Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 03:31
Static task
static1
General
-
Target
2IHJC_file.exe
-
Size
1.8MB
-
MD5
5ca58d76edc0e7291bf3d6bad7edbbe9
-
SHA1
694124bf2e8d817b7f188706bbc49d0088317fe2
-
SHA256
d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103
-
SHA512
82b990ce963247c140161ce9ab28c79c5b4d648ddf46d622e152e3c0d79842be1cf1009a493b7af37b83976f36c05b56e353c6f7166dfc701979f87447f51fad
-
SSDEEP
49152:JzqRbJAOwImTwJuvYsiI5kDbZF6j9FWHK:wRVA8xobiI566j9Aq
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/5268-3881-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 10c536af88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 10c536af88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 10c536af88.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 10c536af88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 10c536af88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 10c536af88.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2592 created 2568 2592 rh.exe 44 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2IHJC_file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6aaece7576.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 99ebbe1fd6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rh.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 10c536af88.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 56a8fcdd1e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4340 chrome.exe 5684 chrome.exe 5636 chrome.exe 5952 chrome.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 99ebbe1fd6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6aaece7576.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 10c536af88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2IHJC_file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 99ebbe1fd6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 10c536af88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 56a8fcdd1e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2IHJC_file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6aaece7576.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 56a8fcdd1e.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 2IHJC_file.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 56a8fcdd1e.exe -
Executes dropped EXE 14 IoCs
pid Process 1564 skotes.exe 4752 5468191780.exe 2592 rh.exe 2068 6aaece7576.exe 1144 skotes.exe 1548 99ebbe1fd6.exe 4072 04eae4b03b.exe 1100 10c536af88.exe 5268 56a8fcdd1e.exe 5660 DgMSV3E.exe 4264 skotes.exe 5812 service123.exe 4124 skotes.exe 5848 service123.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2IHJC_file.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 6aaece7576.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 10c536af88.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 56a8fcdd1e.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine rh.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 99ebbe1fd6.exe -
Loads dropped DLL 3 IoCs
pid Process 4752 5468191780.exe 5812 service123.exe 5848 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 10c536af88.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 10c536af88.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6aaece7576.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008610001\\6aaece7576.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\99ebbe1fd6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008611001\\99ebbe1fd6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\04eae4b03b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008612001\\04eae4b03b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\10c536af88.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008613001\\10c536af88.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0009000000023bde-259.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 5096 2IHJC_file.exe 1564 skotes.exe 2592 rh.exe 2068 6aaece7576.exe 1144 skotes.exe 1548 99ebbe1fd6.exe 1100 10c536af88.exe 5268 56a8fcdd1e.exe 4264 skotes.exe 4124 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4752 set thread context of 3224 4752 5468191780.exe 90 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 2IHJC_file.exe -
pid Process 3176 powershell.exe 1800 powershell.exe 1444 powershell.exe 3024 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3244 4752 WerFault.exe 88 3548 2592 WerFault.exe 96 3684 5268 WerFault.exe 135 -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5468191780.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10c536af88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56a8fcdd1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2IHJC_file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6aaece7576.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99ebbe1fd6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04eae4b03b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DgMSV3E.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 56a8fcdd1e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 56a8fcdd1e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 1436 taskkill.exe 1608 taskkill.exe 4848 taskkill.exe 3552 taskkill.exe 2596 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4184 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 5096 2IHJC_file.exe 5096 2IHJC_file.exe 1564 skotes.exe 1564 skotes.exe 2592 rh.exe 2592 rh.exe 2592 rh.exe 2592 rh.exe 2592 rh.exe 2592 rh.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 1800 powershell.exe 1800 powershell.exe 1444 powershell.exe 1444 powershell.exe 3024 powershell.exe 3024 powershell.exe 2068 6aaece7576.exe 2068 6aaece7576.exe 1144 skotes.exe 1144 skotes.exe 1548 99ebbe1fd6.exe 1548 99ebbe1fd6.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe 1100 10c536af88.exe 1100 10c536af88.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe 3176 powershell.exe 3176 powershell.exe 3176 powershell.exe 1100 10c536af88.exe 1100 10c536af88.exe 1100 10c536af88.exe 5268 56a8fcdd1e.exe 5268 56a8fcdd1e.exe 4264 skotes.exe 4264 skotes.exe 4340 chrome.exe 4340 chrome.exe 4124 skotes.exe 4124 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 1800 powershell.exe Token: SeDebugPrivilege 1444 powershell.exe Token: SeDebugPrivilege 3024 powershell.exe Token: SeDebugPrivilege 1436 taskkill.exe Token: SeDebugPrivilege 1608 taskkill.exe Token: SeDebugPrivilege 4848 taskkill.exe Token: SeDebugPrivilege 3552 taskkill.exe Token: SeDebugPrivilege 2596 taskkill.exe Token: SeDebugPrivilege 2224 firefox.exe Token: SeDebugPrivilege 2224 firefox.exe Token: SeDebugPrivilege 3176 powershell.exe Token: SeDebugPrivilege 1100 10c536af88.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 5096 2IHJC_file.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4072 04eae4b03b.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 2224 firefox.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe 4072 04eae4b03b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2224 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5096 wrote to memory of 1564 5096 2IHJC_file.exe 82 PID 5096 wrote to memory of 1564 5096 2IHJC_file.exe 82 PID 5096 wrote to memory of 1564 5096 2IHJC_file.exe 82 PID 1564 wrote to memory of 4752 1564 skotes.exe 88 PID 1564 wrote to memory of 4752 1564 skotes.exe 88 PID 1564 wrote to memory of 4752 1564 skotes.exe 88 PID 4752 wrote to memory of 3224 4752 5468191780.exe 90 PID 4752 wrote to memory of 3224 4752 5468191780.exe 90 PID 4752 wrote to memory of 3224 4752 5468191780.exe 90 PID 4752 wrote to memory of 3224 4752 5468191780.exe 90 PID 4752 wrote to memory of 3224 4752 5468191780.exe 90 PID 4752 wrote to memory of 3224 4752 5468191780.exe 90 PID 4752 wrote to memory of 3224 4752 5468191780.exe 90 PID 4752 wrote to memory of 3224 4752 5468191780.exe 90 PID 4752 wrote to memory of 3224 4752 5468191780.exe 90 PID 4752 wrote to memory of 3224 4752 5468191780.exe 90 PID 4752 wrote to memory of 3224 4752 5468191780.exe 90 PID 4752 wrote to memory of 3224 4752 5468191780.exe 90 PID 4752 wrote to memory of 3224 4752 5468191780.exe 90 PID 4752 wrote to memory of 3224 4752 5468191780.exe 90 PID 4752 wrote to memory of 3224 4752 5468191780.exe 90 PID 1564 wrote to memory of 2592 1564 skotes.exe 96 PID 1564 wrote to memory of 2592 1564 skotes.exe 96 PID 1564 wrote to memory of 2592 1564 skotes.exe 96 PID 2592 wrote to memory of 224 2592 rh.exe 97 PID 2592 wrote to memory of 224 2592 rh.exe 97 PID 2592 wrote to memory of 224 2592 rh.exe 97 PID 2592 wrote to memory of 224 2592 rh.exe 97 PID 2592 wrote to memory of 224 2592 rh.exe 97 PID 1564 wrote to memory of 1800 1564 skotes.exe 100 PID 1564 wrote to memory of 1800 1564 skotes.exe 100 PID 1564 wrote to memory of 1800 1564 skotes.exe 100 PID 1564 wrote to memory of 1444 1564 skotes.exe 102 PID 1564 wrote to memory of 1444 1564 skotes.exe 102 PID 1564 wrote to memory of 1444 1564 skotes.exe 102 PID 1564 wrote to memory of 3024 1564 skotes.exe 104 PID 1564 wrote to memory of 3024 1564 skotes.exe 104 PID 1564 wrote to memory of 3024 1564 skotes.exe 104 PID 1564 wrote to memory of 2068 1564 skotes.exe 106 PID 1564 wrote to memory of 2068 1564 skotes.exe 106 PID 1564 wrote to memory of 2068 1564 skotes.exe 106 PID 1564 wrote to memory of 1548 1564 skotes.exe 109 PID 1564 wrote to memory of 1548 1564 skotes.exe 109 PID 1564 wrote to memory of 1548 1564 skotes.exe 109 PID 1564 wrote to memory of 4072 1564 skotes.exe 111 PID 1564 wrote to memory of 4072 1564 skotes.exe 111 PID 1564 wrote to memory of 4072 1564 skotes.exe 111 PID 4072 wrote to memory of 1436 4072 04eae4b03b.exe 112 PID 4072 wrote to memory of 1436 4072 04eae4b03b.exe 112 PID 4072 wrote to memory of 1436 4072 04eae4b03b.exe 112 PID 4072 wrote to memory of 1608 4072 04eae4b03b.exe 114 PID 4072 wrote to memory of 1608 4072 04eae4b03b.exe 114 PID 4072 wrote to memory of 1608 4072 04eae4b03b.exe 114 PID 4072 wrote to memory of 4848 4072 04eae4b03b.exe 116 PID 4072 wrote to memory of 4848 4072 04eae4b03b.exe 116 PID 4072 wrote to memory of 4848 4072 04eae4b03b.exe 116 PID 4072 wrote to memory of 3552 4072 04eae4b03b.exe 118 PID 4072 wrote to memory of 3552 4072 04eae4b03b.exe 118 PID 4072 wrote to memory of 3552 4072 04eae4b03b.exe 118 PID 4072 wrote to memory of 2596 4072 04eae4b03b.exe 120 PID 4072 wrote to memory of 2596 4072 04eae4b03b.exe 120 PID 4072 wrote to memory of 2596 4072 04eae4b03b.exe 120 PID 4072 wrote to memory of 3692 4072 04eae4b03b.exe 122 PID 4072 wrote to memory of 3692 4072 04eae4b03b.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2568
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\2IHJC_file.exe"C:\Users\Admin\AppData\Local\Temp\2IHJC_file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\1008450001\5468191780.exe"C:\Users\Admin\AppData\Local\Temp\1008450001\5468191780.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 10124⤵
- Program crash
PID:3244
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008496001\rh.exe"C:\Users\Admin\AppData\Local\Temp\1008496001\rh.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 5364⤵
- Program crash
PID:3548
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008595041\nig47lK.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008608041\J2W0oF3.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008609041\EM2BsXU.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\1008610001\6aaece7576.exe"C:\Users\Admin\AppData\Local\Temp\1008610001\6aaece7576.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\1008611001\99ebbe1fd6.exe"C:\Users\Admin\AppData\Local\Temp\1008611001\99ebbe1fd6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\1008612001\04eae4b03b.exe"C:\Users\Admin\AppData\Local\Temp\1008612001\04eae4b03b.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3692
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2224 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6be564c9-392b-438f-b523-ee13a6f10c35} 2224 "\\.\pipe\gecko-crash-server-pipe.2224" gpu6⤵PID:3596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c172d336-6e6c-463c-9355-f4d938a8fce0} 2224 "\\.\pipe\gecko-crash-server-pipe.2224" socket6⤵PID:4936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2984 -childID 1 -isForBrowser -prefsHandle 2956 -prefMapHandle 1624 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e63ac148-734c-4ff9-87d9-e59556900152} 2224 "\\.\pipe\gecko-crash-server-pipe.2224" tab6⤵PID:444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3644 -childID 2 -isForBrowser -prefsHandle 3668 -prefMapHandle 3664 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aef7d00d-b8fc-42ed-b584-ada6f2245e98} 2224 "\\.\pipe\gecko-crash-server-pipe.2224" tab6⤵PID:1700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4720 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4716 -prefMapHandle 4712 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87a94835-9eae-404b-9743-244f8daea258} 2224 "\\.\pipe\gecko-crash-server-pipe.2224" utility6⤵
- Checks processor information in registry
PID:5164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 3 -isForBrowser -prefsHandle 5344 -prefMapHandle 5340 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {66076dfc-314f-4559-87ea-c8fe6d984447} 2224 "\\.\pipe\gecko-crash-server-pipe.2224" tab6⤵PID:5728
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5256 -childID 4 -isForBrowser -prefsHandle 5488 -prefMapHandle 5492 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {69e0dfb4-8e37-4bd7-82de-b75503924d50} 2224 "\\.\pipe\gecko-crash-server-pipe.2224" tab6⤵PID:5744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5692 -childID 5 -isForBrowser -prefsHandle 5700 -prefMapHandle 5704 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {18ce55b0-923c-4f2d-8b50-389fd4328247} 2224 "\\.\pipe\gecko-crash-server-pipe.2224" tab6⤵PID:5756
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008613001\10c536af88.exe"C:\Users\Admin\AppData\Local\Temp\1008613001\10c536af88.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008614041\wE2lFM5.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
C:\Users\Admin\AppData\Local\Temp\1008616001\56a8fcdd1e.exe"C:\Users\Admin\AppData\Local\Temp\1008616001\56a8fcdd1e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5268 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4340 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff7fd5cc40,0x7fff7fd5cc4c,0x7fff7fd5cc585⤵PID:5232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2000,i,16214588296565858022,11369381641732063459,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1996 /prefetch:25⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1908,i,16214588296565858022,11369381641732063459,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2136 /prefetch:35⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,16214588296565858022,11369381641732063459,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2272 /prefetch:85⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,16214588296565858022,11369381641732063459,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:15⤵
- Uses browser remote debugging
PID:5636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3232,i,16214588296565858022,11369381641732063459,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3276 /prefetch:15⤵
- Uses browser remote debugging
PID:5684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4556,i,16214588296565858022,11369381641732063459,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4592 /prefetch:15⤵
- Uses browser remote debugging
PID:5952
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5812
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5268 -s 12724⤵
- Program crash
PID:3684
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008617001\DgMSV3E.exe"C:\Users\Admin\AppData\Local\Temp\1008617001\DgMSV3E.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5660
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4752 -ip 47521⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2592 -ip 25921⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1144
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5268 -ip 52681⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5848
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5c53224768bfa68291b697e929287daa0
SHA1f6d56a35466f23c709b228fe52310e3c6083d841
SHA2566e3370afa031ce54398364462ab6fe0eecf1e6e214b0a717bbd32a21561cf1ae
SHA512418c8ef1cf7199f5f94d19e6efd4d43e8c534188520dabad6253e6a7547c818dc7ba866153ad93dcb240cbd7781b822ea4fefd51aa62adecc4f5a4be3abc8113
-
Filesize
136B
MD569e5ec9756a1187f3379e9fb4ed92285
SHA1a834aba55849b299ff5e25de297ea3fb8f3e6cc8
SHA2567ff9820cbe9815a928e835c429ce3d0dfa70c16a73eb6b7ad9aade8bd5d0058a
SHA5129e4d3814251e074313094f2c483f54feac56c3808c6b1dabb34ad2969f1b9f9299a046ff8673402cd37db89613e9174087798c0806c92860ec25273edbb7184b
-
Filesize
18KB
MD564004dd6756afe01d46c2b0daab49144
SHA1b86b63c1e1b578ef64b082f72401cfbe129295ad
SHA256b135e19fb3b45bab659f3b4f7a2ed6e3c843bc368a74cdf20603443cc031af81
SHA51245821c926ce4d94d3057d8f499e1c7c43e107565e55ccdf6465fa44308b672fc063dce2ee2d55f50db8843c666a063c12360a4491b5d40dc1eb24f7404af7766
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD5e9cb6fd336daa3b23012e1fe3bceaff7
SHA1d57959cac8ceebdb04b58aef21d9df31a7c79a63
SHA25617d7b168be3ba40f1056068e3b36d049c84e64faba010aec41186b1a150ff5dd
SHA5129feba7c83b212b682df6763b3f97fe1aca5e11174555486d90e4c5b6ca8f65c3fda9ea37d8513567b8355b4e9dac3cbcc17cfabe8ae09478601bab5f1ac69faf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5e4d3d5bcc43a72e2eeadbf112ae9e956
SHA1f39c1220f87ca9e1915c3cca04d468b4714f899d
SHA256a739d59230ca67d8a08d81a16b4c1d64ee252de95fde7973b6f736bf635bbe2a
SHA512ec2effd82e54d28525577ed9be1ab71686b883c0e48384ec5119bd1b3cb6ceff17d7d87014054714462f2982ac430b01b58a71b0623b8aa889876ff4f1ff571e
-
Filesize
649KB
MD5e7aa83909ace3906ec75144cc33e024c
SHA1333ee9d7f4c683d8e0ed05bdadfbd2baade379e3
SHA25624443cd457177eeed9c584e5d5ad194303fd94269fdb0d72e0db598215a5c826
SHA512508fd7984ea8b9d8c8b2cd3c7c3587941a6ee4627c7cf54fe56db7db75dbff0abdaf0db1b0c46876dc6ad0cc21735bd7a2f0351d5edeb735b2de796beef2ea72
-
Filesize
1.9MB
MD54cecb04d97630cc2d5cce80368b87fdd
SHA14f693736497e06c820b91597af84c6fece13408b
SHA25651698570a9c637ec0c9bc2b3ca6acb7edf3d7804c49b8eed33e82573950877dd
SHA512acdf93d12791a6a11b307fbbdc6df2b27a6e8de6b8cc015c4892304d4653e79ac58351600b53c7ea78d285d69df8e8f2e270cf9a168b187d372a3de17e84ec66
-
Filesize
612B
MD5e3eb0a1df437f3f97a64aca5952c8ea0
SHA17dd71afcfb14e105e80b0c0d7fce370a28a41f0a
SHA25638ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
SHA51243573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
-
Filesize
1.8MB
MD564f25a20bc6a8730e6d230e5d63dac8e
SHA1f1c8a90fefc9e7789013cf9228827634ad8410f3
SHA256daa2f6c445600573a591de7b8ad352699dcc9ff8b5bd2e1a6f93dc373572ceae
SHA5124b0e9001c5304b3deee2dd463ab5d310cf61423d773983994167093299878f28833772a746336aaa583b036a7a6510051602bc2064f7df983ae5999aae487c87
-
Filesize
1.7MB
MD5d3fb62af150353d3cb05f84d328d5601
SHA198be84b348beaf1abb2a9327c5918322e840a274
SHA2563a0642019f4c38e2b2b89e00492dfa809723534f7753ce480e01482ca191b950
SHA512428034b57853c7b0a9e1fd47590f9816a53ef497cad88bba5bf1094a12089c2022ce75be1cfe760da9342ef8d3adb853d70d01fe05f2cc6622e9c6decb91d0aa
-
Filesize
900KB
MD54676050a0ef5a185953ab79d47cb8585
SHA1dec41077d44ded9ce6d7bcf29848ebf49a89b6fe
SHA256bba632ef9970be97837b7cd9fad3df8c7a0f8476cb2bb8805e1f05c6b5167fd0
SHA5123c5f5c50c9c75ebd664fe4b962f0b70791472f33e731dac34547aea673cd65253d31d51f146ad181ddd6bd173636ddf3d0768098d1ba1dd76d853f1e4d72e350
-
Filesize
2.6MB
MD5439e7c18eefd3d53793669e1c9575d84
SHA18d6cf9ea7bcecbce59a28430636f3a6920b97d85
SHA2560926fb4154569379a0a942b34acf902d259a7e8d89b0c033ca8858a5503e3965
SHA5125f75a4b985dc1d05772a03a3cac8283be54c1cea5a4a6a093796b260b44f8f0ce0549ad979b31c06ae1ea16dd29a5c742ced0fc7f849940c07009df48cd59df9
-
Filesize
4.2MB
MD5f35acf76c5ace4e007dc64fcde784dbe
SHA18c3fbdc41b3d357b06902049e2ad6f2e4d136344
SHA25686088c0dfa1761f1989204ae2d46a3a0b3defaf379a2ccd0b81b0067aae8ec07
SHA51281c0f7526b83b76e9dbf8fa1256baa0945df7337dc876f45b774651449ef98d776b371d0ec91ff771dad0e722bdb2358205bfeaefc5559e738da157111f3002a
-
Filesize
243KB
MD5b73ecb016b35d5b7acb91125924525e5
SHA137fe45c0a85900d869a41f996dd19949f78c4ec4
SHA256b3982e67820abc7b41818a7236232ce6de92689b76b6f152fab9ef302528566d
SHA5120bea9890dbcd3afd2889d0e7c0f2746995169e7b424f58d4998c50bc49d2b37d30f5bd1845d3079b25f9963af2b71f136719cbd9fda37f7b85874992096b3e1d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD55ca58d76edc0e7291bf3d6bad7edbbe9
SHA1694124bf2e8d817b7f188706bbc49d0088317fe2
SHA256d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103
SHA51282b990ce963247c140161ce9ab28c79c5b4d648ddf46d622e152e3c0d79842be1cf1009a493b7af37b83976f36c05b56e353c6f7166dfc701979f87447f51fad
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD5d2efe1520b1653d69944d90351c7e24c
SHA1ead0da99c7f54ce5bc5b26f39b1100ffc9f9ba1d
SHA256f751d41f058d6b0f4e73d53e0d759250d0295b0ea74202c5b96ed5b61d5793fe
SHA512d240c3ab4a201d0ec8c93078a4c5ca90a6062eaa2f71c9970cc1a8536b8a3c91bb00c5a7594c902cba5ac87c1ce0c52f728d1ceee2cff2c6d475f84fc05fb1ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize10KB
MD599417146fa1ce311ecf731a764ac7ac7
SHA12dbeab8c5edd00fc9dccc5221d11ba626b7e797c
SHA25683c105cc996eacbc7ba967b96ae048e540f9409d6a575f913f20948a7f431cf7
SHA5123268a7245abe5bdea362304b93c0853ff2776f4b9415b0963cd60c595ea6ec018bea9001ad3ab7fa3963e6f34ea2c9121a601a88e0ddb22faa39ff606d3b4471
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD55f34ea1a8e4f0ca0afdc22420e912046
SHA1bf5ea1b4b1c70cc64fd13bcf41a2438cf55f73fa
SHA256cae8c70ce2f3e2b47d304fd3c529c00d66d29511ad4877dc06936a775994c0cc
SHA5122b1d4679a803d4b108fa8014d46d26e419d687238e5ede4c941eaf6dffbea3cf70f4df8ed4637105cfa1e91240772b5fc8f2c95a00d8d4185aa56aee9ac1c515
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5eb58f9e0dbcca642c8afffb34c0555b7
SHA1436c4db000c366b5ee273935d59f7e446449c91d
SHA256f037f620cdddd2a85c79d55eb02b57783c04fc0d48aa8d75e928faf197544790
SHA51274fae3bd3bb21e1065fb3f27ea82b61d3b020a4eda2030bf1107033c9b7f329a2a30efe848f2ad41886a2b3259d83e5df427ece0d034fc5eb63f93715b358904
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5e81515bdad5faa6cc99559a9d3268e49
SHA19703799b9818706d464bdb2646b3d35cc1f3ddbf
SHA256b236aa3b31eeb85c3a330ddeb36b761aeb624a59e5727eddb8e7c2600e53c456
SHA512bf4d8499e85a1cc0b28416f7c88f31beb94f4516f8ce758ef823c3d648f9136a5fd35a3e4133f9666385bc273ef894ef3a1e0e20a7314ef02b553d153449ea5b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5f92ce0318257083c9c6bb3de3caf6d2a
SHA12b8921087cca0386c21b079550e04c9b1690cf34
SHA2567f16e46d0043b4b2c8bd4b0c259c310d5033e8ddc2d72086c0223f4fadd31495
SHA512637c35c52001e1e59d3aeae6cf872fa23330dffffd8d193ccf6ee99e181bf13c216da2fdb88fa74c28c3dce420c7e05547e2e142298d5e2f695b62e350bf0e26
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD545247de5287630e8aeae14d418318454
SHA1b38f20f98978fe99b27b01f7ab5774016450112b
SHA256136a642dfce70ec7c315ef64c7aa171eccc49d27fe2f5a15ef2b4eb1d048a904
SHA51202200e3627d713adba363e5b2c0c4543e0627d5d26e3d4150c2d56def4ed0c7bf6fac0d454689b034509dbb71fbe999c0a8d9bce56b323faa45c96c297da8502
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5f1791ec400c86a0aa2a13ca34a3884cb
SHA13d1a38e2c80696f8cc3dec2fbf8ecc0fdf368f5e
SHA25614d116446bd4fe4e487654b9af81cb193dab85c8f709254c402a49f220e1cbe5
SHA512daef606b6531288d2f57d53c870fe8fb9f98c9c7af1f28e28ad5347fd294f0ba06af54f0650578af09024633f73f52e8614b1ef954ebfdb6a76a2574f705e72e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\03139b12-8565-40e4-b546-4c9b8b57ff31
Filesize982B
MD5b4315efa251461b25e5959f988cf10a8
SHA1e1e00ee3fc9c2c81d3131be3a54e3702b4207f6d
SHA2562c57f84b985576da6603469070e70abcc7f5c82430a2565e6f75148c5dec6842
SHA51292f24a3e1bc590347cd74cc445ea5b0989b1750a0da98ad97a73144672d315585b9ecb495b4549e25869d24246b2c37f9865a7c2a35ad605f43fd07a256a33fa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\6764d79c-060e-4c79-b406-871d8a8e6bee
Filesize659B
MD587eeab111d9128fe64737960211415e6
SHA1db78def0f0a871d36ab5e2054f070b3d7ac8e3ae
SHA2565f97472942b4880c0f83fe8db5ae06623ba25942aaf5d33113ec133569d0c4c7
SHA512a5f9cee63b515787cf5eb9ddeb3c48694c8c77a9b882153c5b60f47b998122bc10240ce9b9ae6a9b8966cd1cada89c77bcc85e08bbc97a8e10f5e42b9b62bfc7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD507fae17bab8a96d7e77fbdd4ab73317c
SHA11d089dfcff231c344e56fdb0fa78a3ba97d899fe
SHA256ab79fed7ea301f6f27c40e1207d0e02d49461c166636b754a6e8fd9b6bb47064
SHA5124b9a9f2cb084a436d85c29066e250379d71e24cab2b4047b31357b4251e9d52c6399e21daa0d34b31aeb0efa3196c3087275bf1f6834c1ab05f0dcb1e60fca10
-
Filesize
10KB
MD5de5e9794dcac2c858d632d2a3baa0b5b
SHA111edf3d4bf548940758cfcef2b814ff7cf0f4b88
SHA2565ec205e8676fb7609c811386f79b89d760b8d6bc47ba6890bf10ed4fc9eb9d0f
SHA512ce359178685d4adfd8d1be681ae7092bddab9a70510fbc3bc7fc7332abf0185f0dcbca095cbc52eda4204faae097d3471b5028296f7e1a7cdc61b85480483da2
-
Filesize
15KB
MD57198b756848a5a93186b19209d520cc0
SHA1ef55af9ba2071f2d3afa1dfcce590b8ad000ca8b
SHA256fa9e816019aecec80423c5413907e01b594584b330af9753afafdb2a5ab68d6d
SHA512b08e5ed90408e4b745e6556cdc22dfa623c254c56246eba9f82598c49608fe211c853ef8fe4f91898c1df5d623e42cfeeabc73f7f3a88952ded917a92d79dc58
-
Filesize
10KB
MD5b992d8779d2d27a7b9cc2096d55b522f
SHA129297e3bd07b031f8b50596ce4b188f8b8ca711e
SHA256790c301f71ee602f524a5acf69fba42149f482b85fc0355980767e1103a316dd
SHA512937514bfbb8bae907d73c97a71a2d8072d78c07889475d910cf1690240b930ea7790befd44c7a813a79e43986e773cf32f7d7feae927d432849034fbe8608cfe
-
Filesize
401KB
MD53535fcd3063a2965f1dd8f9b65ca8355
SHA11f5c89caf911a08415d55ce1687101b65871b122
SHA256086057602eec63ed064bd97c1643b20c727aa4a557d16bd26a763716414620fe
SHA5129b623500ffbe25d6dc08c3c90aeb8c123e9fc2841f0962b6fe57ca1d2ab44fb1062352e1d5ab1d506b156c0b25aaf96ca6267a36fd064c97c12df965bcd66929