Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 08:09
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
3.1MB
-
MD5
aeaac78d0572bbf1a71cd4248596dc86
-
SHA1
cb40fd161911a5d0962efcd2abcab9f81c0efb1a
-
SHA256
c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02
-
SHA512
62435385587410222b92d445c96438a72d16a35d0ac2033238cd2b062057e56f8a5940e478908d161f51b761edffd1191b3a03e90acaeaf1fe5c0997ee549fba
-
SSDEEP
98304:93wp6wCTOhWlc+pgf3BK0mKas7Ceivt3xp8/+l5P:OWamKBCeez
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a090ec611c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a090ec611c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a090ec611c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a090ec611c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a090ec611c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a090ec611c.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ad431beb18.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a090ec611c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ KKFBAAFCGI.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 974da2e11b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a8a65f5ebe.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2468 chrome.exe 6560 msedge.exe 2060 chrome.exe 2752 chrome.exe 6004 msedge.exe 6700 msedge.exe 5644 msedge.exe 5652 msedge.exe 1912 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ad431beb18.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ad431beb18.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a8a65f5ebe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a090ec611c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a090ec611c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion KKFBAAFCGI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a8a65f5ebe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 974da2e11b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion KKFBAAFCGI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 974da2e11b.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation a8a65f5ebe.exe -
Executes dropped EXE 10 IoCs
pid Process 1624 skotes.exe 4488 Z9Pp9pM.exe 3012 ad431beb18.exe 4952 974da2e11b.exe 1924 a8a65f5ebe.exe 2368 c222dd0e49.exe 5768 a090ec611c.exe 5800 KKFBAAFCGI.exe 6612 skotes.exe 6672 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine KKFBAAFCGI.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine a8a65f5ebe.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine a090ec611c.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine ad431beb18.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 974da2e11b.exe -
Loads dropped DLL 2 IoCs
pid Process 1924 a8a65f5ebe.exe 1924 a8a65f5ebe.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a090ec611c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a090ec611c.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\974da2e11b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013655001\\974da2e11b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a8a65f5ebe.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013656001\\a8a65f5ebe.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c222dd0e49.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013657001\\c222dd0e49.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a090ec611c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013658001\\a090ec611c.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023c06-119.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2588 file.exe 1624 skotes.exe 3012 ad431beb18.exe 4952 974da2e11b.exe 1924 a8a65f5ebe.exe 5768 a090ec611c.exe 5800 KKFBAAFCGI.exe 6612 skotes.exe 6672 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4760 4952 WerFault.exe 97 7000 4488 WerFault.exe 85 1004 3012 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language c222dd0e49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a090ec611c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Z9Pp9pM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad431beb18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KKFBAAFCGI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c222dd0e49.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage c222dd0e49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 974da2e11b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8a65f5ebe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 a8a65f5ebe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString a8a65f5ebe.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 5028 taskkill.exe 5104 taskkill.exe 4980 taskkill.exe 1612 taskkill.exe 4520 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 2588 file.exe 2588 file.exe 1624 skotes.exe 1624 skotes.exe 3012 ad431beb18.exe 3012 ad431beb18.exe 4952 974da2e11b.exe 4952 974da2e11b.exe 1924 a8a65f5ebe.exe 1924 a8a65f5ebe.exe 1924 a8a65f5ebe.exe 1924 a8a65f5ebe.exe 1924 a8a65f5ebe.exe 1924 a8a65f5ebe.exe 1912 chrome.exe 1912 chrome.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe 5768 a090ec611c.exe 5768 a090ec611c.exe 1924 a8a65f5ebe.exe 1924 a8a65f5ebe.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 2876 msedge.exe 2876 msedge.exe 6004 msedge.exe 6004 msedge.exe 5768 a090ec611c.exe 5768 a090ec611c.exe 5768 a090ec611c.exe 1924 a8a65f5ebe.exe 1924 a8a65f5ebe.exe 1924 a8a65f5ebe.exe 1924 a8a65f5ebe.exe 5800 KKFBAAFCGI.exe 5800 KKFBAAFCGI.exe 6612 skotes.exe 6612 skotes.exe 6672 skotes.exe 6672 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 6004 msedge.exe 6004 msedge.exe 6004 msedge.exe 6004 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeDebugPrivilege 5028 taskkill.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeDebugPrivilege 5104 taskkill.exe Token: SeDebugPrivilege 4980 taskkill.exe Token: SeDebugPrivilege 1612 taskkill.exe Token: SeDebugPrivilege 4520 taskkill.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 5768 a090ec611c.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2588 file.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 2368 c222dd0e49.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe 6004 msedge.exe 6004 msedge.exe 6004 msedge.exe 6004 msedge.exe 6004 msedge.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 2368 c222dd0e49.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 2368 c222dd0e49.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe 2368 c222dd0e49.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4076 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2588 wrote to memory of 1624 2588 file.exe 83 PID 2588 wrote to memory of 1624 2588 file.exe 83 PID 2588 wrote to memory of 1624 2588 file.exe 83 PID 1624 wrote to memory of 4488 1624 skotes.exe 85 PID 1624 wrote to memory of 4488 1624 skotes.exe 85 PID 1624 wrote to memory of 4488 1624 skotes.exe 85 PID 1624 wrote to memory of 3012 1624 skotes.exe 91 PID 1624 wrote to memory of 3012 1624 skotes.exe 91 PID 1624 wrote to memory of 3012 1624 skotes.exe 91 PID 1624 wrote to memory of 4952 1624 skotes.exe 97 PID 1624 wrote to memory of 4952 1624 skotes.exe 97 PID 1624 wrote to memory of 4952 1624 skotes.exe 97 PID 1624 wrote to memory of 1924 1624 skotes.exe 103 PID 1624 wrote to memory of 1924 1624 skotes.exe 103 PID 1624 wrote to memory of 1924 1624 skotes.exe 103 PID 1924 wrote to memory of 1912 1924 a8a65f5ebe.exe 105 PID 1924 wrote to memory of 1912 1924 a8a65f5ebe.exe 105 PID 1912 wrote to memory of 2584 1912 chrome.exe 106 PID 1912 wrote to memory of 2584 1912 chrome.exe 106 PID 1624 wrote to memory of 2368 1624 skotes.exe 107 PID 1624 wrote to memory of 2368 1624 skotes.exe 107 PID 1624 wrote to memory of 2368 1624 skotes.exe 107 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 3208 1912 chrome.exe 108 PID 1912 wrote to memory of 2640 1912 chrome.exe 110 PID 1912 wrote to memory of 2640 1912 chrome.exe 110 PID 1912 wrote to memory of 3312 1912 chrome.exe 111 PID 1912 wrote to memory of 3312 1912 chrome.exe 111 PID 1912 wrote to memory of 3312 1912 chrome.exe 111 PID 1912 wrote to memory of 3312 1912 chrome.exe 111 PID 1912 wrote to memory of 3312 1912 chrome.exe 111 PID 1912 wrote to memory of 3312 1912 chrome.exe 111 PID 1912 wrote to memory of 3312 1912 chrome.exe 111 PID 1912 wrote to memory of 3312 1912 chrome.exe 111 PID 1912 wrote to memory of 3312 1912 chrome.exe 111 PID 1912 wrote to memory of 3312 1912 chrome.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe"C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 2244⤵
- Program crash
PID:7000
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013654001\ad431beb18.exe"C:\Users\Admin\AppData\Local\Temp\1013654001\ad431beb18.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 17404⤵
- Program crash
PID:1004
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013655001\974da2e11b.exe"C:\Users\Admin\AppData\Local\Temp\1013655001\974da2e11b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 13084⤵
- Program crash
PID:4760
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013656001\a8a65f5ebe.exe"C:\Users\Admin\AppData\Local\Temp\1013656001\a8a65f5ebe.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdc3e6cc40,0x7ffdc3e6cc4c,0x7ffdc3e6cc585⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,10660175052602252520,5446683816729801067,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1904 /prefetch:25⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,10660175052602252520,5446683816729801067,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2200 /prefetch:35⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,10660175052602252520,5446683816729801067,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2452 /prefetch:85⤵PID:3312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,10660175052602252520,5446683816729801067,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:15⤵
- Uses browser remote debugging
PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,10660175052602252520,5446683816729801067,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3316 /prefetch:15⤵
- Uses browser remote debugging
PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4508,i,10660175052602252520,5446683816729801067,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4532 /prefetch:15⤵
- Uses browser remote debugging
PID:2468
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:6004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc3e746f8,0x7ffdc3e74708,0x7ffdc3e747185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:6024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,633814349524142487,4268686331199424121,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:25⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,633814349524142487,4268686331199424121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,633814349524142487,4268686331199424121,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:85⤵PID:6320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,633814349524142487,4268686331199424121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:15⤵
- Uses browser remote debugging
PID:6560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,633814349524142487,4268686331199424121,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:15⤵
- Uses browser remote debugging
PID:6700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,633814349524142487,4268686331199424121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:15⤵
- Uses browser remote debugging
PID:5644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,633814349524142487,4268686331199424121,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:15⤵
- Uses browser remote debugging
PID:5652
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\KKFBAAFCGI.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5248 -
C:\Users\Admin\Documents\KKFBAAFCGI.exe"C:\Users\Admin\Documents\KKFBAAFCGI.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013657001\c222dd0e49.exe"C:\Users\Admin\AppData\Local\Temp\1013657001\c222dd0e49.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2368 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3932
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4076 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1972 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae14cc9b-af62-41df-b081-e7c92055ab34} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" gpu6⤵PID:4652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2428 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {55c16c64-cd71-4bb4-a52c-7f34d9e39cdc} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" socket6⤵PID:3184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3036 -childID 1 -isForBrowser -prefsHandle 3028 -prefMapHandle 3012 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5d6d7109-e8f6-4b1e-a4cb-ef5b24bdd3ce} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" tab6⤵PID:1388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3916 -childID 2 -isForBrowser -prefsHandle 3004 -prefMapHandle 3860 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b09a08e-4325-458d-9a40-6874686da05d} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" tab6⤵PID:5332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4748 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4664 -prefMapHandle 4712 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2fd8b4b8-76a6-43be-8195-68a41e9a7cdd} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" utility6⤵
- Checks processor information in registry
PID:5736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5116 -childID 3 -isForBrowser -prefsHandle 5112 -prefMapHandle 5108 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a41ed2c7-d5f5-4c85-b8d8-55dd00f16776} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" tab6⤵PID:6528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5264 -childID 4 -isForBrowser -prefsHandle 5308 -prefMapHandle 5256 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {821b4868-5d48-4cac-b5ab-fb9ade5a07ed} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" tab6⤵PID:6580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5468 -childID 5 -isForBrowser -prefsHandle 5572 -prefMapHandle 5556 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {74c60387-1e63-4f64-a3d4-d30e4f1fb261} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" tab6⤵PID:6604
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013658001\a090ec611c.exe"C:\Users\Admin\AppData\Local\Temp\1013658001\a090ec611c.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4952 -ip 49521⤵PID:1212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4952 -ip 49521⤵PID:4076
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4488 -ip 44881⤵PID:6400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3012 -ip 30121⤵PID:5808
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6612
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6672
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
5KB
MD55d5badbb4243d733c6c1e20d429e2ef7
SHA11a54eef7f7ec4ef74a6a2ae6a2df91d18a13f744
SHA256229e944c3c0f1f2cd4642219b31cc160eb2922f5f8d8b5a18fa69b72e9793f54
SHA51257f57c01d6cc747317982308a65e44de10742fef27e17d2bf88a0bbe60ebf5e8bb36f7d89e0c593f10972b14e4048b22f742c2609ae829409deb946b5fcbacba
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD55b0324f12f95545d8f645a41400f3e5b
SHA10bad68b4cc97a28819005f6bd550d61cc5f8186f
SHA2567c9cf2cade9feb7807e4105ec1eff323cbeaa65755a1ee252a2c00b403f5089d
SHA512ea41e055246f472bccee569cf6f4bad5b49f3012fe7c6624dfc07bcdac5ef2ae982a52a3bad948b8ed50ae93b02380eb1fa99eca27594848eca06525b9a33606
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD54182268c1fc642780c4ccd06466cd158
SHA1b4f3f567a10dd20227449f6a40049848dc1de20b
SHA25614759bc39b50fbcb1909021c8add98ed56d07e948048f209815b371032d02c66
SHA512b775903214557bc8a0f797df9138f40f2025d702d420c0a08148ffb9b1ba036f61ad1125c93fa54b55895479e80ed08f907178e20f03bc9af06b72b7f4e647a1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
1.9MB
MD55abd444028545a70ac140f6c244f0da8
SHA15b46c706dfe9f4f443a894d746a76020a1835077
SHA25603704ac5905c8ed32d791115ac52f119286075a5d25e3be6724f3b990c3f6361
SHA51294b8033182016b9eff96e2360656c54724df879ac0f071c9fc2d95a07b012b462592813940d7623a100b6bbac6689ec461cccacb6cf316bd7981cb8a48c19652
-
Filesize
1.8MB
MD55f300ebc0539ea54fd18fd8e52ca259a
SHA1b33d5e4d004db4f57361ba79063742eb029014ab
SHA256a85bcadbd84cad34d13795eaf7a4a452ff99a7c4df3c4e838cf623bab52c32b8
SHA512b1159fb95d7ca900d5ee845b614e55f05dc83d94bd89d5c646c8a27be0184f8d71111a5112e08f7508f6f5306eb841fe82a7e939d2a4f24fd28a43d970c00732
-
Filesize
1.7MB
MD5327c2f24a87f170dbede36cc43a68875
SHA192df6f7e472f2d99eb14386536c431fdc8883d95
SHA256e2892813c672c9bc92a7ac23b203e9647c617142222d5c5220a6df968b24b499
SHA5124a397be99ec580af10146cac47786ad352f050e9eff3316096839ec1c7337239a721e96277b3515e95a5b9e5a59800b5794db2477d07d3374915f488d5632c3f
-
Filesize
949KB
MD54095397f24bcd2fcda6bcfebbc12aa3b
SHA1d137e6e8756435bca1d3da2846a13020bc7217c8
SHA256b530fa08ffafcb20017217c66ebde979245f9a08b3a1f61704eb0351c37954ed
SHA512f462b0fb77baadabc60084b788602853e4fd8de0a1bf3e9981311003b6e5ea6302ae52d261215f459d8de841755f19550426c796b19db575dfd95906fefc6e3e
-
Filesize
2.6MB
MD5fd134059ea499f3625917d465e84428b
SHA158dc335cbefe8d254a0f881e5504e08dd55de08a
SHA256ed12d7259bf015a29020861c1102d4780cfbbd8e49847f02bd94beb797c1b3f3
SHA512eedb1b75b566f239dc7bd2f8ab19343d2b17bafc3beade17091dc959a5c3870d62338f02a83f35ea6914ddebcf16d33295057f57c1681e77a1ef7ba5565f5d97
-
Filesize
3.1MB
MD5aeaac78d0572bbf1a71cd4248596dc86
SHA1cb40fd161911a5d0962efcd2abcab9f81c0efb1a
SHA256c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02
SHA51262435385587410222b92d445c96438a72d16a35d0ac2033238cd2b062057e56f8a5940e478908d161f51b761edffd1191b3a03e90acaeaf1fe5c0997ee549fba
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize6KB
MD55a33f32c8501e6e450ac29a5369e84de
SHA14e2649d09cbe05b8d2d84dee320b8d91d5ed8ee6
SHA256d1c3f97d9a724fe167b90b1ce2280be4d7b2a376b007df7ce15aa607d9875903
SHA5126eebce71c4b352c97ec34587d084d024eb9028c09a548314e762d8e8c0802d1775c6161b2204a832873c8fb136920edb2201741cf4607553455eda2dc0dc487e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize10KB
MD5b8a227c413b2fd3aa60b3def997affcf
SHA11538e98fa7e7b80d58c18af520567d683a108983
SHA256356926b475acf7021eb408c79cfa0f75ab1360f7c792edab573791444adec96b
SHA5127aaa371422afd1185d48442e47d72ea4cade14a369c6c487775327661ae6d5b90aeed9913154275e3f093a3f54f9818c0f0514fbfa63a4872f41c6701fb63951
-
Filesize
256KB
MD54ec75ec5291d6b4d24a075a1bcd11b90
SHA144b8cd377e6112979b40a14d18a1bf7965538293
SHA256439095ce73fad59fd236498650e41a8cf486bd5fe8eac744206056846f3e6f09
SHA512b4093e08b0e96a2b276e67a594b8c7aa6381999e573ce0f66f0f869f13aec70f6049076ce984c7b8b8c2562b0edd4558557cb71206105a499c9f13da5c06dcc0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5ef0903ffa35cff3b820affe4d518b4d2
SHA1f5dc8f64ae2fc405e53563102f686416e609998b
SHA2562e4020da203d6d687a4329ba887b3e269dc3b1e249b9062e8589ede07dc5d093
SHA51291959d88146c31b558870b4ba32638bbdaa3a2932f8a2effe93be2a3f69e410d494ddcbd49d1db5a49a108f4b579588aacb0f72c368f535d4c4bdf904b05373c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD52900d98cd1563e267208f8c0d1392451
SHA1ba75f4e818aeaaf553683a422bf96a29c337c624
SHA256ef2b3511039bb884bca0af504309482946ada470a6f1a7008ebde58e625f1a07
SHA5127abb47f4abb41c51dab4cac0fa279ac1a5912402a94839b82733fe4a06d6810b700ba1acddd6ac167768a5efe20bb7596827adec5dde1f4bd3c67408f89c0944
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD53a03fda071a6dc44194e2f27cd0d661a
SHA121a2afa32ecb1e4f374a2af9f3b79a3274be8ca5
SHA256e599e6649651330925f207e9812c60f3074feca26a7ad76d24a7105268e722ad
SHA5127967acd5eb7d58f7136b47dcebeef24d825c6f00184a62a3f0faa8849b5dbba8f49261fd1174b48bcb8fa995d6725458a33318028ee7bc1802e47512cdd5cc6d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\af856ce4-b600-43cc-84c5-f96369595818
Filesize982B
MD5da3518164e7f64c59121c5c6206eeb8a
SHA1b535d38695e2f6e177b95ffc8a9f9658b46c360b
SHA25695a75577f9a49505fe81ec2b966eb62caa20fd0535d2db30ddfb58a3f7633064
SHA512a72394413f70221d52e174f7450eeaf917065777f4c44f22c9b71efee96b6580c51f908b3677c4e71fedb0a6763b32e05782d9ed90ea1e97b62f174859e35286
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\e32b7dd7-584d-4da8-b398-8273905e96f1
Filesize26KB
MD56dc272d553a730fe8b8ffdba187c8594
SHA1ce02050195163be96059d871d6f9f9fdca086876
SHA2569f06bfbf2f43172bd1de88ae2df4c8932fc74a2124b67847b6c0c1250241dc07
SHA5129741e8e1a7b4808803cdcab9379813296dd59f943ec06d9bf500d13c53a9211e493dcdfaa4a4a7582a0a31dcf9befcaa31d59336ac849f04649ec27c5016de1a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\f2bbd249-e157-469f-bfc6-cd27794c3251
Filesize671B
MD533f9f0536d9993d3f91db4c910f71f65
SHA12045df80ee3b92415e3f756464dd4ec3b065c7a2
SHA256ba4e34efbe5c0c1033daa04996c86cc39c90f400888f0d0025872bbe3303707d
SHA512d2be48e2f55d77005222ae7b665af7b182317d079cf34cb00af5468cf471c026cbcb19e174926b9b392ba3c27ed09a07fd59d44d991db7dea8bec61f38dbb3bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
1.4MB
MD5a070670f209ca5d112c5ba33d03d6c5f
SHA1f1ea15ff7299a00a2af7630d0707290c10b3544c
SHA25620a6caa02af00383d741501de8ade598e1caad6acbbb0f18757392a4e6583d56
SHA5129dca980c422de7298635038ba7c9e8d68ff5ae3355d8d45b38554e7c3ed5c13b800ad76935eaa3bb085335f32bb80964289cfa6d7b63da283f722b0bfb598bb0
-
Filesize
12KB
MD5c18c83b7e4f6b7a4d48f22ac1231fe50
SHA1df17c767dcc35708f8a08347c6ee7d1231472279
SHA256c4055b482306ae0f9c74d7d804b99c993ea1896a624252d6e694ed825d2ca02d
SHA5128953f2a3ce261a52e53a6ce96ca6817da97e2d906c4c994e3dbd8b5c6a3bd681049067e3e2091c33b1b6a62db4972f5993c51cc283fb2f77dda66ed172bb0dc2
-
Filesize
15KB
MD5876365a80ceed7e9852a324c2cb9026d
SHA13e9db86ccab4243e698e72346bc85334f53a24be
SHA256510c3dede5130d57aab88211be635c1f8ba624c728d704cdd47fc68f345a08d2
SHA51228bdacdd480ef6ecdf144d27185dc7fe553aa56e33e4f8d430e70b8588e720f3787880f756e6b285480ec48cb2771f48ad0318c1c373133c1c7ad6b1e95b7755
-
Filesize
10KB
MD5d2892e1269df551989036fb3f313f361
SHA1a128e37877640c39dcfdd002a7c4c45eb7d26f1e
SHA25654a8a4a71f5f65fcce623910052faf84e7757db9930c3d8cd7f52a5ffa655c97
SHA512304c5b5b932630989f7af81923128b8cd64bf9bdf323dec23397904dd93e2b2d402b61b64cfd743e43b522663f15f6265dabffcda17fafc7d75cb95e7638e496
-
Filesize
10KB
MD582c047926039f7d1f21d0f308cf73a4e
SHA1719dd922fa84c9053338d0cd4443cd22fdb11d6f
SHA256b20e918a84ca5811a13db10122347d84f7fc8e3609463a75eb0d935830b0ca0e
SHA512b423ab3e0403a6271b7b554c07bf77e40140238c3521916b05d8215671e69c8660326c19e3824a092fb79307a53dc7042e7c64121465a7751dfa7327c9b52aa8