Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 13:08
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
3.0MB
-
MD5
5cc1e2df8f03cc33a15dde12361499cf
-
SHA1
7c69c2d8882915cf9dac2574cdb52b7510feb46c
-
SHA256
c9de766681ada475273559581aaf0daa3d4b855d4ef9d4bf30f25c99171351e9
-
SHA512
214cff1838c09d951534bd14b5c65c9164cdaa55fce85da01e76a0ed730d0eb10d0ce80b1bbdc0c6892f3e252e2623d5abf7e58229826434906fae8412241c69
-
SSDEEP
49152:fMv3wY2bOjNNcJ9B4R1gcJrcyyh+0I5T3iczkc9Gzq1f:0PgbiNN2fUgcJrcyyhtIZScz3I
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 774384ab94.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 774384ab94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 774384ab94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 774384ab94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 774384ab94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 774384ab94.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b3436aeb27.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 71db63a248.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 774384ab94.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 71db63a248.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 774384ab94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b3436aeb27.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b3436aeb27.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 774384ab94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 71db63a248.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 7 IoCs
pid Process 1904 skotes.exe 2448 b3436aeb27.exe 1556 71db63a248.exe 2736 a85c9383b6.exe 2708 774384ab94.exe 5244 skotes.exe 3412 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine b3436aeb27.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 71db63a248.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 774384ab94.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 774384ab94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 774384ab94.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\71db63a248.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013185001\\71db63a248.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a85c9383b6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013186001\\a85c9383b6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\774384ab94.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013187001\\774384ab94.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b3436aeb27.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013184001\\b3436aeb27.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023c0a-69.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1068 file.exe 1904 skotes.exe 2448 b3436aeb27.exe 1556 71db63a248.exe 2708 774384ab94.exe 5244 skotes.exe 3412 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1396 2448 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a85c9383b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language a85c9383b6.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage a85c9383b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 774384ab94.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3436aeb27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71db63a248.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1384 taskkill.exe 2236 taskkill.exe 2952 taskkill.exe 748 taskkill.exe 2268 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1068 file.exe 1068 file.exe 1904 skotes.exe 1904 skotes.exe 2448 b3436aeb27.exe 2448 b3436aeb27.exe 1556 71db63a248.exe 1556 71db63a248.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe 2708 774384ab94.exe 2708 774384ab94.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe 2708 774384ab94.exe 2708 774384ab94.exe 2708 774384ab94.exe 5244 skotes.exe 5244 skotes.exe 3412 skotes.exe 3412 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1384 taskkill.exe Token: SeDebugPrivilege 2236 taskkill.exe Token: SeDebugPrivilege 2952 taskkill.exe Token: SeDebugPrivilege 748 taskkill.exe Token: SeDebugPrivilege 2268 taskkill.exe Token: SeDebugPrivilege 3356 firefox.exe Token: SeDebugPrivilege 3356 firefox.exe Token: SeDebugPrivilege 2708 774384ab94.exe Token: SeDebugPrivilege 3356 firefox.exe Token: SeDebugPrivilege 3356 firefox.exe Token: SeDebugPrivilege 3356 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1068 file.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 2736 a85c9383b6.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 2736 a85c9383b6.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 2736 a85c9383b6.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 3356 firefox.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe 2736 a85c9383b6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3356 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1068 wrote to memory of 1904 1068 file.exe 84 PID 1068 wrote to memory of 1904 1068 file.exe 84 PID 1068 wrote to memory of 1904 1068 file.exe 84 PID 1904 wrote to memory of 2448 1904 skotes.exe 85 PID 1904 wrote to memory of 2448 1904 skotes.exe 85 PID 1904 wrote to memory of 2448 1904 skotes.exe 85 PID 1904 wrote to memory of 1556 1904 skotes.exe 86 PID 1904 wrote to memory of 1556 1904 skotes.exe 86 PID 1904 wrote to memory of 1556 1904 skotes.exe 86 PID 1904 wrote to memory of 2736 1904 skotes.exe 93 PID 1904 wrote to memory of 2736 1904 skotes.exe 93 PID 1904 wrote to memory of 2736 1904 skotes.exe 93 PID 2736 wrote to memory of 1384 2736 a85c9383b6.exe 95 PID 2736 wrote to memory of 1384 2736 a85c9383b6.exe 95 PID 2736 wrote to memory of 1384 2736 a85c9383b6.exe 95 PID 2736 wrote to memory of 2236 2736 a85c9383b6.exe 99 PID 2736 wrote to memory of 2236 2736 a85c9383b6.exe 99 PID 2736 wrote to memory of 2236 2736 a85c9383b6.exe 99 PID 2736 wrote to memory of 2952 2736 a85c9383b6.exe 101 PID 2736 wrote to memory of 2952 2736 a85c9383b6.exe 101 PID 2736 wrote to memory of 2952 2736 a85c9383b6.exe 101 PID 2736 wrote to memory of 748 2736 a85c9383b6.exe 103 PID 2736 wrote to memory of 748 2736 a85c9383b6.exe 103 PID 2736 wrote to memory of 748 2736 a85c9383b6.exe 103 PID 2736 wrote to memory of 2268 2736 a85c9383b6.exe 105 PID 2736 wrote to memory of 2268 2736 a85c9383b6.exe 105 PID 2736 wrote to memory of 2268 2736 a85c9383b6.exe 105 PID 2736 wrote to memory of 4576 2736 a85c9383b6.exe 107 PID 2736 wrote to memory of 4576 2736 a85c9383b6.exe 107 PID 4576 wrote to memory of 3356 4576 firefox.exe 108 PID 4576 wrote to memory of 3356 4576 firefox.exe 108 PID 4576 wrote to memory of 3356 4576 firefox.exe 108 PID 4576 wrote to memory of 3356 4576 firefox.exe 108 PID 4576 wrote to memory of 3356 4576 firefox.exe 108 PID 4576 wrote to memory of 3356 4576 firefox.exe 108 PID 4576 wrote to memory of 3356 4576 firefox.exe 108 PID 4576 wrote to memory of 3356 4576 firefox.exe 108 PID 4576 wrote to memory of 3356 4576 firefox.exe 108 PID 4576 wrote to memory of 3356 4576 firefox.exe 108 PID 4576 wrote to memory of 3356 4576 firefox.exe 108 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 PID 3356 wrote to memory of 1060 3356 firefox.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\1013184001\b3436aeb27.exe"C:\Users\Admin\AppData\Local\Temp\1013184001\b3436aeb27.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 15084⤵
- Program crash
PID:1396
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013185001\71db63a248.exe"C:\Users\Admin\AppData\Local\Temp\1013185001\71db63a248.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\1013186001\a85c9383b6.exe"C:\Users\Admin\AppData\Local\Temp\1013186001\a85c9383b6.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2e8bd907-8bbe-4c16-a50c-38383ff6dea2} 3356 "\\.\pipe\gecko-crash-server-pipe.3356" gpu6⤵PID:1060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed575be1-acdf-44ca-bb36-76cc4c6b6f18} 3356 "\\.\pipe\gecko-crash-server-pipe.3356" socket6⤵PID:1700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3184 -childID 1 -isForBrowser -prefsHandle 3024 -prefMapHandle 3208 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1004 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e4a2d0c1-c612-403e-ba18-3fc85cebacc4} 3356 "\\.\pipe\gecko-crash-server-pipe.3356" tab6⤵PID:1436
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3876 -childID 2 -isForBrowser -prefsHandle 3868 -prefMapHandle 3864 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1004 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4c08d0f-64e5-4f6e-9b7e-db20a1b9aad9} 3356 "\\.\pipe\gecko-crash-server-pipe.3356" tab6⤵PID:1944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4632 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4512 -prefMapHandle 4572 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {925c7dca-b403-4cbe-8648-aafc131709cc} 3356 "\\.\pipe\gecko-crash-server-pipe.3356" utility6⤵
- Checks processor information in registry
PID:2124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5284 -childID 3 -isForBrowser -prefsHandle 5320 -prefMapHandle 5300 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1004 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {df0c1a6c-8c8b-42a4-a9a1-412bf84f8e8c} 3356 "\\.\pipe\gecko-crash-server-pipe.3356" tab6⤵PID:5904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5460 -childID 4 -isForBrowser -prefsHandle 5416 -prefMapHandle 5332 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1004 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1175fd61-8d9d-4b93-861a-e8db4731c6de} 3356 "\\.\pipe\gecko-crash-server-pipe.3356" tab6⤵PID:5916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5636 -childID 5 -isForBrowser -prefsHandle 5640 -prefMapHandle 5644 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1004 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb17bc42-22f3-48be-a6d1-a36fc6922871} 3356 "\\.\pipe\gecko-crash-server-pipe.3356" tab6⤵PID:5928
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013187001\774384ab94.exe"C:\Users\Admin\AppData\Local\Temp\1013187001\774384ab94.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2448 -ip 24481⤵PID:3020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2448 -ip 24481⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5244
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3412
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD51f4405ce21dbc335e993217cfc4efba6
SHA1b58c5816708554bf7728d1f60b8f65d99df8501f
SHA2560283f35ed1f040a78c8fa947b4c12acb9c0d1e10b61f72243949759f1c1ba277
SHA51241c5dfa3678945994c09af09bec027f7888cda15bf72d8c55a6f7e691f2db225c0fd8e9254538b2dbc60137501bc4cbb842c807a45148e5e6b85bf36bbf3d0f4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD59aa7b8b5a1cf61c798c745aa348ccd8a
SHA172ca0861a0a38a1d23d90d26a1fa6d11e8ceafed
SHA256a6f1bbafff374c975f014822511b6338876dd975917f6e21d9d328422b9b0055
SHA512fd9c2d4e7ec159845945667e85078285a3bba4175d764cce4675d07d18eb228ba59393671496755605f9f451cd22a21312d147c5d2cf9e603f8eab8e8ed261a6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD57366c5e55b0b2823487b875d11c5be89
SHA149c6f427943438d44e2c0a213f8d19f82781dcea
SHA25631a2fbfcbf475d0d157ed8cf81c399dd6e526362600c4a5ab6570279cc773661
SHA5123264af12d491dd19a2e03b83c4e9459fc66132d91aebf40cfa4b4976062e69b610a8f45e05c0ea3c10a8eb531396b3d45d0832a55c4d2e09d847f4e96a8164f9
-
Filesize
1.7MB
MD58f8df73091164236b35ac3cad7969f87
SHA1ebf8688e3ab2e1cdf4b6822993e3e111cf8623ba
SHA256afd10002d57ad1cc0c4d7f195e9ed22d909d3774bdb65b0232f2f63cdbb70967
SHA5128a0a0aafb727e320c72dfa74da15ca67cd4ac5bcf99286927a4244ea99d5c38fd4adce6d65b878f64437c8deae0bc262ec602e6144fd10797bb8932ff0ae7453
-
Filesize
948KB
MD5bc66e3a28c406f62e85dd2c0aabfadd1
SHA11603156dca7fafce59bc84a6817f90bba973fe10
SHA256d83567e375116b085dd0759d5854377440cd1413dc213a52419e6e774fa21271
SHA512e8fdc96c8779c31450a3ab9d26bedf47de0568a21e7c92adf5762b26b2db53ad11c38bc3127d8fdc8895c581c83b9d55666d6976034188fc0275a7fa74d76814
-
Filesize
2.7MB
MD5acbdefbad54eb128aa9ea18fbeb30476
SHA1b463450cd2afd75ca9f6f46d41a037617d8fc0cb
SHA2564a575f3c6e2f408de52e31049884070576b9d4fa2a1bc65d2763577bc3860712
SHA51215ad475b1e61e84aaeddef33105e6aa7b61b0ed983e82a28f71e62a4e5f8e5e3fc4d10081a108d530e475bca16dc81f80b1ca2cfe7cc32fefaea68ef9fdd6bd1
-
Filesize
3.0MB
MD55cc1e2df8f03cc33a15dde12361499cf
SHA17c69c2d8882915cf9dac2574cdb52b7510feb46c
SHA256c9de766681ada475273559581aaf0daa3d4b855d4ef9d4bf30f25c99171351e9
SHA512214cff1838c09d951534bd14b5c65c9164cdaa55fce85da01e76a0ed730d0eb10d0ce80b1bbdc0c6892f3e252e2623d5abf7e58229826434906fae8412241c69
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize18KB
MD5efd12d9ca11d24d07c499dc3888e0b85
SHA14385b8125ef4d62da4fb55f2dab6c024e76366a4
SHA2569565dde4c8620b3c7a73004e9194e948ff64dc30f02daa17849b50265cce1ed8
SHA512b5bdd3cf9514da0a1e07f17ad8b59418da66f9d747e062918bb5a95251420a689f4744af59a8c299c63c5349c8dac031b74c9414ee4777ad9140bde99cd24092
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize8KB
MD55ac10b1d8f7bf995c332e8e8419347f3
SHA13581b7445bb61e50c492466137025c1055d49f3d
SHA256f82e4cfb53c172412a9f16569f59de9ee76cc7a2d969ba5837efa703312f5e1a
SHA512032751c8064881f696224a477697acbbcbca2a96489cb1c3a2d0a85fa5e48ed749ae075b826c84ea86c66630504922cf4e9415151f6580fc009834e7cd67ea43
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD58d6356f77b1abf24ce7ac3f52d12e5d2
SHA1054bd65ed36de8b17db3880ba02795293a8f20c9
SHA256f06bf0c5f2fd8450e592c834cf85f80fb5f8094eee48d57a5d31ba4ddb5d2baf
SHA512483a7405adad4c57528d8edd0ce76d2670e785d8bf880ef2b966fe7e29c3f8062f9df02e2efd553c552a5522dd787d02573ce479207c54130774ca0594da5809
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5ee28af953d0243aca880172c910508ba
SHA14bf10ff1ae49f8ad28f766c330afa900c7c4f01c
SHA25647fb09928ef10f605703bb491f6bceef31d0a40f3a02b4baca64ad8284cdebb6
SHA5127a5ebadb6ad040a774736f11d423d6be8ffe110fce334d02b2d90ffed14a962efe7b2f7ba1fa7146f18d77d27651bc2ad333ae98b0b25d35d671f8b0958ba9eb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD554bfc87e2fe35c429ee90df6a5a35ec9
SHA12a506e69d09d5ce5a4d1b8b9f55dd650a7909288
SHA2566d520f87392db9464166c99b7848cbdc67e5deb91de87789ec276965000a8645
SHA512e5c553f7ea5f60f44cf35b5c380bc1accbfdf7db973952508ccdc841f605c568355144f0631bb8341115b555cc4fef54c77289fd7a4ad2813e3620df4fa7d1fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\302336ae-26e4-4c72-95ae-cfbe098b8a89
Filesize982B
MD595b0c72800e74f637f520c9a3b6ddfd8
SHA134442bb724faeadc2232c0b57198bcb137b857cb
SHA2565f84981cd0adfa6ba6d9e4dba96824ebeb918ca417dd9cf39d2b49e447d56722
SHA5122107da5e550c48b30a82a45431777a6a72e954c4090cd5685235534f792b3f408117dc5b9c360c7674efdadd003195e19ba35f92911f2ede497074663f1b2295
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\a69f5e2e-1371-4b6d-a39b-a23913266c34
Filesize671B
MD5182a0681825d0bbe0c3f6a1260c26f46
SHA1c00be6bc4a86940ce2b8e6caf0a0130f2203d467
SHA2568b94a4be177800962cc1bfe57d460a8be814c9439de917b6b5dde45360f24379
SHA512ac2053d2d9a02b7f5d32ae13073a2ff00e83c240d1333d2ea1afe8db0eee2574b899a8b045104d0022649d40ea71e03c4f3d63e1672b87374662d600f22ab993
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\a90ff5f5-ecf6-41d8-bc16-dc865f9742fe
Filesize26KB
MD57e1208a55b0b5337403a32df18ffed6b
SHA12114f51035ec62cc9b61cc1975ab36f6559732b5
SHA2565040a46764e403295af25dc66c4addee2426cd2851bac644376f835d496f99cb
SHA512831a6f1d2115bc65f14f806c2a0175c294f494f6b5fe3404bcb1a8acddb034ac164e657c67c1e198ea187ad20bf356aefc95efe19213f3cea70e7d030d92f375
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD58509081826180806df05f851cf07eb7a
SHA16c75423bea74127e308195b9d963cfa5b845709e
SHA256472de280d764268167f9f6dd9a655de6f9a160da3b45143ed76ba24bf10fbece
SHA5122cf644ca9f1eb8e2fdf8e2bb3e4e5f5871c2fe116eb2b6ddecaa8faa525c2060ff4906733e41becc66d2efe2033cc6cc608562fd94b9125bcf03f26afbdb4d15
-
Filesize
10KB
MD5c667c28074e34cd8eb5a1d91611ecd2d
SHA1be590f93dc79def4fa83077e326a70ddf52a025f
SHA25660596ca34e3e2f5745c37c594a7407e664a6f87e4afd16a347dedacd1b799bea
SHA5126cd1eb5349d730c5c13bee74428f2d6f460fe1ae9c52059f2856f61260638a105394f187490f11bdfc45226ad7f59d5373eb8aa1958370be69b7cab96206e995
-
Filesize
11KB
MD504f935c482362261e07126d16ab4f0ad
SHA181f6299bea771a3229232b2ab6548cd016f8c6d2
SHA256e71c2dcf810b2a6f8180eed36664207bf881b71bd62013d289be1690daf66397
SHA5120bfb4c7fce46ba85673729adada6422fad900a5fceee87ce59de042297bd4032b5e2105059549b71e9569e6e6bdc1e331452426b8a2a0caf11f13018dfbd5f36
-
Filesize
11KB
MD5f406eb8e7241f7c78f6555ed012069fe
SHA1cb9897e709eb48c6804b50a378e6a80336e74adb
SHA25676455a2410e6c7bc844b20f597c5c46bd86b4558a3cd09ca072e9396570c7cae
SHA512be4d9d5f4d7cbfd080bb34c5d02274affc452d1e7bcd0c61e0c74903b25a62b4b5a8e920889f8dfcaaaa9c5d9a70d47cd9e51f18b3908325d65e9d66c5392e87