Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 02:54
Static task
static1
Behavioral task
behavioral1
Sample
ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe
Resource
win7-20240903-en
General
-
Target
ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe
-
Size
3.1MB
-
MD5
059d31dae180ed3ce3bc97bdbf011843
-
SHA1
a55f3a597c0aa542a00f048884e02dec56fbf70d
-
SHA256
ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee
-
SHA512
96947668016a99a4496fdfc33fad04d2759549e12799c434d5ca5f697916a28f76931fb0c01adf8450f1f017248add089ae5d0a295e250a625974a1a18c69bb6
-
SSDEEP
49152:fZWhO/EACdPe9MVILzd7BnZW/HsoKDzmB/i3FWEuK8fy0ItH:RWhOcAYPe9sILhBw/HAzM6FWDdfyd
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 35d92f5a79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 35d92f5a79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 35d92f5a79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 35d92f5a79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 35d92f5a79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 35d92f5a79.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e49c47f310.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c7bc846dbf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 35d92f5a79.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e49c47f310.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e49c47f310.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c7bc846dbf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c7bc846dbf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 35d92f5a79.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 35d92f5a79.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 7 IoCs
pid Process 3300 skotes.exe 1564 e49c47f310.exe 3980 c7bc846dbf.exe 3036 2a0012bb23.exe 5564 35d92f5a79.exe 5424 skotes.exe 5132 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine e49c47f310.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine c7bc846dbf.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 35d92f5a79.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 35d92f5a79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 35d92f5a79.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e49c47f310.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003766001\\e49c47f310.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c7bc846dbf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003767001\\c7bc846dbf.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2a0012bb23.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003768001\\2a0012bb23.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\35d92f5a79.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003769001\\35d92f5a79.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cba-69.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1740 ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe 3300 skotes.exe 1564 e49c47f310.exe 3980 c7bc846dbf.exe 5564 35d92f5a79.exe 5424 skotes.exe 5132 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e49c47f310.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7bc846dbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35d92f5a79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a0012bb23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3176 taskkill.exe 3868 taskkill.exe 4824 taskkill.exe 432 taskkill.exe 4664 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1740 ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe 1740 ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe 3300 skotes.exe 3300 skotes.exe 1564 e49c47f310.exe 1564 e49c47f310.exe 3980 c7bc846dbf.exe 3980 c7bc846dbf.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe 5564 35d92f5a79.exe 5564 35d92f5a79.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe 5564 35d92f5a79.exe 5564 35d92f5a79.exe 5564 35d92f5a79.exe 5424 skotes.exe 5424 skotes.exe 5132 skotes.exe 5132 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4664 taskkill.exe Token: SeDebugPrivilege 3176 taskkill.exe Token: SeDebugPrivilege 3868 taskkill.exe Token: SeDebugPrivilege 4824 taskkill.exe Token: SeDebugPrivilege 432 taskkill.exe Token: SeDebugPrivilege 4264 firefox.exe Token: SeDebugPrivilege 4264 firefox.exe Token: SeDebugPrivilege 5564 35d92f5a79.exe Token: SeDebugPrivilege 4264 firefox.exe Token: SeDebugPrivilege 4264 firefox.exe Token: SeDebugPrivilege 4264 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1740 ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 3036 2a0012bb23.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3036 2a0012bb23.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 3036 2a0012bb23.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe 3036 2a0012bb23.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4264 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1740 wrote to memory of 3300 1740 ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe 87 PID 1740 wrote to memory of 3300 1740 ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe 87 PID 1740 wrote to memory of 3300 1740 ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe 87 PID 3300 wrote to memory of 1564 3300 skotes.exe 95 PID 3300 wrote to memory of 1564 3300 skotes.exe 95 PID 3300 wrote to memory of 1564 3300 skotes.exe 95 PID 3300 wrote to memory of 3980 3300 skotes.exe 101 PID 3300 wrote to memory of 3980 3300 skotes.exe 101 PID 3300 wrote to memory of 3980 3300 skotes.exe 101 PID 3300 wrote to memory of 3036 3300 skotes.exe 102 PID 3300 wrote to memory of 3036 3300 skotes.exe 102 PID 3300 wrote to memory of 3036 3300 skotes.exe 102 PID 3036 wrote to memory of 4664 3036 2a0012bb23.exe 103 PID 3036 wrote to memory of 4664 3036 2a0012bb23.exe 103 PID 3036 wrote to memory of 4664 3036 2a0012bb23.exe 103 PID 3036 wrote to memory of 3176 3036 2a0012bb23.exe 105 PID 3036 wrote to memory of 3176 3036 2a0012bb23.exe 105 PID 3036 wrote to memory of 3176 3036 2a0012bb23.exe 105 PID 3036 wrote to memory of 3868 3036 2a0012bb23.exe 107 PID 3036 wrote to memory of 3868 3036 2a0012bb23.exe 107 PID 3036 wrote to memory of 3868 3036 2a0012bb23.exe 107 PID 3036 wrote to memory of 4824 3036 2a0012bb23.exe 109 PID 3036 wrote to memory of 4824 3036 2a0012bb23.exe 109 PID 3036 wrote to memory of 4824 3036 2a0012bb23.exe 109 PID 3036 wrote to memory of 432 3036 2a0012bb23.exe 111 PID 3036 wrote to memory of 432 3036 2a0012bb23.exe 111 PID 3036 wrote to memory of 432 3036 2a0012bb23.exe 111 PID 3036 wrote to memory of 3680 3036 2a0012bb23.exe 113 PID 3036 wrote to memory of 3680 3036 2a0012bb23.exe 113 PID 3680 wrote to memory of 4264 3680 firefox.exe 114 PID 3680 wrote to memory of 4264 3680 firefox.exe 114 PID 3680 wrote to memory of 4264 3680 firefox.exe 114 PID 3680 wrote to memory of 4264 3680 firefox.exe 114 PID 3680 wrote to memory of 4264 3680 firefox.exe 114 PID 3680 wrote to memory of 4264 3680 firefox.exe 114 PID 3680 wrote to memory of 4264 3680 firefox.exe 114 PID 3680 wrote to memory of 4264 3680 firefox.exe 114 PID 3680 wrote to memory of 4264 3680 firefox.exe 114 PID 3680 wrote to memory of 4264 3680 firefox.exe 114 PID 3680 wrote to memory of 4264 3680 firefox.exe 114 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 PID 4264 wrote to memory of 4960 4264 firefox.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe"C:\Users\Admin\AppData\Local\Temp\ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\1003766001\e49c47f310.exe"C:\Users\Admin\AppData\Local\Temp\1003766001\e49c47f310.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Users\Admin\AppData\Local\Temp\1003767001\c7bc846dbf.exe"C:\Users\Admin\AppData\Local\Temp\1003767001\c7bc846dbf.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\1003768001\2a0012bb23.exe"C:\Users\Admin\AppData\Local\Temp\1003768001\2a0012bb23.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7820ecf1-9cbb-4fbf-af12-a5b4362af745} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" gpu6⤵PID:4960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2416 -prefMapHandle 2412 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6cf5cdd3-3ef4-4b29-a4a2-5c93ebccfed6} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" socket6⤵PID:924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3160 -childID 1 -isForBrowser -prefsHandle 3164 -prefMapHandle 3052 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e38804f7-81a2-474b-985c-31fa431d8842} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" tab6⤵PID:3468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3996 -childID 2 -isForBrowser -prefsHandle 3992 -prefMapHandle 3988 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cc3e2ac8-1d6a-402c-837d-cfc74d66d1cd} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" tab6⤵PID:4996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4760 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4752 -prefMapHandle 4748 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {742c8793-dae5-42a1-bbec-0ea3b2e64c99} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" utility6⤵
- Checks processor information in registry
PID:5432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 3 -isForBrowser -prefsHandle 5348 -prefMapHandle 4736 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ca441ef2-ce4e-432e-bee6-764e2977b5fb} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" tab6⤵PID:2868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5272 -childID 4 -isForBrowser -prefsHandle 5492 -prefMapHandle 5500 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9877ff11-219a-4eae-9973-c405c68d4601} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" tab6⤵PID:4424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5240 -childID 5 -isForBrowser -prefsHandle 5656 -prefMapHandle 5660 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bdef97f5-e69c-47a6-8241-738e5ecf1d9b} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" tab6⤵PID:1488
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003769001\35d92f5a79.exe"C:\Users\Admin\AppData\Local\Temp\1003769001\35d92f5a79.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5564
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5424
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5132
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5334e42955fbfaba8e0417e9d60700542
SHA19e84403d123e237dd1f92265776883f6670e0e17
SHA25615f25d83713ef7fd2d84baa1b5a919803560f077061f8ed8baa38d8d6e74af2c
SHA512857d924c0b4b9b15c25b100021a210e50b89c081aea2becbaf6354c41a63312649c8a7d2c469c6fe6227a56b054f56950681606e4366125e1e23f04cbe4e8fb1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD54e5388b1714d425cc6b454f222e3fa52
SHA1f3a2608fbe354ea0d8d359991c40d92332fdf7f5
SHA25688dd9150055f00514cfb825289635db44a24d3a587eb109390d61b231b8def5a
SHA51264961e04f852f9c06c7c515fdd145da7fc4dc75e55f6c2080bd171a9e51dc95d5f1dd789b53b56063f0b7eab7d46d3267f824fe1080185e787c203a35cc3d5a2
-
Filesize
2.8MB
MD5c695df1872b28812321df9528ed0fe35
SHA10fb47357f0f8a70cf0b6f20c867d5bb210015e83
SHA256636832ede50a4ce20c3d26c15012738d15f833b823ae22cadf4615e44e892e04
SHA512a68ff1389bfa5a4aef3d3378dd6240ed6452128c1d1a849fdfd7662b2d400cd6a414f4a45b3d231c63db4a61ee39a6baded65df6e36ff9627d083dbddcbd7ad1
-
Filesize
2.0MB
MD565ed3bcfe7c423aef11ad136275bab5f
SHA1572cbb3be18d27ceacbcfedd09e40e51cfe598f7
SHA256b2aa0446dc6a4f25c4f083155b7b237d66a432f6255d65b85ab524f596935345
SHA512329a3406855b4585dd7b2413afa0ad2307980aafa2b5c00cdce2a835dc2dcc7e83b439b6e5f94f512494f8737a67413e64a0a9ac726496381f2d98143bf3d672
-
Filesize
898KB
MD560845adee5e2514fb5af9c237bd48c3c
SHA1ff5faaaad07a97a3d2621e21becb2609e5024ea4
SHA256e5ac0d2eead05e826ce20db24a9c0eadb3bb670057fb2a2aabb2f96d80ac462a
SHA512da2a8e52dce8639b82124df0cc12baea22558f73ac0260bf1f658f5313f4aba722ec9daebb3a165038b569699a14bbe422670b0c2a12572a61d7ca986804742e
-
Filesize
2.6MB
MD5a5e88327ec18398ba9d6b3983e13b504
SHA14d6b9eb7baee84c194151e37e44d59577963ed14
SHA2566399e569f025e58b95d7ea60ef9c3fadfd927c741173a6d024950d78f45aaa0f
SHA512916ce3998de3aeb60209d45e860ccbc69f9fcd2081f97692f0d8b6c0b6dc008418e01a2ab21537dfab93bb5bff9aa5e7d8a5aae8dc3e16ebd2aacdb7f3d6b660
-
Filesize
3.1MB
MD5059d31dae180ed3ce3bc97bdbf011843
SHA1a55f3a597c0aa542a00f048884e02dec56fbf70d
SHA256ce83aa5c8762fed96db6a856e665a69e7b3a296c228fc98885e51d6391ff6bee
SHA51296947668016a99a4496fdfc33fad04d2759549e12799c434d5ca5f697916a28f76931fb0c01adf8450f1f017248add089ae5d0a295e250a625974a1a18c69bb6
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize18KB
MD5392ef6aa4164ea3a49e3c4f5c892c41d
SHA1ee1a3cb81e414918256703ed428db65cdc6f242e
SHA256c3a24e9c44322a92dbfc181a93bf1d74998e65a4f21e0710d55d07890e52f1e5
SHA5120c47b9a7f166a355206e94bb38daf00e118854837966dde982aaaa384fe55a6e7d37a8704f2f38aba763d14f67d73f9775043bdde5ff1e3b362b0e4120c42e55
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize10KB
MD5ff282e6eabf5e66f2dd1838b063a5872
SHA1655976ad17d52a29f34b05647e4723f60ab6f3d3
SHA2564d8cecd8d574aa5edc08d6855bdb3f43717cd1fdc93a3cd0bc9c048b4e888418
SHA512bcbeace6f31ea42a032618c5af5f6f28d33765c5527a60514356863516dd4fe0eef7d6cbbf9a134b27d105819e7e616ee36b021bd5fbd775d735da17e28de026
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD509e8ae8a32a99ea5f7a7ee3d5aa0d6c1
SHA1b42169e17cd7925a68fe8bae59c912797b895aab
SHA256af7ed68a2ef5c13b3c6cbc02c930e8ed8cdb203fed22bb67c2459e4c846eafd5
SHA512c330f590c7a25a0177f0b379c4cde322c36438786241401c4ba45773c46e2ffb266d87506eafcc67b40f41c812f5a6dcbdfc9b4f2d38551e419c6712fd29cc17
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5138470a7f86b6a30f5a115130f458f80
SHA1d9a6f19b832eb5c848250e82018c728be5bff091
SHA2568e8be8fce04e4a65b3077709f1a1064ab56744977cbc26aed39137314b3a4132
SHA512f6ee8f7500088d7438f30378c8276a2fb5ed89195c8b732d2933fd81d45b264833238afcdb2ea6da97100237861dcaf29107eb95298a098beb3d65ce0e1c7e39
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5a5fb6273e3664ec830ea564f33ea4ff9
SHA129baed884de2f8ab5fae189a38f3a8b9307e3972
SHA25694981ab3eb2cbc9baf0b212265f2603e1fe227bc79c53aefd65b02044e5a2aa0
SHA5127aca64f17cba8d17bf1ec988e55ad033e0a6a41170b5820f7b623c23e41e0012de9e2092a81af7d1d4a879da4b1fd9df0a6915a9bc1289699e0d8d8d318b607e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\c114c1e4-6aed-496d-a88a-bd11c5c0aaef
Filesize982B
MD5693cd63337798d2b2f5e7031830025d3
SHA1ce20629783fb36674214a914dadc6b4ff8131db4
SHA2561982153f6197295ae80f61e34dad0a850aaa7d41e37a19bf58e30a9a5979f731
SHA512f978b6d60f471668c355fd861695f72ac97af9e2307bacf75ac7f774097fb9ed1c05feb58c8ed0cd311d973c668c1fbc907a6266d6c7268508f11970d6fb14a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\e8b09da6-ae53-4ddc-8a48-798e4baea9fe
Filesize659B
MD5e2e0331a95b376fac3278de819c1aa56
SHA1b50582580480c29849078b6625838f73002e2a96
SHA2567cbd093f2abb44229372a0e1e2243a00a29bb215b47b2e233eda497a69758eaa
SHA512a8a720c68c482a1963b71cc31c63b5384cb57e2074b0c9209812ab6a1424e921202c55fb4871d1df0549a01d0fb13932bc3bff3cb24e1902057a26caaceb7abd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD53861241aa447f60cc793338c67c133fa
SHA1c97554f6690fce8fbd921ac543eb7ef0e4f75b2f
SHA256fa7bcf6abe39e2077d57b95534e9e70ca3678acb3e3ab26030129c7a7c9a19be
SHA512e473a09d3be96662b007d777083a0bc0ceeb6416a9e0af113cb73f547ec9c0d000fd4a950b0ba88a75415ad258937e1f78d611bb72630f78bc5ff5f3c8297b4d
-
Filesize
12KB
MD58ffecba15449ad02ded70c6d656fb7c5
SHA11893e8dd2e9ee7782fcc5e28ea6958827416da9b
SHA2561404eaf5c189eab770e01a9177592d77c5cbc80e4a5916e3d3672db9fc0a01f3
SHA5129b65be9097cce8f1947b6cb220bb088e4a85a28fa61e0d92e4bc68ecd932923ae75776148bc08ba1af2351eef249147eab91c7382a61f317af4ba4b713149c55
-
Filesize
15KB
MD59aa78e495245adbd99afa76899b817ff
SHA15a6fef83c88f991fddea1767075ca65218eb55fa
SHA2567c1abfa45022f70f2cfd6e4cc0d0adf7ddacf40f26ac6adfbc6c826301f08c96
SHA512d01bebecc421f456c80caf3d93ff164bfb448c0daa416289640d1f0bdf777fd4c1747806152d93b0e4e41f165c753e79f3ba285034b83982426dcbfdb979dc32
-
Filesize
11KB
MD57942b7eb9b0f44839b32ee0e2e128fff
SHA1f5bc2f5e8969ece3f2381e18e3e2c31fcf2e0fdb
SHA2562e46189d385f137769ceb8ff6bdfa3e1e115f3ca23470cc8c8b6ffd9274d5c95
SHA51256a0d5359c7e00024fc4ed1c71b26c97a491f7f8c1fced4ecf66afb5e086a2829d770dd8d72898cbf06d0db5c29230a23c55ca79c88a7f6e75b64746b8ebc51e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.8MB
MD57f951c88f1c4c557ab463e9c4749ca38
SHA1834d83c94caa76b474a6a14af5f524744f579481
SHA2562c9cdf945be5d7b0676791be894e0b1f85bf28a4574a24967918e425b569a58e
SHA512df340c700c6d5cce4e830e603df70f4821efb41425b44b5ae3abbbf24b80f148d6ca8c6a3d7179ea0675ec3909da574f1fa3f4429fb6f110b46878d7437df756