Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 23:29
Static task
static1
Behavioral task
behavioral1
Sample
NCU6L_file.exe
Resource
win7-20240903-en
General
-
Target
NCU6L_file.exe
-
Size
3.1MB
-
MD5
402ab18478d4b4375a8145d45d47cf47
-
SHA1
31ca2191e74e0ff586cf5032a36aa3e99f9259ca
-
SHA256
126fe752552aee79b622ca8edcb119b01b86113f11765bcfc9943ca24a95aded
-
SHA512
021da29feedbca174af347912a76764ae377b7a94c29f34c940dd7f347c405643913cafc61fb1b47bc7a22d46b5bdd385360252d5ed6b62f57bfde90279971c4
-
SSDEEP
49152:flOYOVbpMcYeM7J00fuj02kigEL3fOuPee50l9:flOZVFMjeM7/9LilLv1PN0
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://classify-shed.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://classify-shed.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
https://atten-supporse.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1c9ff57fbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1c9ff57fbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1c9ff57fbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1c9ff57fbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1c9ff57fbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1c9ff57fbc.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ NCU6L_file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0bf5ad5ed9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 12476ae905.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1c9ff57fbc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0bf5ad5ed9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0bf5ad5ed9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 12476ae905.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 12476ae905.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1c9ff57fbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NCU6L_file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1c9ff57fbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NCU6L_file.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation NCU6L_file.exe -
Executes dropped EXE 9 IoCs
pid Process 2400 skotes.exe 528 0tClIDb.exe 348 0tClIDb.exe 3388 0bf5ad5ed9.exe 2152 12476ae905.exe 3192 9b7c2e85c2.exe 4868 1c9ff57fbc.exe 5844 skotes.exe 6140 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine NCU6L_file.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 0bf5ad5ed9.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 12476ae905.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 1c9ff57fbc.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1c9ff57fbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1c9ff57fbc.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0bf5ad5ed9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013296001\\0bf5ad5ed9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12476ae905.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013297001\\12476ae905.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9b7c2e85c2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013298001\\9b7c2e85c2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1c9ff57fbc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013299001\\1c9ff57fbc.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0033000000023b7b-86.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 440 NCU6L_file.exe 2400 skotes.exe 3388 0bf5ad5ed9.exe 2152 12476ae905.exe 4868 1c9ff57fbc.exe 5844 skotes.exe 6140 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 528 set thread context of 348 528 0tClIDb.exe 85 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job NCU6L_file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 760 348 WerFault.exe 85 4964 348 WerFault.exe 85 3420 3388 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0tClIDb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0tClIDb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 9b7c2e85c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NCU6L_file.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 9b7c2e85c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0bf5ad5ed9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12476ae905.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c9ff57fbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b7c2e85c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4372 taskkill.exe 4236 taskkill.exe 2324 taskkill.exe 1888 taskkill.exe 3284 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 440 NCU6L_file.exe 440 NCU6L_file.exe 2400 skotes.exe 2400 skotes.exe 3388 0bf5ad5ed9.exe 3388 0bf5ad5ed9.exe 2152 12476ae905.exe 2152 12476ae905.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 4868 1c9ff57fbc.exe 4868 1c9ff57fbc.exe 4868 1c9ff57fbc.exe 4868 1c9ff57fbc.exe 4868 1c9ff57fbc.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 5844 skotes.exe 5844 skotes.exe 6140 skotes.exe 6140 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2324 taskkill.exe Token: SeDebugPrivilege 1888 taskkill.exe Token: SeDebugPrivilege 3284 taskkill.exe Token: SeDebugPrivilege 4372 taskkill.exe Token: SeDebugPrivilege 4236 taskkill.exe Token: SeDebugPrivilege 4808 firefox.exe Token: SeDebugPrivilege 4808 firefox.exe Token: SeDebugPrivilege 4868 1c9ff57fbc.exe Token: SeDebugPrivilege 4808 firefox.exe Token: SeDebugPrivilege 4808 firefox.exe Token: SeDebugPrivilege 4808 firefox.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 440 NCU6L_file.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe 3192 9b7c2e85c2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4808 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 440 wrote to memory of 2400 440 NCU6L_file.exe 82 PID 440 wrote to memory of 2400 440 NCU6L_file.exe 82 PID 440 wrote to memory of 2400 440 NCU6L_file.exe 82 PID 2400 wrote to memory of 528 2400 skotes.exe 83 PID 2400 wrote to memory of 528 2400 skotes.exe 83 PID 2400 wrote to memory of 528 2400 skotes.exe 83 PID 528 wrote to memory of 348 528 0tClIDb.exe 85 PID 528 wrote to memory of 348 528 0tClIDb.exe 85 PID 528 wrote to memory of 348 528 0tClIDb.exe 85 PID 528 wrote to memory of 348 528 0tClIDb.exe 85 PID 528 wrote to memory of 348 528 0tClIDb.exe 85 PID 528 wrote to memory of 348 528 0tClIDb.exe 85 PID 528 wrote to memory of 348 528 0tClIDb.exe 85 PID 528 wrote to memory of 348 528 0tClIDb.exe 85 PID 528 wrote to memory of 348 528 0tClIDb.exe 85 PID 528 wrote to memory of 348 528 0tClIDb.exe 85 PID 2400 wrote to memory of 3388 2400 skotes.exe 92 PID 2400 wrote to memory of 3388 2400 skotes.exe 92 PID 2400 wrote to memory of 3388 2400 skotes.exe 92 PID 2400 wrote to memory of 2152 2400 skotes.exe 98 PID 2400 wrote to memory of 2152 2400 skotes.exe 98 PID 2400 wrote to memory of 2152 2400 skotes.exe 98 PID 2400 wrote to memory of 3192 2400 skotes.exe 100 PID 2400 wrote to memory of 3192 2400 skotes.exe 100 PID 2400 wrote to memory of 3192 2400 skotes.exe 100 PID 3192 wrote to memory of 2324 3192 9b7c2e85c2.exe 101 PID 3192 wrote to memory of 2324 3192 9b7c2e85c2.exe 101 PID 3192 wrote to memory of 2324 3192 9b7c2e85c2.exe 101 PID 3192 wrote to memory of 1888 3192 9b7c2e85c2.exe 105 PID 3192 wrote to memory of 1888 3192 9b7c2e85c2.exe 105 PID 3192 wrote to memory of 1888 3192 9b7c2e85c2.exe 105 PID 3192 wrote to memory of 3284 3192 9b7c2e85c2.exe 107 PID 3192 wrote to memory of 3284 3192 9b7c2e85c2.exe 107 PID 3192 wrote to memory of 3284 3192 9b7c2e85c2.exe 107 PID 2400 wrote to memory of 4868 2400 skotes.exe 109 PID 2400 wrote to memory of 4868 2400 skotes.exe 109 PID 2400 wrote to memory of 4868 2400 skotes.exe 109 PID 3192 wrote to memory of 4372 3192 9b7c2e85c2.exe 110 PID 3192 wrote to memory of 4372 3192 9b7c2e85c2.exe 110 PID 3192 wrote to memory of 4372 3192 9b7c2e85c2.exe 110 PID 3192 wrote to memory of 4236 3192 9b7c2e85c2.exe 112 PID 3192 wrote to memory of 4236 3192 9b7c2e85c2.exe 112 PID 3192 wrote to memory of 4236 3192 9b7c2e85c2.exe 112 PID 3192 wrote to memory of 408 3192 9b7c2e85c2.exe 114 PID 3192 wrote to memory of 408 3192 9b7c2e85c2.exe 114 PID 408 wrote to memory of 4808 408 firefox.exe 115 PID 408 wrote to memory of 4808 408 firefox.exe 115 PID 408 wrote to memory of 4808 408 firefox.exe 115 PID 408 wrote to memory of 4808 408 firefox.exe 115 PID 408 wrote to memory of 4808 408 firefox.exe 115 PID 408 wrote to memory of 4808 408 firefox.exe 115 PID 408 wrote to memory of 4808 408 firefox.exe 115 PID 408 wrote to memory of 4808 408 firefox.exe 115 PID 408 wrote to memory of 4808 408 firefox.exe 115 PID 408 wrote to memory of 4808 408 firefox.exe 115 PID 408 wrote to memory of 4808 408 firefox.exe 115 PID 4808 wrote to memory of 1744 4808 firefox.exe 116 PID 4808 wrote to memory of 1744 4808 firefox.exe 116 PID 4808 wrote to memory of 1744 4808 firefox.exe 116 PID 4808 wrote to memory of 1744 4808 firefox.exe 116 PID 4808 wrote to memory of 1744 4808 firefox.exe 116 PID 4808 wrote to memory of 1744 4808 firefox.exe 116 PID 4808 wrote to memory of 1744 4808 firefox.exe 116 PID 4808 wrote to memory of 1744 4808 firefox.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NCU6L_file.exe"C:\Users\Admin\AppData\Local\Temp\NCU6L_file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 12965⤵
- Program crash
PID:760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 12765⤵
- Program crash
PID:4964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013296001\0bf5ad5ed9.exe"C:\Users\Admin\AppData\Local\Temp\1013296001\0bf5ad5ed9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 14684⤵
- Program crash
PID:3420
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013297001\12476ae905.exe"C:\Users\Admin\AppData\Local\Temp\1013297001\12476ae905.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\1013298001\9b7c2e85c2.exe"C:\Users\Admin\AppData\Local\Temp\1013298001\9b7c2e85c2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1988 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1400 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {96cb5ac2-c859-454a-a455-30338b383d3c} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" gpu6⤵PID:1744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2400 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7126ce8b-53ca-4084-8726-c60043540520} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" socket6⤵PID:1112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3092 -childID 1 -isForBrowser -prefsHandle 3084 -prefMapHandle 3080 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ce7c0e5-dfd2-4af6-a905-a8980ee9cbbd} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" tab6⤵PID:3968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4028 -childID 2 -isForBrowser -prefsHandle 4024 -prefMapHandle 4020 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {10b85e27-1d73-4020-b9d3-710f0e83af56} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" tab6⤵PID:2952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4836 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4832 -prefMapHandle 4828 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f876b85b-12a3-47d6-9d0d-10432ca72c9b} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" utility6⤵
- Checks processor information in registry
PID:5636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5152 -childID 3 -isForBrowser -prefsHandle 5268 -prefMapHandle 5336 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ccd4f496-7818-48fe-851d-a8bf4ffdce5f} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" tab6⤵PID:4840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5464 -childID 4 -isForBrowser -prefsHandle 5192 -prefMapHandle 5432 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7aa44b9-29a9-486b-840a-edb49d14373c} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" tab6⤵PID:4684
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5612 -childID 5 -isForBrowser -prefsHandle 5716 -prefMapHandle 5712 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5bd44727-128e-4053-9cfd-7d5bf196b65f} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" tab6⤵PID:3280
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013299001\1c9ff57fbc.exe"C:\Users\Admin\AppData\Local\Temp\1013299001\1c9ff57fbc.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 348 -ip 3481⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 348 -ip 3481⤵PID:4024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3388 -ip 33881⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5844
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6140
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json.tmp
Filesize21KB
MD5505b777907e47b699b09c7cfbfdb5f4e
SHA12dafa473dce133f81bd8f7247f53b7a2845eb3e9
SHA256be65aa85b48bc26f13ff66d0283bec8b36ca59d40dbc06da4b52e6e5bdde21de
SHA512abdf431ee96a4662064a8d9550a91eb18d3637fe0f9ace9ffa27c1c99661ac21d913927b151e1fc2f9f053823a67fe9548980429163d395e4180853ad840503d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD50162210124f3de6ef0091b6e8c68d93f
SHA16b6b3e5a027e1c97014ebcdd9f2e438bfb40af34
SHA2565ec1a365549125827033f412bf3da3eb40ea1eaa94a4bab471778dbc26fbd681
SHA5120f88864a123292bbc20c923e3716aeee1de34b9472a8c5ba5646b1ae6c3c0b1df7f8d14865cab5670dbf1fdbb48af86b0f369955fc5027d4c5c76d1bfdbe4dcd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
809KB
MD5ec31a091e3c06294cade73a10d5cae88
SHA10eadea9ac15955c791ad35ebb2719fb632ce0197
SHA25623f46ec28302b106fa23d1db2a513875c7157b803cf32f4f3f94e51ed4ba2d83
SHA512827499e195dfea6bbbcd3e92dff81dab77d32418eaa9438fe66d6c35df2c7736b5842afb83e892a2f1c84e8fba1b53f3f300a1b9ed465ecbf2cb55b6544cc328
-
Filesize
1.8MB
MD53607c287370e7eb4760246cbc75adbe6
SHA1e8541956199c15aa81a602db4301b4a1f02fa4f3
SHA256e2b49556f43e1cd444d6041bd38996aefcb64ec2f9755c385c4b5a24f07ebcd2
SHA512d29d5740c49e496e45b8cb81043627d917dc3ee19012b570352425e8456155b0e3e0e46711e79e730908db37aeaca18a06b24e4a67be002393b02c0224032945
-
Filesize
1.7MB
MD500926a74fa19319e5c75842afe896fa3
SHA1d4eef1627bead97e3379d0e5ced75d936c602640
SHA256348088c4820114366faca2c322b6f1f735860588697a415092740c1e458e01cd
SHA512eeaec1c57717a8bc23e7c4c39e9a7bb3e0fcf6d915b8abbef119f2261e11fc824e73e5c91a30b51abad7739690a2c7a5a924dae636e9973021625d1775606b26
-
Filesize
945KB
MD54319680727851964cfe16267b4493342
SHA1ed683c73bcebce2e952361518c0819db84f36b0a
SHA256f38b0267bec42be6f0008bfa0744efe3a8b65f5cc79be5dbc83bee49b287c2ec
SHA5129433e6c4602385856728c6f156eab9226230c7766d81f9a1efd64c530bc58708d417abac9123e8d717c26f9fe6174772bae7ada3ff1b69c06ef33081c52fa824
-
Filesize
2.7MB
MD5e1b458a6ffc47c5b7fedb14529e86a22
SHA1bd78e04773409aebb2ba454df3bcbe95b014fe94
SHA256a76b7c363728eaf349d34fce610b8cd7dd9094985bed0c572b8a550926ee241c
SHA512ddb830722919d6c10f595b893385af61a018c862cc3c821435d5c851e1ebe092e214afcb815a232ee3e94a7c480e4d58b48334c3c728c954ba7e6f2046eebb2d
-
Filesize
3.1MB
MD5402ab18478d4b4375a8145d45d47cf47
SHA131ca2191e74e0ff586cf5032a36aa3e99f9259ca
SHA256126fe752552aee79b622ca8edcb119b01b86113f11765bcfc9943ca24a95aded
SHA512021da29feedbca174af347912a76764ae377b7a94c29f34c940dd7f347c405643913cafc61fb1b47bc7a22d46b5bdd385360252d5ed6b62f57bfde90279971c4
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize8KB
MD5d749f44aa6b71b9700b7a47fab1392b1
SHA1c7278140083c980920c01056fa6c9758964da1aa
SHA256cc172cde6db9d65499fcae13905c8a601ec49154f8a1c7fb0f9b30d379ef4e3d
SHA5124fce265fae827392402c01e0efcdf27770f8adaf8c6e9b86466022ff60623253238b3be1632a054aa72e99a2cba72efa8762f3603e210ce7da4bdcb7b1067300
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD533241168d164339471754b8023492dbf
SHA1661f343dc45ac5acc68cfb4875bed5952f5d5a36
SHA2568975b3668a81f1782ba3fdb39e78480a294213d8b5c41a77b4074868698e893a
SHA5128924124540630162be26ffd5ef7a2f06c20bf253c01137e6e2e9769864a3f39cf98f5208112e7f3ef28671f4a643699681090940e9791501524afae8cbd8d5f3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD58d6d10245bb4bfbd0a32924937ed479c
SHA1f0f39b6a2211afe5f759f462af164d099c0fc553
SHA256e9caae6eb27eae33d28d64fd6de36dd84663805e95d8211dcd20a0c9f62d500c
SHA5120ef2b882e6243e5fd8f39bd3e6ae9dc03b3c0c703d3048920817285ff90ecba7f01ce0f6bd53e8c479425e348ba188d59ce59019b1dce542c57d1372a0db7f5c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5d25c930bbf4b6d6f61d0bce0b8f71c39
SHA161b12a364cf0891a289966b9f7f47e7226649463
SHA256ea25782ef3d09b58b6e7fca57acb7ed20860e3a5e5d37bf589f2fe51c66f3c97
SHA5120e233fc204e3cae9f4041c8fac4b14aa64fac18dc5bec646b9d8f7c5c2b776c9be7f4c3dccb43d898777fb5f960e641ccdec14a13289382ddd5202101ba5b570
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5b36e7d9de7315e58be14f098aee38be3
SHA113d2e1678535c289fd4db19fb2f382e2a2e7761d
SHA2568548a4172833f559f48767d123c53e149fc0bdea98bbcc43246fbe3388349ecc
SHA512f10d0d1da36c76e65f0f3448f0739c0e972de1c741c61d4e0925aedba33ba7166a8ee33fbe1a19af34f69f47be5ad5b9eb14cb73a0ccc65bef9c481e8fcd3de8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\1c3d2fe9-5765-485e-9729-60c1a1104023
Filesize982B
MD503cd1a3cf9b3e4318bb4ba8f4e476bab
SHA1fb63edc5683d834c0d7f6d0e71548b6f003af2a4
SHA25620642b36683ef03ed7fb75f22d3277d6ca0723e21086f597cd5092ebe6d39a75
SHA512f5394eff095488b8b80fff7268251a79e8ef8507946d07a41bc2b1c0e527d564a1f0b9503199390f115fe4407e1fcca703e0c522394d3ca2e12279719215ce48
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\b6d913bd-7d78-41b6-a7cf-8c907654c1c0
Filesize671B
MD5e208bcc6b3c5ef3cdf2b7975a5a7cd02
SHA127bd49065933ac38d2b5c3e58da1751df17ded92
SHA2560f8f0cc20490193fff4efcf1c3348a5af62ab27015e30ae458e74739fb0c6ec6
SHA5125a1b77e7892cc6c03fc7e235c0ca40f697f2afb2038f4eca4180224d10566c189222e23905b3aa3686c0d067f345aa6049547e6161220044de12d216698ed393
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\cdd64820-8b10-4803-93b7-ee9a94fbcdb5
Filesize26KB
MD5756615524534e6c043d50ff583834673
SHA1780ee7c4bfcd58ad9a34f74e3dc3f31dc8d8302e
SHA256b8534eaf436198202b4ae9f85a348b458668db02d26ef5d7bf2521b00025c950
SHA51294f38b9ed95c7fd5a3575d8e6635f59943432cbf1f3ef9aff6f6c86c17b3ea3e110c5d4a44449abe8e7449ea6872000181a255047f6f94f13f8c1832893ef0e8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5aaf8818848314541a7bd7cf2b15adc79
SHA1f483af5d208730483fe32347f46636a561630454
SHA2567090854508d956cfe770442b56e69a68073f21e63addcd1d68bd7db6d88ce7aa
SHA512ce857ab576b63e3c17cde7372cde253799d1ef941b2a5a84873690367b97c353c7bb0487e88f3398d54a9409f2d8785e47b6d34858c1b98a8f66964ca8a7e73c
-
Filesize
15KB
MD552ba04817dbeaef3edcece0306aec011
SHA1eb85729731b28b4f280fe1abd5982e2be6bb8a05
SHA25636ac14fbb1032b9346f2a8c45aecfe42112787b4d721a5336099a162235c3e8d
SHA512387cc66dd073af0f0bd2820a06eb9fd5a3e7de5635016695cbfee892941389c9b456f8e05bc96b2c0027092571a7c9e79c00efec92a2242f2cd2475eeace11c0
-
Filesize
10KB
MD51bcc49b8b2bef59b598acdcdcdeea425
SHA1b71ae9ae249388cfc1d5b64809c18663d9463fb9
SHA2569045f6348ce9100386cad15499f4e155292ff44b69a8d4b2c8400d40ced3e25e
SHA512c058bf005bb95f5405b5028eafa16dfbff7b392fdcaa77b8ee893e6c8085b8fc501c16a5134775af13a477b04b6a9b911fba7272828d4f9e3b4d525f16fff91d
-
Filesize
10KB
MD526b37dd55702613169df1b242f66939a
SHA1bf4b703823d95472d8fff6f19727dc4d7260643f
SHA25650de75e4630f345b0ced23c0b1539ca88321df368913fe9f606bab4f8f5f9a3d
SHA512047caf559eff554005d7387f5ffd69a02405f912b55b80ca17a193c0fb4c901b222ee58c816d0afcbf47e32bb07517822e7ffadc4ae7ca777ee3b560a4a9b254