Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 04:00
Static task
static1
Behavioral task
behavioral1
Sample
dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe
Resource
win7-20240708-en
General
-
Target
dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe
-
Size
1.8MB
-
MD5
1e33e63c356ac4032505c4a3f7157786
-
SHA1
d269e43d5e8439e0a033b3291963b478308f5934
-
SHA256
dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13
-
SHA512
68cba85d1100b31110d866edeb66d5066f12ab8e36e1aeaad78279edd31a013573fb377f364d9b0492aff3b0f2de95cf27dc6779cf14677bc349f4f55d6b04e6
-
SSDEEP
49152:NEmEI2wiR3hAOyNuf5PLgDQjzq9GnkyPzxJDMY:NEmH2Nhx7fdIdSPlJ4
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 110a644266.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 110a644266.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 110a644266.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 110a644266.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 110a644266.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 110a644266.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ df53e8cdbc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 110a644266.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9df850303f.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9df850303f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 110a644266.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion df53e8cdbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9df850303f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion df53e8cdbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 110a644266.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe -
Executes dropped EXE 8 IoCs
pid Process 2256 skotes.exe 4664 9df850303f.exe 3648 skotes.exe 2016 df53e8cdbc.exe 704 99459acc47.exe 4812 110a644266.exe 4540 skotes.exe 5276 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 9df850303f.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine df53e8cdbc.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 110a644266.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 110a644266.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 110a644266.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9df850303f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003548001\\9df850303f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\df53e8cdbc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003549001\\df53e8cdbc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\99459acc47.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003550001\\99459acc47.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\110a644266.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003551001\\110a644266.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c59-71.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4508 dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe 2256 skotes.exe 4664 9df850303f.exe 3648 skotes.exe 2016 df53e8cdbc.exe 4812 110a644266.exe 4540 skotes.exe 5276 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99459acc47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 110a644266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9df850303f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df53e8cdbc.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3068 taskkill.exe 4412 taskkill.exe 4136 taskkill.exe 5012 taskkill.exe 4380 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4508 dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe 4508 dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe 2256 skotes.exe 2256 skotes.exe 4664 9df850303f.exe 4664 9df850303f.exe 3648 skotes.exe 3648 skotes.exe 2016 df53e8cdbc.exe 2016 df53e8cdbc.exe 704 99459acc47.exe 704 99459acc47.exe 704 99459acc47.exe 704 99459acc47.exe 4812 110a644266.exe 4812 110a644266.exe 4812 110a644266.exe 4812 110a644266.exe 4812 110a644266.exe 4540 skotes.exe 4540 skotes.exe 5276 skotes.exe 5276 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4412 taskkill.exe Token: SeDebugPrivilege 4136 taskkill.exe Token: SeDebugPrivilege 5012 taskkill.exe Token: SeDebugPrivilege 4380 taskkill.exe Token: SeDebugPrivilege 3068 taskkill.exe Token: SeDebugPrivilege 2292 firefox.exe Token: SeDebugPrivilege 2292 firefox.exe Token: SeDebugPrivilege 4812 110a644266.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4508 dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe 704 99459acc47.exe 704 99459acc47.exe 704 99459acc47.exe 704 99459acc47.exe 704 99459acc47.exe 704 99459acc47.exe 704 99459acc47.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 704 99459acc47.exe 704 99459acc47.exe 704 99459acc47.exe 704 99459acc47.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 704 99459acc47.exe 704 99459acc47.exe 704 99459acc47.exe 704 99459acc47.exe 704 99459acc47.exe 704 99459acc47.exe 704 99459acc47.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 704 99459acc47.exe 704 99459acc47.exe 704 99459acc47.exe 704 99459acc47.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2292 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4508 wrote to memory of 2256 4508 dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe 85 PID 4508 wrote to memory of 2256 4508 dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe 85 PID 4508 wrote to memory of 2256 4508 dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe 85 PID 2256 wrote to memory of 4664 2256 skotes.exe 92 PID 2256 wrote to memory of 4664 2256 skotes.exe 92 PID 2256 wrote to memory of 4664 2256 skotes.exe 92 PID 2256 wrote to memory of 2016 2256 skotes.exe 101 PID 2256 wrote to memory of 2016 2256 skotes.exe 101 PID 2256 wrote to memory of 2016 2256 skotes.exe 101 PID 2256 wrote to memory of 704 2256 skotes.exe 102 PID 2256 wrote to memory of 704 2256 skotes.exe 102 PID 2256 wrote to memory of 704 2256 skotes.exe 102 PID 704 wrote to memory of 4412 704 99459acc47.exe 103 PID 704 wrote to memory of 4412 704 99459acc47.exe 103 PID 704 wrote to memory of 4412 704 99459acc47.exe 103 PID 704 wrote to memory of 4136 704 99459acc47.exe 105 PID 704 wrote to memory of 4136 704 99459acc47.exe 105 PID 704 wrote to memory of 4136 704 99459acc47.exe 105 PID 704 wrote to memory of 5012 704 99459acc47.exe 107 PID 704 wrote to memory of 5012 704 99459acc47.exe 107 PID 704 wrote to memory of 5012 704 99459acc47.exe 107 PID 704 wrote to memory of 4380 704 99459acc47.exe 109 PID 704 wrote to memory of 4380 704 99459acc47.exe 109 PID 704 wrote to memory of 4380 704 99459acc47.exe 109 PID 704 wrote to memory of 3068 704 99459acc47.exe 112 PID 704 wrote to memory of 3068 704 99459acc47.exe 112 PID 704 wrote to memory of 3068 704 99459acc47.exe 112 PID 704 wrote to memory of 1512 704 99459acc47.exe 114 PID 704 wrote to memory of 1512 704 99459acc47.exe 114 PID 1512 wrote to memory of 2292 1512 firefox.exe 115 PID 1512 wrote to memory of 2292 1512 firefox.exe 115 PID 1512 wrote to memory of 2292 1512 firefox.exe 115 PID 1512 wrote to memory of 2292 1512 firefox.exe 115 PID 1512 wrote to memory of 2292 1512 firefox.exe 115 PID 1512 wrote to memory of 2292 1512 firefox.exe 115 PID 1512 wrote to memory of 2292 1512 firefox.exe 115 PID 1512 wrote to memory of 2292 1512 firefox.exe 115 PID 1512 wrote to memory of 2292 1512 firefox.exe 115 PID 1512 wrote to memory of 2292 1512 firefox.exe 115 PID 1512 wrote to memory of 2292 1512 firefox.exe 115 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 PID 2292 wrote to memory of 1952 2292 firefox.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe"C:\Users\Admin\AppData\Local\Temp\dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\1003548001\9df850303f.exe"C:\Users\Admin\AppData\Local\Temp\1003548001\9df850303f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Users\Admin\AppData\Local\Temp\1003549001\df53e8cdbc.exe"C:\Users\Admin\AppData\Local\Temp\1003549001\df53e8cdbc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\1003550001\99459acc47.exe"C:\Users\Admin\AppData\Local\Temp\1003550001\99459acc47.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {72b4ab8d-fa65-4617-8ad6-13b788bdf8bc} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" gpu6⤵PID:1952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {457bdd81-71cf-457f-bcc7-df71622f4aed} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" socket6⤵PID:3332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3112 -childID 1 -isForBrowser -prefsHandle 3080 -prefMapHandle 3120 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf77d528-1481-46f7-8a34-f821f1bb3699} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" tab6⤵PID:4688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3980 -childID 2 -isForBrowser -prefsHandle 3972 -prefMapHandle 3968 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {40509aaf-43a5-4432-92f1-6b8680d201c5} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" tab6⤵PID:552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4728 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4748 -prefMapHandle 4692 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {50f58109-4228-461a-9bc3-9fa4fc1a3fc5} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" utility6⤵
- Checks processor information in registry
PID:5436
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5136 -childID 3 -isForBrowser -prefsHandle 5196 -prefMapHandle 5204 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf446577-24c1-44d5-9a95-875957db1b5f} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" tab6⤵PID:6052
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5328 -childID 4 -isForBrowser -prefsHandle 5336 -prefMapHandle 5340 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {407cac89-ee2b-423c-89d4-dd51467a2367} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" tab6⤵PID:6064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5520 -childID 5 -isForBrowser -prefsHandle 5528 -prefMapHandle 5532 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dfbdc8ef-ee29-48e8-b65e-4c897d300b69} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" tab6⤵PID:6076
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003551001\110a644266.exe"C:\Users\Admin\AppData\Local\Temp\1003551001\110a644266.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5276
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5a974d79cf5e1e149fa8c3d0f02790c79
SHA14b6dee522dc2a4bc659d3859f4025b81bb470b31
SHA256e8fad5dd3503a95051b984bfb808728bafad7bc07a4c40a0b0c39c99591950f0
SHA512803ae4dd5884c650945052d9e0339ad3a075563d85c92ca4f8ab8fcde514b9b3740f7b8766dd9f01c2fb5eadbf3a5dae47ee0735c28207b18fff704b54776fcb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD56470668d47d4fda37a7536f11f7d4fcf
SHA1a6a4044324fe2ff4c46d4759b5c272207d21e41f
SHA256ef5723ed20c7abce376637b118ea482039547e5e082dd301628b202cf13c9da1
SHA5128b1bf2de75d080a3014f8adffe50797fdb269ba53fbe41284cf0569e76d53210003f3a30327b712a8c46b0a6dce363c57531057b8f390b6548100389f07bdba6
-
Filesize
2.8MB
MD582930ec33f3b4a3d9763924d0e060e54
SHA15506a466ee0bde01f5b07fe00e6b1ce7cb53b78d
SHA256abb44519712f906ab7e337c9fab26534d3261c999dd7837ac56b1e61c56bfc84
SHA5122cef90fae2aaa018b0d5060cca31330179d0dcb7541b2640a81281076bc9e4faa5bef159dfd33f5c63924c108e31a32f1e4dcae1525de815c3c5b0412abfc9a6
-
Filesize
2.0MB
MD58c30a3972e4d5600e96c86b3d1eb906e
SHA1ad45d77307b96655da9caa9147e1cfc7c7bb0015
SHA256beda49bfe82dcbd8a63c66c3e7840919e0e8b883d5330e91e066c61a518a1ab9
SHA5129b1764a9728e31e27dd6f8bf96fb12e0d0b4bead286e4310eb8ee3a3ffe2a7b43a5d6fe102b908cb0d273c09441d467e3f0d632e600bebdf5c97881fe6fee596
-
Filesize
898KB
MD5c2647ed78c0ea89aef2c32aa4e0f7770
SHA19be41ba2467fc53a7eb5d34ed15bf11e392e89d0
SHA2566c4bf8dc2f2c1cccb9a2470f1610c11397fe168e55972eb0aaee7e77afd5d3d6
SHA512959c8a7f5ad8387200736043649c814ebd5948a25f0878d6d6cbb18396762959d13878a7002c2303abdab5a0fb54381aa3318529568717aff6c784a721d6abdf
-
Filesize
2.7MB
MD555d089adcef6d02f188a67f09a078f97
SHA1c61e9e0c50ae4977a937760c9e3ed19e8cab6863
SHA25613b53797e8ae8969a0fe2fa57463fae3727af51fe094904b0bd5c4ba22bfd262
SHA5127019795ea4693d7ce222618c980624b515efcdf9e0e2203df30156ca248cbe99f1f1637a747a40e27847a598119e0a38c4bd78db488fb0b19d3cb20da2b7f0b2
-
Filesize
1.8MB
MD51e33e63c356ac4032505c4a3f7157786
SHA1d269e43d5e8439e0a033b3291963b478308f5934
SHA256dc143828ace64c6a5de6fd23b99b0b5c73c49f3b1a2a1a585ec356ecd57eaf13
SHA51268cba85d1100b31110d866edeb66d5066f12ab8e36e1aeaad78279edd31a013573fb377f364d9b0492aff3b0f2de95cf27dc6779cf14677bc349f4f55d6b04e6
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize18KB
MD572799f2628db0cf509a2b4fff67df66c
SHA1bbe97e6c4e36e70229a7dc126d2a43e3c56ef727
SHA2560629d679e592cd15fdb060a944a3e1c12aa8de02e270803e2c6b6bda1558f56f
SHA5123b9f98ce94a21a3fa8c05e56c4008fcad3171fca81be25c113a5ac2deb8cb4e7d62837a7c69c358cc0a8406025a1241f13825adb154e0e60a3e9470450181cb0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize8KB
MD530df77b7f28646e9fb59be60221ea166
SHA197a1ee3bbb07dd04448576132cfea1acb0b590cf
SHA256ca9857b515a0f2f6059856aa9d331d0d20cd65ae60704a938076ba7106cef25d
SHA512011e2f5d779682265b9ad6036af17b99c99eb137bc6a6234e3cbab7e3aa8540906066fd2c397c9135a710b3c9f3e354367f23a73dd8871792a0da856fb5e5920
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD50184fef55bdc9c62d0e61269dd954f33
SHA1a883cd3d55ae5f3b635371364a7dc202184869cb
SHA2561f4b84b665a5659413f3dc7cb4a8ddd185cd9528d875673c7b49c2aadf7e9bb7
SHA5129a338eeebb81c2219eaef51b284f41876e3de0e5d9be1d7a4d4000e1ba230225ce0be29d30ea67cabd2ec3673d842bb1306b0c0c7a22cece785f797d92c2af71
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5b50df07fa0d40d409b76d951194bdb70
SHA1aa3b641899fccda70f68a227a8b871279b0fbc4c
SHA2569d5784d0e9caaf97a70fa6c1bee3803b490bf9945d595ab5f118871a674a0da0
SHA51255e318f43e1a731ab9efacbc14d7a453c21d3de3020e0d8ef341637ce0ce66bcefae17af7a93bdfa2f6b6fd3a7be7ec170fb0411f11e829a7910d99ed7f5d7a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\0af88a11-99bb-4fb0-bcb2-7ae2c3f2e314
Filesize982B
MD5bc62d759e21f2b2c13a326156b01fef1
SHA10e7858c67eace31668969ef7af3ed4c262012d89
SHA256aed2b34599ebf7fc2f3a84720ae3e585eb8e4ca9e9fd554757fa71f9d975d7f9
SHA512d66f7ca5a6b605e6261367bcfbb6c73a59e473d354909dc682a67b11209435ceceaabb2cf2787af6c31429fa3d725050ecbcf56c91ea786f06733901b808afd6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\9686b37d-1a23-4741-bc82-d39534e5b6a5
Filesize27KB
MD5a597d3a7cf07754b3ce841809ffd6e4b
SHA11b5c173964e993975fea8aa87e4308fbad3d54a4
SHA256601482fad9b40b650787f20ffe0b142cd2463dd0a9f380b99b294de72cc9d457
SHA512a424e09946a4be6101e0fe6b686e20d3c21d00192061a30c725e278dcc69003b5bcadb66ad80bec79e60556292c90179bf1bcbc1a4890cfb583ba6e4fe0cb702
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\fd8288ab-a3f4-454b-a7e6-a96b98ec3290
Filesize671B
MD5dd0e4b4fe882a83fc2c2f11bfacd3d03
SHA1e755844b169b397db9b526355fdf8491a35d974a
SHA25609062ef6f832f97b52449f13aa624275e0c1fb60b4566e679f5c4c65222d9c9f
SHA5122ba58205101954dd94453081597d02231fe89705168b3b7d705e87b53c501d8a2b0f26c4027319a3e812e1966bf8a620f5dc217367ef8f900ded772997c10282
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD599527f39d93dd73316273462c279a14f
SHA15d3a6b3368383019e066a69b8d4de64c768df9a6
SHA256652d7292fdbc601862fb0a31f32b08d4058d36aeda5df9afc0edd30252e9a360
SHA5127dd8bcae33cb5dbcfef5ab72aa99675b895bfe4941cc9017f195dd20a974b4c247297dd9c5b7e06a61c406b5b8fffb51622d9736cc48c902a50498d96c8e1a8d
-
Filesize
11KB
MD587ffc843f59df8900bb8b7b641a18615
SHA1fe9d5eb8fd66c8295b7b508ac83f8e5d906e5f60
SHA2569765a201f74ab615468f90ecf47a34135d5d8448cda1717d5e9928a7b16a29bf
SHA51290a757bfee5216f7198adc69cff7c30ce2a635e28e768179217f99bb0ca7f8ad24d486466c72d092f62273ab23acedb770570301b78a1c9f604934b19c1eb00e
-
Filesize
15KB
MD5e5bf68c3e5c02b8feff14e97105c5ef6
SHA16cd665ee946921c9593be96b38649b4c8e1b3fb7
SHA25688c76ce08bffb334ce89c25379466efe7a6247de9e80a71cd4d5c3d725727ace
SHA512e02069555eba8e332b87ac71cc522bacbd2977f786b12c7dccc40c95f3d564123edad881cce03e3a43aa0ee2193959c1683abaa41d03696aca4b584730f9b1c2
-
Filesize
10KB
MD5005ae5f64eee6351e335c68a0da36060
SHA16ca6ec90b2c9db992712d8433eefd5f71d63d869
SHA256c6d1c1e13cb029c21db59395880428a010a4247dceef4e1a5d59709695665bb0
SHA512bb24698ab5a3763daf76e9cd5ac22f29a1f612f944ab6da86cf5f7687e00e85e2b3e5c61db343730a46ebf3acc5de912eadf3787bad9268ddab47d98479036f6