Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe
Resource
win7-20240903-en
General
-
Target
c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe
-
Size
1.8MB
-
MD5
17b76738546303294770254945028da3
-
SHA1
d9d5f4f718f0937545506172a10456b6b03c8038
-
SHA256
c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7
-
SHA512
da72e8e8a5ab9919d5955b14cdbb6189ddafe647c564ca80d1248f715d9627793ca511f53e463a7d1b4c29dc403acb28aeb4b4415964c6a90e8c2188ba909ef4
-
SSDEEP
49152:93+cSSeIaGeKynhLcM/SShDG2qpSE1PWL5uqgLyXs:hsXvhQMrhnQS4rq2yX
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://p3ar11fter.sbs
https://3xp3cts1aim.sbs
https://owner-vacat10n.sbs
https://peepburry828.sbs
https://p10tgrace.sbs
https://befall-sm0ker.sbs
https://librari-night.sbs
https://processhol.sbs
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4ea6809e89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4ea6809e89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4ea6809e89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4ea6809e89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4ea6809e89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4ea6809e89.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 49e6ca163a.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e2afea961a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 484f738448.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4ea6809e89.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 49e6ca163a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ac61aff60c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ RQRVEjP.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 484f738448.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4ea6809e89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RQRVEjP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 49e6ca163a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e2afea961a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e2afea961a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 49e6ca163a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 484f738448.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ac61aff60c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ac61aff60c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RQRVEjP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4ea6809e89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 412 skotes.exe 1672 skotes.exe 2344 HRFuUub.exe 1636 PhafoQj.exe 5816 49e6ca163a.exe 1664 e2afea961a.exe 4320 484f738448.exe 5476 f96d63b1ce.exe 3168 4ea6809e89.exe 5640 ac61aff60c.exe 5892 RQRVEjP.exe 4876 skotes.exe 1220 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 49e6ca163a.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine e2afea961a.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine ac61aff60c.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine RQRVEjP.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 484f738448.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 4ea6809e89.exe -
Loads dropped DLL 1 IoCs
pid Process 2344 HRFuUub.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4ea6809e89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4ea6809e89.exe -
Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook PhafoQj.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\484f738448.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011140001\\484f738448.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f96d63b1ce.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011141001\\f96d63b1ce.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4ea6809e89.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011142001\\4ea6809e89.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e2afea961a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011139001\\e2afea961a.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cdd-8407.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2440 c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe 412 skotes.exe 1672 skotes.exe 5816 49e6ca163a.exe 1664 e2afea961a.exe 4320 484f738448.exe 3168 4ea6809e89.exe 5640 ac61aff60c.exe 5892 RQRVEjP.exe 4876 skotes.exe 1220 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4320 2344 WerFault.exe 89 6136 1664 WerFault.exe 107 696 1664 WerFault.exe 107 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49e6ca163a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HRFuUub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac61aff60c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2afea961a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 484f738448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f96d63b1ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ea6809e89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PhafoQj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language f96d63b1ce.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage f96d63b1ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RQRVEjP.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 5348 taskkill.exe 3152 taskkill.exe 4080 taskkill.exe 5688 taskkill.exe 4660 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2440 c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe 2440 c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe 412 skotes.exe 412 skotes.exe 1672 skotes.exe 1672 skotes.exe 5816 49e6ca163a.exe 5816 49e6ca163a.exe 5816 49e6ca163a.exe 5816 49e6ca163a.exe 5816 49e6ca163a.exe 5816 49e6ca163a.exe 5816 49e6ca163a.exe 5816 49e6ca163a.exe 5816 49e6ca163a.exe 5816 49e6ca163a.exe 1664 e2afea961a.exe 1664 e2afea961a.exe 4320 484f738448.exe 4320 484f738448.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe 3168 4ea6809e89.exe 3168 4ea6809e89.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe 3168 4ea6809e89.exe 3168 4ea6809e89.exe 3168 4ea6809e89.exe 5640 ac61aff60c.exe 5640 ac61aff60c.exe 5892 RQRVEjP.exe 5892 RQRVEjP.exe 4876 skotes.exe 4876 skotes.exe 1220 skotes.exe 1220 skotes.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1636 PhafoQj.exe Token: SeDebugPrivilege 1636 PhafoQj.exe Token: SeDebugPrivilege 5688 taskkill.exe Token: SeDebugPrivilege 4660 taskkill.exe Token: SeDebugPrivilege 5348 taskkill.exe Token: SeDebugPrivilege 3152 taskkill.exe Token: SeDebugPrivilege 4080 taskkill.exe Token: SeDebugPrivilege 1100 firefox.exe Token: SeDebugPrivilege 1100 firefox.exe Token: SeDebugPrivilege 3168 4ea6809e89.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2440 c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 5476 f96d63b1ce.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 5476 f96d63b1ce.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe 5476 f96d63b1ce.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1100 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 412 2440 c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe 87 PID 2440 wrote to memory of 412 2440 c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe 87 PID 2440 wrote to memory of 412 2440 c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe 87 PID 412 wrote to memory of 2344 412 skotes.exe 89 PID 412 wrote to memory of 2344 412 skotes.exe 89 PID 412 wrote to memory of 2344 412 skotes.exe 89 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 2344 wrote to memory of 4916 2344 HRFuUub.exe 91 PID 412 wrote to memory of 1636 412 skotes.exe 96 PID 412 wrote to memory of 1636 412 skotes.exe 96 PID 412 wrote to memory of 1636 412 skotes.exe 96 PID 412 wrote to memory of 5816 412 skotes.exe 103 PID 412 wrote to memory of 5816 412 skotes.exe 103 PID 412 wrote to memory of 5816 412 skotes.exe 103 PID 412 wrote to memory of 1664 412 skotes.exe 107 PID 412 wrote to memory of 1664 412 skotes.exe 107 PID 412 wrote to memory of 1664 412 skotes.exe 107 PID 412 wrote to memory of 4320 412 skotes.exe 109 PID 412 wrote to memory of 4320 412 skotes.exe 109 PID 412 wrote to memory of 4320 412 skotes.exe 109 PID 412 wrote to memory of 5476 412 skotes.exe 112 PID 412 wrote to memory of 5476 412 skotes.exe 112 PID 412 wrote to memory of 5476 412 skotes.exe 112 PID 5476 wrote to memory of 5688 5476 f96d63b1ce.exe 115 PID 5476 wrote to memory of 5688 5476 f96d63b1ce.exe 115 PID 5476 wrote to memory of 5688 5476 f96d63b1ce.exe 115 PID 5476 wrote to memory of 4660 5476 f96d63b1ce.exe 121 PID 5476 wrote to memory of 4660 5476 f96d63b1ce.exe 121 PID 5476 wrote to memory of 4660 5476 f96d63b1ce.exe 121 PID 5476 wrote to memory of 5348 5476 f96d63b1ce.exe 123 PID 5476 wrote to memory of 5348 5476 f96d63b1ce.exe 123 PID 5476 wrote to memory of 5348 5476 f96d63b1ce.exe 123 PID 5476 wrote to memory of 3152 5476 f96d63b1ce.exe 125 PID 5476 wrote to memory of 3152 5476 f96d63b1ce.exe 125 PID 5476 wrote to memory of 3152 5476 f96d63b1ce.exe 125 PID 5476 wrote to memory of 4080 5476 f96d63b1ce.exe 127 PID 5476 wrote to memory of 4080 5476 f96d63b1ce.exe 127 PID 5476 wrote to memory of 4080 5476 f96d63b1ce.exe 127 PID 5476 wrote to memory of 1216 5476 f96d63b1ce.exe 129 PID 5476 wrote to memory of 1216 5476 f96d63b1ce.exe 129 PID 1216 wrote to memory of 1100 1216 firefox.exe 130 PID 1216 wrote to memory of 1100 1216 firefox.exe 130 PID 1216 wrote to memory of 1100 1216 firefox.exe 130 PID 1216 wrote to memory of 1100 1216 firefox.exe 130 PID 1216 wrote to memory of 1100 1216 firefox.exe 130 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe"C:\Users\Admin\AppData\Local\Temp\c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\1011118001\HRFuUub.exe"C:\Users\Admin\AppData\Local\Temp\1011118001\HRFuUub.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"4⤵PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 10084⤵
- Program crash
PID:4320
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011137001\PhafoQj.exe"C:\Users\Admin\AppData\Local\Temp\1011137001\PhafoQj.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\1011138001\49e6ca163a.exe"C:\Users\Admin\AppData\Local\Temp\1011138001\49e6ca163a.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5816
-
-
C:\Users\Admin\AppData\Local\Temp\1011139001\e2afea961a.exe"C:\Users\Admin\AppData\Local\Temp\1011139001\e2afea961a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 15284⤵
- Program crash
PID:6136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 15684⤵
- Program crash
PID:696
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011140001\484f738448.exe"C:\Users\Admin\AppData\Local\Temp\1011140001\484f738448.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\1011141001\f96d63b1ce.exe"C:\Users\Admin\AppData\Local\Temp\1011141001\f96d63b1ce.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5476 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1944 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a8794f7-7f74-41ff-aeb9-e232f129fb22} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" gpu6⤵PID:2744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {451ee1fe-9f8c-4303-8c96-4992653f8e91} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" socket6⤵PID:1004
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3140 -childID 1 -isForBrowser -prefsHandle 3132 -prefMapHandle 3128 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0daed95-3a84-4445-827c-fbc928218907} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" tab6⤵PID:4816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4040 -childID 2 -isForBrowser -prefsHandle 4032 -prefMapHandle 4028 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf412a95-3642-4730-a6d2-21b72ea0a10b} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" tab6⤵PID:2292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4584 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4628 -prefMapHandle 4624 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5254577-7f8a-40df-9c34-ae3187767b6d} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" utility6⤵
- Checks processor information in registry
PID:4180
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5072 -childID 3 -isForBrowser -prefsHandle 5100 -prefMapHandle 5096 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ce7fea8-3aa6-4811-bb03-e8ad7adbb9a5} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" tab6⤵PID:5856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5144 -childID 4 -isForBrowser -prefsHandle 5252 -prefMapHandle 5256 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {86333ecb-0c3d-4645-98b3-bc1ee405944f} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" tab6⤵PID:5292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5540 -childID 5 -isForBrowser -prefsHandle 5552 -prefMapHandle 5548 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f1cc813-73c7-45a5-a3bc-e61b7dfa9079} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" tab6⤵PID:3820
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011142001\4ea6809e89.exe"C:\Users\Admin\AppData\Local\Temp\1011142001\4ea6809e89.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
-
C:\Users\Admin\AppData\Local\Temp\1011144001\ac61aff60c.exe"C:\Users\Admin\AppData\Local\Temp\1011144001\ac61aff60c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5640
-
-
C:\Users\Admin\AppData\Local\Temp\1011145001\RQRVEjP.exe"C:\Users\Admin\AppData\Local\Temp\1011145001\RQRVEjP.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5892
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2344 -ip 23441⤵PID:4128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1664 -ip 16641⤵PID:5432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1664 -ip 16641⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1220
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json.tmp
Filesize27KB
MD58873503332a800733974e520901a7ba1
SHA1d0f1e762071d35070ab7d9f1d5c210ff394062a4
SHA256e6b9c66ade13c6708646d7b393087790c9c07fe3b6ac07791d085a480d8f9198
SHA512dcf36c173a78cbbe02fc7273997474ee2b8bb2a9e3a22a4f7be753921de707b2a601f78a5a8b20125cd28eb6388e63c92cf2f9b560e927b25d44707948dd943e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5da412aebd29d60fa5914449af1d965ab
SHA1fbeef998059d9c3205e4b49df8c36b43dba0005a
SHA256881728335bc76d1b4f49498bb25fc837a6880c008fefd89097bc1bcee5f7f35d
SHA5121640f91b994a0474b5e0b6d596e8ead0248f2a3d5c69e16476d310f9ebc95f07f12911634f2bff33047e65ffaa4053641be999c38323d1383e10d02bb1a75583
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD52163d5a2d2b2374adaa5faf718c2dcdf
SHA15adeeb70cc40fab827c0687f6b774d0a49caa89e
SHA256048c182c4b1ab5d88588a8c66f0337a6b2c245eeda2191b1ff786687a717bd31
SHA512389195601c419b076d504ab550b0ad70f404c3059e002cc5b235aca072b3e9d6b23bc2afb9f9566b98a81cba4f4e6c5b5b97b766c1a629e795f257183a11487c
-
Filesize
217KB
MD598da391545b4823ca67e6cc3a927dae9
SHA1d2f66837884d6d65dfe21372501cc7ba1d91ef29
SHA25612862b60140f019b0c251da7be59caf90d93eca6a30d016609cf2ff1da4652a7
SHA51259130547c169768310d57c075f2cec01a71704e9658955ef8eb1c6b2c30a24a801623f189eac14a84357aa597f5d5c96c5c9f8e96ee4ddf7bcf911dcf6bcb7b9
-
Filesize
1.4MB
MD503757138d540ad9e87a345bf3b63aebf
SHA183a0b3ce46a7178456763e5356bf4940efa41cd1
SHA256659ef7c3fd01df95231975c36e8e45444f6329da33a70e58690f2ee75c7a722f
SHA5120f08c40ff45829c608a42a6d0d12c1b2a726d315c28f0b4330320a7585506474f72eca550a90b042eece41911174859e95d4b5056c77999a1acf14d43e5279ca
-
Filesize
4.2MB
MD5818532da27c6ed97768ab94607612f66
SHA199216af849b745434d0e728400a5da9ea0eac96f
SHA2560db9cd98808b856cc4e61818330ff6a1ec46621ab9b30e779078f2fb78feb36c
SHA512ae6d4008ad40a08ad23b7b460c53af287c923171973cd8c090e5abe0b3b67f14aa291f8ece578697405e6c263c3316c5f19c8a94c64a8cbe4b7496dc345b6224
-
Filesize
1.8MB
MD52426e5ac8ee0bbb03e63d7467cba1df2
SHA16cfd84d6f98b4a9d1b9d5bd724ec59cd4e8533c3
SHA2564b6f652aa6df9d8078f869655c18ac854262d94c3b3a547488a2ece1b184a7b5
SHA5125697de737cf9ee10433c57a1f0d214b0d8344ad33306b243624542ead2375e6c3a4ca5a8d4e3b806cb5bbad17b1612881b1f1064d03b18da01c5f96c57e9751c
-
Filesize
1.7MB
MD566bcb6e17b5fb8da5c8791b5fd6cadec
SHA1a7ef8cd29018bce43618425c1f211ab4d7d3c88e
SHA256cc9109ffeede3b8f3117ccb1bae82347c4506e08e2a06c3bffd15608dad16cfd
SHA51276708812f23247c7ab921adb69f1fe3c79e3bef5f2fd374021ab120644a7c4e9768b202c3283edcfb9b7b42647e86f880021eb340594b0cbc0b07938408a8aed
-
Filesize
947KB
MD54932e7c10bb027cec9de8696ecf6901d
SHA1aef2197b802633e3453dd7c221bbd889b99a5b90
SHA2566bbbe9d1fa289f9bcdfa962f16c09f8035064becce76871a60c9db490bc6df9c
SHA5129253a415c4f826b09ab01f2afb7f0b2c35534aa093209e72223ab23392822b50d3edc1949c66d1f39aa59198e9275a1b7729df6a9fb39008e9bb28c6f245c8b3
-
Filesize
2.7MB
MD53834ead0f530e99a0d9810e6866e893a
SHA1a051a6bc8dcd18dcc71af7861c8031f0bfade6c1
SHA256c7c57fb214ae177ef2cf143775c2131cbdcd8965bf55540a3422ebd03494d436
SHA512e2e0b2907f28016ec5a22976dd211a73d0ee9aeee1859740e31ca073a17a79f4624415a216939f80b4746e731b98c1066c5e854307950d8c73c4dfc67854b24c
-
Filesize
1.9MB
MD5870c92cf89253baeaf80574aaad15adc
SHA1feefb55fa434ceb4aa10997bedfccd5597852078
SHA25665238eee07b00d608d030a601ebe0878656466084e1f55e9e41258bec1370b59
SHA512fe1cf7efa897c4c4fada01ba67ef38e7491d96870ab32354b0acbf2bb0cfa32faf914d05037d6e813fcc9b1241466acdaa178adeacc2451ea371f1189e7923c6
-
Filesize
1.8MB
MD579ac6d1413b763a6fa688b99e931bafc
SHA100f2c01127716f233653b16e0e5d1d502c66a43f
SHA256d3fd018b2b8c14f67335da448708cb86ba33dc441b36a2c7f0d5557347dcf85b
SHA512b0c4fb5ee2821321139f0e0316a77f666107928516e9e7a6d27797b6d04d4c945cdef36d3e6bdf1ab3fedc3d28c61a81ff0bf1b214b8e9d36cf7c39939ec734f
-
Filesize
1.8MB
MD517b76738546303294770254945028da3
SHA1d9d5f4f718f0937545506172a10456b6b03c8038
SHA256c90e2a8f0a0953cb94116ec4b65313ba4471121a98445f2040fdd7f6ce29b2d7
SHA512da72e8e8a5ab9919d5955b14cdbb6189ddafe647c564ca80d1248f715d9627793ca511f53e463a7d1b4c29dc403acb28aeb4b4415964c6a90e8c2188ba909ef4
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize6KB
MD53a115123e5787bd2c11ce185bb35d6d2
SHA135d318677df6c7b40678ab490fc95c5be4920492
SHA25641ad0bd6ec4a3a8cadd8565b2f684a191e27691c8fd350eb13c1d800778b6775
SHA5128d51de8c8cf9409d329f312d8f72ddf291f18e0748b864f90515fcdb44fdd3ea96a4068c7d9fd4b36125ac6b31df4ba8a7b1f147132247ae5c2a51246274ee12
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize7KB
MD5a84ef7b329ba5e27a2dc317414439dd1
SHA19dd88fdac44847b07a2e562e95226bc4ea6d2f1f
SHA256ff210e262db19c38d4503fa783b3c12f196578f551159589d8d007dcecb117b7
SHA5123c216ba7136b81a96ac17f9a75118b2312d62d59a88819b1f312814f92866449e87ee219f1822b3d95c62c8ab4f572cea676cbec8f671f3c0117325d9419ce58
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize13KB
MD5e15af299e46cc4efdd59fc2f25311fd6
SHA11bbcd5b59e39e279b99fe3a1331d5008fd0dd643
SHA25610d721cd4c8e334c5e31037edd2616d420102dbc5a2225abb0a9d9db1f96656b
SHA51252e63230abc4f496f1ec80907fe1c2b32bd3c84bce084251e5d8e0e4747e03a7557c69b1be451b467a9310573334f6d24679128023964bc137126dd665d0ea8c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5dfd046e952c202104d5b7e1d33df27c4
SHA1ff2624403c5f1046d5962198ba08c0b10b1a5d70
SHA256fa62779d23c46af41a398c743712a4d4ebc9670c707533afb66f321fadc0a78e
SHA512bdc4cc887d2576d2f1835e6cd4b091489429bfa9e6b2ae3353e0ab609959e212d92cda06b88dc2aaa2458f642120fb2bb3aad1fd53f34efb62718d42657d6d87
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD51487ecec0f724b23f838382126d9df2d
SHA114193cc988657a2270af4343e631316b6ec3e9db
SHA2568a398ea457836e542d89a6063636d941bb6d0e15dc6e129847325e31b6f57af6
SHA5128cf8801c54dcf0da008a5daeaafade8a9b99042bf44e723ad6790c9a6034dd87f16c09e79b0f5e7e72b22ee3202310b1ddb36ac13e821ab76a0f869dd0a9feb6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5773895ad2de29346e33673492b893e9a
SHA1943bff2e58d488be5659ec52f267bc80b56a9430
SHA25605847dddd6748faafd850630d5cb8e328a88e3f6adba9011da40914451da1e01
SHA512b4880345a3edb69a9296d84a19761960b70e7007d05320ed399ed356b63d49c038518df4d8044a1c0a7b8130cd2494ff170d997966983afac6ee6ff3574c21a2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5dc45072810a8fd7116df788ba152b14a
SHA1fc8e77960e61c0625cc03c80c30b436d453e039a
SHA256b864e8f5adc05c553d00d1de2c9adc09529c80febb278f31cc0db2818dd295d7
SHA5122bdba1c3f0aba8c66faf61bb31c89a0c54970c946789f9c080ae3006c2135a25e72e9b3115bb1691dd3df23c18d81b1643a8293063dff10f376a92dc8a746aaf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\05ebc2e6-e96e-47d0-8b96-6dea6c3984e1
Filesize659B
MD55741e56de5f7f5383c400d45d2a22e65
SHA19dbd5b6e3d4568e96b8884845d7ebbf44fb83c46
SHA256e36ab6977b2fcce025441479be95feb6f26f940a5420d0f4ff2e5cef5ad018cd
SHA512afdef90da9f7f56609e6e84c7ab4b45bad197addb9848c145025d5b4c480ae6f320f3957b0230c74b29d6727bb9d444cc4fa3397f749ae98539b7c5afba434ba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\f3c9553c-5507-4eeb-a899-8fb6d33aac01
Filesize982B
MD57a9f73de4c0a9adb7ae09e760caf8fbf
SHA18d596b9f7cfad5cacf3a4c3bca92edd72fad84da
SHA25620dd1c19a31b63255e96cfd6e90703248164fa04b54e8171cdb31364dd09e521
SHA512b50008efe54d6d8c6945e80a7e9e6bd03f3bf9ff473dc4f85a483715a4abaabbce47d6fd6a083879f89b7b07b116e5300465cefc6f50c3a05a566c7106ab5a5c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD55e7346c3646dfe963d8665fd391a63c2
SHA1bc17cbb7ac3b51068de4e0160e2cf037e37db2a1
SHA2563096e2e733bb9aca428265526593e990ea934a1733d0f8e4815e4bd05da6211a
SHA51282ff4873faf4256db180497ee5186673c8eb751783cccb6f9efaa6a2a4b46d760ec52a168ce1b9e02a404ac643cc529b5309daf2501ab5de4570d8d2734b86e6
-
Filesize
11KB
MD5784679632bb425ffc59b8c5d15e0c3c1
SHA1417f7d7a5e8b123c5943999a9986c20959b8bd98
SHA256807bcab226295413bd5740d997c2c408d77df170d0fe80772f23de2ba8125620
SHA5127309dea8a628b7d139eb600721b8b1ccd9829bf6948c47d0adf2e7913678fb78e904b6197bec2f057a415ef5e6d35892ee7a40b6b57dc429ea6b0665d0a55626
-
Filesize
15KB
MD597652b7235278c0f8415d207bf5e7183
SHA177c4f30c6bf89797aaccc8770ac446d003ad9fce
SHA256bfcc6f9af6c20a3400169fce52d950a167b3f60ffff589d664cc7ea258ecb76b
SHA512945288df6da146e581a0175f9b8137d4f7d0b69de1149d467fc8e36a09d3c41b08a11ba85fbe4c9028b7f11838ae21b7f9a11b62dde488a87536f1ff45f6fc33
-
Filesize
10KB
MD595e4334b4a4add6aa3101922377bc3f0
SHA11c63eb31dc9dabc896e9bfb93318e894791b2087
SHA256e03bd44878faa22be60600c0099b5c7cc2ac02e9db4ab6e533a0cf748b5124cc
SHA5126e830620cd69140fd9447d691ed00803d0de63c9bf683a8e0899be7df45febaac42475af188882e9c251513a0213e84288293de4fb54ca9f4cd7aabd9767b8f4
-
Filesize
126KB
MD5b48e172f02c22894ad766c52303f087a
SHA161da0ff26dfc3759f7cd79696430b52f85073141
SHA256712e46f7a4f9da7fabd0b1acd5e848527bd70b6c4444dc92c8479ac108d71753
SHA5125b8a888a9d87a4ee34f57799d3d6baf69cd556a2d1336afb109adc488a5efa1c7cd094c3785cf9af726a0c41be3a56a0ffac933b7fa7fb5dec9643f3af08bdfd