Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 05:40
Static task
static1
Behavioral task
behavioral1
Sample
df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe
Resource
win7-20240903-en
General
-
Target
df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe
-
Size
3.1MB
-
MD5
e31ee403fbe876b9de85855509f5107b
-
SHA1
79cd398dd4df952a34c3b5d410ae4b9a24f62dc7
-
SHA256
df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e
-
SHA512
5a8dd562485397263618d2a3eac206ec7e308f371b1440a9cd3f8cd231fa3d860c01585647e3e5f886fd2a8a4e56461e6ac8403da6a66c243c075216ef6f0a79
-
SSDEEP
49152:iM+u3YQHyvxciEAB6fRz2/vcg8khrH8AbskQ9sVeOX1lnpWyQL+oW3oG:T+jmyvhf+23cg8khrHPbVQ9sF1nWnB
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 7abcb9f007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7abcb9f007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 7abcb9f007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7abcb9f007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7abcb9f007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7abcb9f007.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 570f2c074d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 58f8ce583f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7abcb9f007.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 58f8ce583f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 570f2c074d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 570f2c074d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7abcb9f007.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 58f8ce583f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7abcb9f007.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 8 IoCs
pid Process 2468 skotes.exe 1620 570f2c074d.exe 3204 58f8ce583f.exe 4584 f6e303001c.exe 5364 7abcb9f007.exe 5592 skotes.exe 5888 skotes.exe 3596 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 570f2c074d.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 58f8ce583f.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 7abcb9f007.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7abcb9f007.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 7abcb9f007.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\570f2c074d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003564001\\570f2c074d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\58f8ce583f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003565001\\58f8ce583f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f6e303001c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003566001\\f6e303001c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7abcb9f007.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003567001\\7abcb9f007.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cc7-65.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4064 df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe 2468 skotes.exe 1620 570f2c074d.exe 3204 58f8ce583f.exe 5364 7abcb9f007.exe 5592 skotes.exe 5888 skotes.exe 3596 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 570f2c074d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58f8ce583f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7abcb9f007.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6e303001c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4972 taskkill.exe 4928 taskkill.exe 1772 taskkill.exe 1104 taskkill.exe 4164 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4064 df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe 4064 df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe 2468 skotes.exe 2468 skotes.exe 1620 570f2c074d.exe 1620 570f2c074d.exe 3204 58f8ce583f.exe 3204 58f8ce583f.exe 4584 f6e303001c.exe 4584 f6e303001c.exe 4584 f6e303001c.exe 4584 f6e303001c.exe 5364 7abcb9f007.exe 5364 7abcb9f007.exe 5364 7abcb9f007.exe 5364 7abcb9f007.exe 5364 7abcb9f007.exe 5592 skotes.exe 5592 skotes.exe 5888 skotes.exe 5888 skotes.exe 3596 skotes.exe 3596 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4164 taskkill.exe Token: SeDebugPrivilege 4972 taskkill.exe Token: SeDebugPrivilege 4928 taskkill.exe Token: SeDebugPrivilege 1772 taskkill.exe Token: SeDebugPrivilege 1104 taskkill.exe Token: SeDebugPrivilege 2356 firefox.exe Token: SeDebugPrivilege 2356 firefox.exe Token: SeDebugPrivilege 5364 7abcb9f007.exe Token: SeDebugPrivilege 2356 firefox.exe Token: SeDebugPrivilege 2356 firefox.exe Token: SeDebugPrivilege 2356 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4064 df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe 4584 f6e303001c.exe 4584 f6e303001c.exe 4584 f6e303001c.exe 4584 f6e303001c.exe 4584 f6e303001c.exe 4584 f6e303001c.exe 4584 f6e303001c.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 4584 f6e303001c.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 4584 f6e303001c.exe 4584 f6e303001c.exe 4584 f6e303001c.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4584 f6e303001c.exe 4584 f6e303001c.exe 4584 f6e303001c.exe 4584 f6e303001c.exe 4584 f6e303001c.exe 4584 f6e303001c.exe 4584 f6e303001c.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 4584 f6e303001c.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 2356 firefox.exe 4584 f6e303001c.exe 4584 f6e303001c.exe 4584 f6e303001c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2356 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4064 wrote to memory of 2468 4064 df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe 87 PID 4064 wrote to memory of 2468 4064 df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe 87 PID 4064 wrote to memory of 2468 4064 df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe 87 PID 2468 wrote to memory of 1620 2468 skotes.exe 94 PID 2468 wrote to memory of 1620 2468 skotes.exe 94 PID 2468 wrote to memory of 1620 2468 skotes.exe 94 PID 2468 wrote to memory of 3204 2468 skotes.exe 100 PID 2468 wrote to memory of 3204 2468 skotes.exe 100 PID 2468 wrote to memory of 3204 2468 skotes.exe 100 PID 2468 wrote to memory of 4584 2468 skotes.exe 101 PID 2468 wrote to memory of 4584 2468 skotes.exe 101 PID 2468 wrote to memory of 4584 2468 skotes.exe 101 PID 4584 wrote to memory of 4164 4584 f6e303001c.exe 102 PID 4584 wrote to memory of 4164 4584 f6e303001c.exe 102 PID 4584 wrote to memory of 4164 4584 f6e303001c.exe 102 PID 4584 wrote to memory of 4972 4584 f6e303001c.exe 104 PID 4584 wrote to memory of 4972 4584 f6e303001c.exe 104 PID 4584 wrote to memory of 4972 4584 f6e303001c.exe 104 PID 4584 wrote to memory of 4928 4584 f6e303001c.exe 106 PID 4584 wrote to memory of 4928 4584 f6e303001c.exe 106 PID 4584 wrote to memory of 4928 4584 f6e303001c.exe 106 PID 4584 wrote to memory of 1772 4584 f6e303001c.exe 108 PID 4584 wrote to memory of 1772 4584 f6e303001c.exe 108 PID 4584 wrote to memory of 1772 4584 f6e303001c.exe 108 PID 4584 wrote to memory of 1104 4584 f6e303001c.exe 110 PID 4584 wrote to memory of 1104 4584 f6e303001c.exe 110 PID 4584 wrote to memory of 1104 4584 f6e303001c.exe 110 PID 4584 wrote to memory of 2100 4584 f6e303001c.exe 112 PID 4584 wrote to memory of 2100 4584 f6e303001c.exe 112 PID 2100 wrote to memory of 2356 2100 firefox.exe 113 PID 2100 wrote to memory of 2356 2100 firefox.exe 113 PID 2100 wrote to memory of 2356 2100 firefox.exe 113 PID 2100 wrote to memory of 2356 2100 firefox.exe 113 PID 2100 wrote to memory of 2356 2100 firefox.exe 113 PID 2100 wrote to memory of 2356 2100 firefox.exe 113 PID 2100 wrote to memory of 2356 2100 firefox.exe 113 PID 2100 wrote to memory of 2356 2100 firefox.exe 113 PID 2100 wrote to memory of 2356 2100 firefox.exe 113 PID 2100 wrote to memory of 2356 2100 firefox.exe 113 PID 2100 wrote to memory of 2356 2100 firefox.exe 113 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 PID 2356 wrote to memory of 2892 2356 firefox.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe"C:\Users\Admin\AppData\Local\Temp\df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\1003564001\570f2c074d.exe"C:\Users\Admin\AppData\Local\Temp\1003564001\570f2c074d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\1003565001\58f8ce583f.exe"C:\Users\Admin\AppData\Local\Temp\1003565001\58f8ce583f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\1003566001\f6e303001c.exe"C:\Users\Admin\AppData\Local\Temp\1003566001\f6e303001c.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c7336a7f-7aa4-4428-9028-6516ba96090a} 2356 "\\.\pipe\gecko-crash-server-pipe.2356" gpu6⤵PID:2892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bc985a6d-71cf-44cd-9ff9-aeb9d265f567} 2356 "\\.\pipe\gecko-crash-server-pipe.2356" socket6⤵PID:3740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3064 -childID 1 -isForBrowser -prefsHandle 2792 -prefMapHandle 3132 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc10d6b5-d4a4-4c68-97d2-09184293163b} 2356 "\\.\pipe\gecko-crash-server-pipe.2356" tab6⤵PID:1232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3908 -childID 2 -isForBrowser -prefsHandle 1240 -prefMapHandle 2580 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c7577cbf-2b0f-4d65-8f48-fead14166b6b} 2356 "\\.\pipe\gecko-crash-server-pipe.2356" tab6⤵PID:3396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4876 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4592 -prefMapHandle 4912 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ccdbe2fe-81de-40d7-a01c-39b535f163e4} 2356 "\\.\pipe\gecko-crash-server-pipe.2356" utility6⤵
- Checks processor information in registry
PID:5612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4820 -childID 3 -isForBrowser -prefsHandle 5484 -prefMapHandle 5440 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee007f41-b566-489e-9186-8132443adec8} 2356 "\\.\pipe\gecko-crash-server-pipe.2356" tab6⤵PID:1280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5624 -childID 4 -isForBrowser -prefsHandle 5708 -prefMapHandle 4960 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {820dbd5d-cee1-45ce-bec6-b2a1b594529e} 2356 "\\.\pipe\gecko-crash-server-pipe.2356" tab6⤵PID:4972
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5852 -childID 5 -isForBrowser -prefsHandle 4820 -prefMapHandle 5592 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd35eebf-552b-4c00-8d50-3c20c2cfae19} 2356 "\\.\pipe\gecko-crash-server-pipe.2356" tab6⤵PID:3560
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003567001\7abcb9f007.exe"C:\Users\Admin\AppData\Local\Temp\1003567001\7abcb9f007.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5364
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5592
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5888
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3596
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5ce0e0bba831e12a8139c9d73dfe9d47e
SHA1bef0d221ea654abb210df717041dcc5bd4f6059a
SHA25670591716aa7f657fc1fb189d61ab1dc391c41a583b7f73f6a44e0d810084a7a1
SHA512a5e9911597c34d02e9f1a18a69813e7a6d4384cbd3cd796f658fd0f2ea0f12e8d52400329613d132e9da046a931da5608e5e378003a7bc70db169644694a85e6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD511d9eb28ed8a61145f375efb87e3b70a
SHA1b534993c01c8464620f21344f779e09bcf2d67e2
SHA25608046b4c1d87a75222e8eefb06a09a5d4afdea7601a7d0597e3d8599198d64ad
SHA5125ba5f039489dfea0fd824a2d5c28b4cf39d08fd282ac09a5d937685bd559523181cfab6f2d120637f9ed5587ba5a06b32faee907fa39b5b1bdeefb4737f277d2
-
Filesize
2.8MB
MD5fcdddded82c79635df9aa2bcf9fa9faa
SHA1ffcd7cf8d64b608307e378afbdb39791875cc564
SHA256e878d4e2dcc874044a92756c32ff332a48a10657f79d1fa13cbbc5873b9d5285
SHA512b0f5e17c3355c2b476c7147a7c28eaa2cc133b457a2c1941d47af955be24ac20926617563df5dd4a9a9ca238d90fa3960cb0a145ea34e914d80d10e39a6260ff
-
Filesize
2.1MB
MD5437db66fdc45133e7d1728892daa09b3
SHA1ec9694ac1f7a3161fb372eb3b8835483823408c7
SHA256575f6501ea602da4a781826d81db8c8274f546fcf7528609ba14ac0e38d5d4ff
SHA512dc9499be979c769d53aa465b224a8ea150d93dee24dce0f4359e5a2ef11400122f0d0a511dba1ef9425b670298bf8af03e42c39a4389b0e3a11c0c8bdab8d7e8
-
Filesize
898KB
MD556e76255a59cc356979498c785bf4c00
SHA182d689ac60630cacf938c49c5fd0409b40f34b1a
SHA256a4af94bf201e48a2a1242d2aea128aff328fbeb5ebd13faebdec74de3717bce3
SHA5121bf5751a43b38118be228b46c138e17dab414b025b265f5fb21f0c469108877c26e21d737a87cbf0277ef2868b8539f9b986060d9464ce5d018fc2421c5112fc
-
Filesize
2.6MB
MD56354373133352ba01002bf37447a6c5d
SHA1cd4133e43fee19def2e0a31aa40f600b95c9dbbe
SHA2565ee74cad243bc459b9068894fa0fc05d40cc8466322315f0132c8275a78112f9
SHA512f7cf81c16ce5ceff2f6cd946896780c7f1f0e5ca78356c52d36e5079e62acb3e0d5970e32033029faac41fca73438e5a9c2d09264f9aa57dcacf4c1a483a3244
-
Filesize
3.1MB
MD5e31ee403fbe876b9de85855509f5107b
SHA179cd398dd4df952a34c3b5d410ae4b9a24f62dc7
SHA256df1403f3d4b6105f180e78e847c2590738feaacf5fcede63db2baeddc092197e
SHA5125a8dd562485397263618d2a3eac206ec7e308f371b1440a9cd3f8cd231fa3d860c01585647e3e5f886fd2a8a4e56461e6ac8403da6a66c243c075216ef6f0a79
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize11KB
MD53265703f9f484c62c73e2017300844c6
SHA1791095795b8ed36a44e3ed9581997fb8405a699b
SHA256eee3ff2138376eb1c0227be4c9968c69592bcd1f8751d63e4a8f6c0b5a142510
SHA51263459b6c1ac9d7326425130428121b3d7a6732cf7908d00b6b71a97707331d88757a2d8b3f73053151a1566260785f468a59689f631bc50a5b82c1f8a354c115
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD547e8e9bde38891f06efdf860eac0884d
SHA1d78bf638a230189c37594dc995003fcae6ec3945
SHA25686e6d60348cca295450e47ffce755d02336307c14156f15d2c537770be4ab030
SHA51286e86f8a14db828108478db8a2abcbd4d66ed3129973e7a8f826a775aa81e2a91fd00a9d116207336d886daaee008689bf5b602d74be1e7b090ba891d480837f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD57864b8bd6788b91e3e24266a1a8699a6
SHA18c9d062d57f5ba5a1201bd0c8916573b5a6dda06
SHA256b5de53aec37ec339e57cee91b31248fa570b59887c4fd9be56f08d199f6dea45
SHA512502d27748e155a010f96f83fb6d5a2c9a59de5a5d617680d1f0de446fa0336ff7d671fedf0487f21552c80a5ae039b89647aa9523f31cee2a2d025b8e62d1c6e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5e69dcea88d67892c4e36130533809663
SHA1f31ee3bb2974304933def328e5a7d115d8bedbf2
SHA2562ed3defb451d38683357c4a7d36a5f0aea0f43b6a9392e98744e43f5c55bcf80
SHA51269d07f445f45ab80f274d1a98deb915c7940f54fc6916cdc1b4b3fc897cb17eaa82c8551cb5f0fdad01452f2278c80f2b36020f0ab8e3f39ac737d7ffcdd060c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD56dca6cd28aa20f2019e2cf508e119b36
SHA1e39c7ab70fd1cc933e633843dfce26d8980c721d
SHA2568779192099d4b4755889d4dc8287c58a8eeecb78f6e9f4fc7f46bead669d519d
SHA5127ff8a0b580b4039019048aad15d4310386762996c9849b4451119c44ab5f61073396649405309e27e493c1c0bdbbb0a20c031f2a5e7d0b02c24660d121ee982c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\332151b2-e6cf-436a-83d1-6c76e0b75a7c
Filesize26KB
MD56fbc5295a0ee39ffc1e25a1706c0c682
SHA187edac083e97ddb9a1b481e617b3a315562aa6ee
SHA2566036139da8ebf095454ce659b399678e2b3a61c43ee4d8e7bb16129704e94bb0
SHA5123149be73b3dfe7d228024f15287e27af5883f56eb4cb0a96b3486ccb1da114eeab91e0de69d246e67f0b1ed42e25b94cc3dd3f571466b7e84b3f6557dbba3949
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\9c75b006-4845-423e-9c0b-0de99e47e33d
Filesize982B
MD5836ec28809a34979ea8720370c7387fb
SHA1d5abde7fef922df22fd4893408b16a6128179529
SHA256de31a95ceb225ae08cce8ce340c5a04d5bf3f04f4b21acb35ae1300f37c2f221
SHA512b1e0dc480b8741a8c4975e09241a820d60922c2b95a35d0790eca9fea3a67db020ab9136036f392b3ec509872f34ebea9ab0b243aaf975c374dd85cb88d5f3a0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\cc3d7661-848d-4b3e-816f-48fd9293fecf
Filesize671B
MD52f393332c17865c02dad8f2ece0b5957
SHA180065ed6e43b2c14b0c6ff2c257a01dff87d5489
SHA2568b39e554cc1ba010810e0bae0d92a355a33716d876c2e4431c6039e4420cdc9e
SHA512f31185c107addab745b1ddf2b37cfe816112c7452b62ddd2911a08f8b3df191b4b72676cde6b2aac31d8a5380263c92ed2ef804d7ab7bf7c38c7b0335a3e0aaf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5a58db3d331281402fce319722674542d
SHA1249cca60ea9e0c66e7b5b384df08b8f0f2a3a5e7
SHA256b18c5d16daa7e7b610f076f4413d2e7f30cf8cd30d74a4502ab720a96ed0d4ed
SHA5123a3c0fdb4accc38656afae85f3a31d959b00d2351678a301756691538132ae680c9d237f3013a90eafab3654ed6d0138dc354412329fb0b5452f69d155b48d1d
-
Filesize
15KB
MD5c074d85fb1b0671c23517ff164f910ae
SHA11b5f2539da6159977f5e85db56704a0df8d4b06d
SHA2561ad8e17a57490680dcc765035ee871351106fe43cd1fb118402fb61cc23e0b2f
SHA5122575a626afc2ed99f6007f96afd03dd1ab646bb84b8144f60a6bebc5241230eb249a26edc70ad07dc1eb3a93ba166947c6d5693626a09f02dfc2fcf91bb72f4b
-
Filesize
10KB
MD5a09d7d93a66be78eb30ef61948567fd0
SHA1e4d00d2a78e9bd57dfc4d099629dba81c524ee8a
SHA256f89e8493d29030c4623126f4e875bab23808c6077df12f606ce9291268aa0a0c
SHA512389a37e48da7ee59e7a5e301d641ba8ce869afcb4815753afa4dbc3a6bab46454194c7daff7a31710d39a33f5531684a9a7a6ee44ab279a303f87f5f6210a789