SHA512339ab1461528f3ae058a869e834381ab9d1b94e9efcd6b10880d29ed0886cd90d16358d8f33757eeeebc10fb3472513279a14cd998c1428d4cfbcec4a16a8da4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\5c4c917c-ac8c-4975-91cc-5f99cfaa7119
Filesize671B
MD5ed95f11d41067fd069d4c479d1c5e650
SHA1e2d2c21bd732b74c5d9f4eb29aeb8ed4332b1267
SHA25666e2f4479bdc15d3ba94427005f306ddfdb87ddf707076d805cc19ab8c4b981b
SHA512b16615709224fe3e4f91c409ba3e91dbadebe1dd3c28383bcd8fade0fcde8c41b1397958dd4eb541cc0ddcd1a3ec47eae2982ee656afdf1a588ff095694cf947
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\dfb63761-6735-47fe-9887-b1e8224fe2d5
Filesize982B
MD555bd05d0ab2e684d0777e8a0813f6f18
SHA1e1180f7e114e5767eb1fcf7aced025177fb91bd6
SHA256d6a73e0c0a9e299d060c9d884c718c7f37bdde68baf3b0fcccb6c1ee9f1f3124
SHA51230b38b7334328640db8983b210b6da959676391ca75c53b7068cf005b130824f4591c06d63b76bb4ba8a5fe3189233f2c077aca1a34b1b09b37d71cb9e25d247
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD52fd2d23fed4dfbd3dd4ed52fd5e3d5e7
SHA1a13bce6398226f9b760c78ab69e6aee00690055e
SHA2565faf3c4a65b7d726042fa25fe0d0f1aff53cf5c4f38af61dac8c1bda0c83aead
SHA512aaecd63693c017d5b4c20b08d5441340465765e4dd1dfac8bd9749d6b84856243acef9a8cb69ef012a6c847c99c8343b3aea76952175ba5bd1e344ea59853860
-
Filesize
15KB
MD56ef5f88af4463ecd680ef3540a144172
SHA154c2bd2fd0c1d6d013535b7c4149eaab8621d9c2
SHA25681d2ee5e8e6a6d0a498b313182a751d0472a38df497addb24f4d7eb10401961c
SHA512f73781d3debf109124a03092a989af32fa2b9d8c0cce65991ac9d04eca7a328b96b3c9637a9481c9351c117642932443be1787f3b33038860625a83201833a85
-
Filesize
10KB
MD5b95a73700a52c8ed0717e8c1d82326f1
SHA1e8f88ef51837856ac9bf2b64a4d3b00844fb0052
SHA256c00df0e32276e02c55f0f447ed4a3c7c0bf5ab03e9c2d1740e541e74ef92d4d0
SHA512ba1232213fbd17c387f2c1d944f3ebe548d6046bcdf881c0dbe1ef7c78979f2d8541a4c0feb7a126582c4fb6c5d89dd640cb7a281960c4e18e619a155d4823ee
-
Filesize
10KB
MD5105cfaa58f0769ce828a9c207f4ba473
SHA1df4720d842541a0494b07e08516be924b8e53695
SHA256ac7a1699c27793edfc28de3127fa82d2c5bff3b1ffaf8baecd5a5614193937a5
SHA512ff77d80c46e4e167cbf4e016803c42fd77e1f70e143d754c533d16ac2a0bd43e2c5db13823c5f9c25f806af48e4817349fe4f4cfde47b5a568b0d73f2afd9f7d