Analysis
-
max time kernel
133s -
max time network
141s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
10-11-2020 07:28
Static task
static1
Behavioral task
behavioral1
Sample
b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe
Resource
win10v20201028
General
-
Target
b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe
-
Size
5.2MB
-
MD5
be8835554720aaa3d9b3077f33f0d706
-
SHA1
a29f516f091cfcb81a9c7ae45658f469dae7d84b
-
SHA256
b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d
-
SHA512
78cdf82b46ec14c64553fc5423cc952a0f89f661dcab66c1aa27e44e5086f30f93642ca0bd809b355470352b7aa0a509b7fb262a5d5fc801a6c2bce7e730fbdf
Malware Config
Signatures
-
Cobalt Strike reflective loader 42 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\DkKfafP.exe cobalt_reflective_dll C:\Windows\system\DkKfafP.exe cobalt_reflective_dll \Windows\system\zFYbpaY.exe cobalt_reflective_dll C:\Windows\system\zFYbpaY.exe cobalt_reflective_dll \Windows\system\TIncZHK.exe cobalt_reflective_dll C:\Windows\system\TIncZHK.exe cobalt_reflective_dll C:\Windows\system\SeJvnjE.exe cobalt_reflective_dll \Windows\system\SeJvnjE.exe cobalt_reflective_dll \Windows\system\JdqfmVj.exe cobalt_reflective_dll C:\Windows\system\JdqfmVj.exe cobalt_reflective_dll \Windows\system\bVGpvDJ.exe cobalt_reflective_dll C:\Windows\system\bVGpvDJ.exe cobalt_reflective_dll \Windows\system\KplduDU.exe cobalt_reflective_dll C:\Windows\system\KplduDU.exe cobalt_reflective_dll \Windows\system\COfohDJ.exe cobalt_reflective_dll C:\Windows\system\COfohDJ.exe cobalt_reflective_dll \Windows\system\FPStiRU.exe cobalt_reflective_dll C:\Windows\system\FPStiRU.exe cobalt_reflective_dll \Windows\system\mmpUcIL.exe cobalt_reflective_dll C:\Windows\system\mmpUcIL.exe cobalt_reflective_dll \Windows\system\ZZaEoam.exe cobalt_reflective_dll C:\Windows\system\ZZaEoam.exe cobalt_reflective_dll \Windows\system\BeHytOB.exe cobalt_reflective_dll C:\Windows\system\BeHytOB.exe cobalt_reflective_dll \Windows\system\VDeYJNl.exe cobalt_reflective_dll \Windows\system\XhaWCqf.exe cobalt_reflective_dll C:\Windows\system\XhaWCqf.exe cobalt_reflective_dll C:\Windows\system\VDeYJNl.exe cobalt_reflective_dll \Windows\system\uIWVSAm.exe cobalt_reflective_dll C:\Windows\system\uIWVSAm.exe cobalt_reflective_dll \Windows\system\tPWljtR.exe cobalt_reflective_dll C:\Windows\system\tPWljtR.exe cobalt_reflective_dll C:\Windows\system\Sdoksta.exe cobalt_reflective_dll \Windows\system\Sdoksta.exe cobalt_reflective_dll \Windows\system\wtRvasd.exe cobalt_reflective_dll C:\Windows\system\wtRvasd.exe cobalt_reflective_dll \Windows\system\lCsgQjB.exe cobalt_reflective_dll C:\Windows\system\lCsgQjB.exe cobalt_reflective_dll \Windows\system\blWmAHk.exe cobalt_reflective_dll C:\Windows\system\blWmAHk.exe cobalt_reflective_dll \Windows\system\BRzdUYI.exe cobalt_reflective_dll C:\Windows\system\BRzdUYI.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 21 IoCs
Processes:
DkKfafP.exezFYbpaY.exeTIncZHK.exeSeJvnjE.exeJdqfmVj.exebVGpvDJ.exeKplduDU.exeCOfohDJ.exeFPStiRU.exemmpUcIL.exeZZaEoam.exeBeHytOB.exeXhaWCqf.exeVDeYJNl.exeuIWVSAm.exetPWljtR.exeSdoksta.exewtRvasd.exelCsgQjB.exeblWmAHk.exeBRzdUYI.exepid process 816 DkKfafP.exe 1308 zFYbpaY.exe 1944 TIncZHK.exe 1984 SeJvnjE.exe 336 JdqfmVj.exe 1728 bVGpvDJ.exe 616 KplduDU.exe 1812 COfohDJ.exe 1608 FPStiRU.exe 1620 mmpUcIL.exe 552 ZZaEoam.exe 660 BeHytOB.exe 1344 XhaWCqf.exe 860 VDeYJNl.exe 984 uIWVSAm.exe 692 tPWljtR.exe 1520 Sdoksta.exe 1256 wtRvasd.exe 1856 lCsgQjB.exe 1232 blWmAHk.exe 1664 BRzdUYI.exe -
Processes:
resource yara_rule \Windows\system\DkKfafP.exe upx C:\Windows\system\DkKfafP.exe upx \Windows\system\zFYbpaY.exe upx C:\Windows\system\zFYbpaY.exe upx \Windows\system\TIncZHK.exe upx C:\Windows\system\TIncZHK.exe upx C:\Windows\system\SeJvnjE.exe upx \Windows\system\SeJvnjE.exe upx \Windows\system\JdqfmVj.exe upx C:\Windows\system\JdqfmVj.exe upx \Windows\system\bVGpvDJ.exe upx C:\Windows\system\bVGpvDJ.exe upx \Windows\system\KplduDU.exe upx C:\Windows\system\KplduDU.exe upx \Windows\system\COfohDJ.exe upx C:\Windows\system\COfohDJ.exe upx \Windows\system\FPStiRU.exe upx C:\Windows\system\FPStiRU.exe upx \Windows\system\mmpUcIL.exe upx C:\Windows\system\mmpUcIL.exe upx \Windows\system\ZZaEoam.exe upx C:\Windows\system\ZZaEoam.exe upx \Windows\system\BeHytOB.exe upx C:\Windows\system\BeHytOB.exe upx \Windows\system\VDeYJNl.exe upx \Windows\system\XhaWCqf.exe upx C:\Windows\system\XhaWCqf.exe upx C:\Windows\system\VDeYJNl.exe upx \Windows\system\uIWVSAm.exe upx C:\Windows\system\uIWVSAm.exe upx \Windows\system\tPWljtR.exe upx C:\Windows\system\tPWljtR.exe upx C:\Windows\system\Sdoksta.exe upx \Windows\system\Sdoksta.exe upx \Windows\system\wtRvasd.exe upx C:\Windows\system\wtRvasd.exe upx \Windows\system\lCsgQjB.exe upx C:\Windows\system\lCsgQjB.exe upx \Windows\system\blWmAHk.exe upx C:\Windows\system\blWmAHk.exe upx \Windows\system\BRzdUYI.exe upx C:\Windows\system\BRzdUYI.exe upx -
Loads dropped DLL 21 IoCs
Processes:
b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exepid process 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe -
JavaScript code in executable 42 IoCs
Processes:
resource yara_rule \Windows\system\DkKfafP.exe js C:\Windows\system\DkKfafP.exe js \Windows\system\zFYbpaY.exe js C:\Windows\system\zFYbpaY.exe js \Windows\system\TIncZHK.exe js C:\Windows\system\TIncZHK.exe js C:\Windows\system\SeJvnjE.exe js \Windows\system\SeJvnjE.exe js \Windows\system\JdqfmVj.exe js C:\Windows\system\JdqfmVj.exe js \Windows\system\bVGpvDJ.exe js C:\Windows\system\bVGpvDJ.exe js \Windows\system\KplduDU.exe js C:\Windows\system\KplduDU.exe js \Windows\system\COfohDJ.exe js C:\Windows\system\COfohDJ.exe js \Windows\system\FPStiRU.exe js C:\Windows\system\FPStiRU.exe js \Windows\system\mmpUcIL.exe js C:\Windows\system\mmpUcIL.exe js \Windows\system\ZZaEoam.exe js C:\Windows\system\ZZaEoam.exe js \Windows\system\BeHytOB.exe js C:\Windows\system\BeHytOB.exe js \Windows\system\VDeYJNl.exe js \Windows\system\XhaWCqf.exe js C:\Windows\system\XhaWCqf.exe js C:\Windows\system\VDeYJNl.exe js \Windows\system\uIWVSAm.exe js C:\Windows\system\uIWVSAm.exe js \Windows\system\tPWljtR.exe js C:\Windows\system\tPWljtR.exe js C:\Windows\system\Sdoksta.exe js \Windows\system\Sdoksta.exe js \Windows\system\wtRvasd.exe js C:\Windows\system\wtRvasd.exe js \Windows\system\lCsgQjB.exe js C:\Windows\system\lCsgQjB.exe js \Windows\system\blWmAHk.exe js C:\Windows\system\blWmAHk.exe js \Windows\system\BRzdUYI.exe js C:\Windows\system\BRzdUYI.exe js -
Drops file in Windows directory 21 IoCs
Processes:
b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exedescription ioc process File created C:\Windows\System\FPStiRU.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\BeHytOB.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\wtRvasd.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\blWmAHk.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\zFYbpaY.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\SeJvnjE.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\ZZaEoam.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\Sdoksta.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\bVGpvDJ.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\VDeYJNl.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\uIWVSAm.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\BRzdUYI.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\COfohDJ.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\mmpUcIL.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\XhaWCqf.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\tPWljtR.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\DkKfafP.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\TIncZHK.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\JdqfmVj.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\KplduDU.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe File created C:\Windows\System\lCsgQjB.exe b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exedescription pid process Token: SeLockMemoryPrivilege 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe Token: SeLockMemoryPrivilege 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exedescription pid process target process PID 1584 wrote to memory of 816 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe DkKfafP.exe PID 1584 wrote to memory of 816 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe DkKfafP.exe PID 1584 wrote to memory of 816 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe DkKfafP.exe PID 1584 wrote to memory of 1308 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe zFYbpaY.exe PID 1584 wrote to memory of 1308 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe zFYbpaY.exe PID 1584 wrote to memory of 1308 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe zFYbpaY.exe PID 1584 wrote to memory of 1944 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe TIncZHK.exe PID 1584 wrote to memory of 1944 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe TIncZHK.exe PID 1584 wrote to memory of 1944 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe TIncZHK.exe PID 1584 wrote to memory of 1984 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe SeJvnjE.exe PID 1584 wrote to memory of 1984 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe SeJvnjE.exe PID 1584 wrote to memory of 1984 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe SeJvnjE.exe PID 1584 wrote to memory of 336 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe JdqfmVj.exe PID 1584 wrote to memory of 336 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe JdqfmVj.exe PID 1584 wrote to memory of 336 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe JdqfmVj.exe PID 1584 wrote to memory of 1728 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe bVGpvDJ.exe PID 1584 wrote to memory of 1728 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe bVGpvDJ.exe PID 1584 wrote to memory of 1728 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe bVGpvDJ.exe PID 1584 wrote to memory of 616 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe KplduDU.exe PID 1584 wrote to memory of 616 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe KplduDU.exe PID 1584 wrote to memory of 616 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe KplduDU.exe PID 1584 wrote to memory of 1812 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe COfohDJ.exe PID 1584 wrote to memory of 1812 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe COfohDJ.exe PID 1584 wrote to memory of 1812 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe COfohDJ.exe PID 1584 wrote to memory of 1608 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe FPStiRU.exe PID 1584 wrote to memory of 1608 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe FPStiRU.exe PID 1584 wrote to memory of 1608 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe FPStiRU.exe PID 1584 wrote to memory of 1620 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe mmpUcIL.exe PID 1584 wrote to memory of 1620 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe mmpUcIL.exe PID 1584 wrote to memory of 1620 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe mmpUcIL.exe PID 1584 wrote to memory of 552 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe ZZaEoam.exe PID 1584 wrote to memory of 552 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe ZZaEoam.exe PID 1584 wrote to memory of 552 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe ZZaEoam.exe PID 1584 wrote to memory of 660 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe BeHytOB.exe PID 1584 wrote to memory of 660 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe BeHytOB.exe PID 1584 wrote to memory of 660 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe BeHytOB.exe PID 1584 wrote to memory of 860 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe VDeYJNl.exe PID 1584 wrote to memory of 860 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe VDeYJNl.exe PID 1584 wrote to memory of 860 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe VDeYJNl.exe PID 1584 wrote to memory of 1344 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe XhaWCqf.exe PID 1584 wrote to memory of 1344 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe XhaWCqf.exe PID 1584 wrote to memory of 1344 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe XhaWCqf.exe PID 1584 wrote to memory of 984 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe uIWVSAm.exe PID 1584 wrote to memory of 984 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe uIWVSAm.exe PID 1584 wrote to memory of 984 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe uIWVSAm.exe PID 1584 wrote to memory of 692 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe tPWljtR.exe PID 1584 wrote to memory of 692 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe tPWljtR.exe PID 1584 wrote to memory of 692 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe tPWljtR.exe PID 1584 wrote to memory of 1520 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe Sdoksta.exe PID 1584 wrote to memory of 1520 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe Sdoksta.exe PID 1584 wrote to memory of 1520 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe Sdoksta.exe PID 1584 wrote to memory of 1256 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe wtRvasd.exe PID 1584 wrote to memory of 1256 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe wtRvasd.exe PID 1584 wrote to memory of 1256 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe wtRvasd.exe PID 1584 wrote to memory of 1856 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe lCsgQjB.exe PID 1584 wrote to memory of 1856 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe lCsgQjB.exe PID 1584 wrote to memory of 1856 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe lCsgQjB.exe PID 1584 wrote to memory of 1232 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe blWmAHk.exe PID 1584 wrote to memory of 1232 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe blWmAHk.exe PID 1584 wrote to memory of 1232 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe blWmAHk.exe PID 1584 wrote to memory of 1664 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe BRzdUYI.exe PID 1584 wrote to memory of 1664 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe BRzdUYI.exe PID 1584 wrote to memory of 1664 1584 b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe BRzdUYI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe"C:\Users\Admin\AppData\Local\Temp\b4a23ad68a5379e0db12226567fa494df10555b71c6097d68984bf354355745d.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\System\DkKfafP.exeC:\Windows\System\DkKfafP.exe2⤵
- Executes dropped EXE
PID:816 -
C:\Windows\System\zFYbpaY.exeC:\Windows\System\zFYbpaY.exe2⤵
- Executes dropped EXE
PID:1308 -
C:\Windows\System\TIncZHK.exeC:\Windows\System\TIncZHK.exe2⤵
- Executes dropped EXE
PID:1944 -
C:\Windows\System\SeJvnjE.exeC:\Windows\System\SeJvnjE.exe2⤵
- Executes dropped EXE
PID:1984 -
C:\Windows\System\JdqfmVj.exeC:\Windows\System\JdqfmVj.exe2⤵
- Executes dropped EXE
PID:336 -
C:\Windows\System\bVGpvDJ.exeC:\Windows\System\bVGpvDJ.exe2⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\System\KplduDU.exeC:\Windows\System\KplduDU.exe2⤵
- Executes dropped EXE
PID:616 -
C:\Windows\System\COfohDJ.exeC:\Windows\System\COfohDJ.exe2⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\System\FPStiRU.exeC:\Windows\System\FPStiRU.exe2⤵
- Executes dropped EXE
PID:1608 -
C:\Windows\System\mmpUcIL.exeC:\Windows\System\mmpUcIL.exe2⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\System\ZZaEoam.exeC:\Windows\System\ZZaEoam.exe2⤵
- Executes dropped EXE
PID:552 -
C:\Windows\System\BeHytOB.exeC:\Windows\System\BeHytOB.exe2⤵
- Executes dropped EXE
PID:660 -
C:\Windows\System\VDeYJNl.exeC:\Windows\System\VDeYJNl.exe2⤵
- Executes dropped EXE
PID:860 -
C:\Windows\System\XhaWCqf.exeC:\Windows\System\XhaWCqf.exe2⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\System\uIWVSAm.exeC:\Windows\System\uIWVSAm.exe2⤵
- Executes dropped EXE
PID:984 -
C:\Windows\System\tPWljtR.exeC:\Windows\System\tPWljtR.exe2⤵
- Executes dropped EXE
PID:692 -
C:\Windows\System\Sdoksta.exeC:\Windows\System\Sdoksta.exe2⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\System\wtRvasd.exeC:\Windows\System\wtRvasd.exe2⤵
- Executes dropped EXE
PID:1256 -
C:\Windows\System\lCsgQjB.exeC:\Windows\System\lCsgQjB.exe2⤵
- Executes dropped EXE
PID:1856 -
C:\Windows\System\blWmAHk.exeC:\Windows\System\blWmAHk.exe2⤵
- Executes dropped EXE
PID:1232 -
C:\Windows\System\BRzdUYI.exeC:\Windows\System\BRzdUYI.exe2⤵
- Executes dropped EXE
PID:1664
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0e3ea617985912097a02366dd4db9cd4
SHA157c5860496036f12d7f9c62add065320ac51df9a
SHA2567bdf31df523190746f0a964f9b933f14391f0cdd32a881cec24363b7098a168e
SHA5125008eeb866037c0b8154c41d18ec629f8973ea1a4c12b2a959fb66c5f18788e3dc227c7775521282788304f678fc21c282f080c682260a44f16490e31da3c5cc
-
MD5
698e7640806b2765412ff2b935513bbe
SHA1712a10cec98d65790219b389421aa416dd5b723c
SHA256c7a26a08a45924c2027e90362d6bf44a3c8b737a635ab9cb555e3b525533b59e
SHA512c095d2bdd83b020120f448c591696b54fb400ca0c47dd9a6018b2d42b19b2e2eafcf391cbf66ea3c627cca9d93e7137108ca0e69356e9f4e70cca9c4ad6baccf
-
MD5
53a6b9f8b5642a33309aa50da6fc24d4
SHA1ac7a2d48a0f32a0db4fc7c2550f33f94834414bd
SHA2568f3e30501486d711633e7f3d9e2ae3c3469f4392669ca62b0267b0b1667e6cc8
SHA512f4c3ee1c90345cfb7e2bd6e5311270bbfd4ea0c1c33179dcfbcaeb9eb503520299762cc84bd1cd90f1d05654f4af222488f676a6d4f3e7106558c093233398c9
-
MD5
310b8b35e1359d623149b032b0e86189
SHA1f3ab9f6035abfc14b5660e4868f01f0d9d3a8985
SHA256d4894934e2976055d53cde9312f9caddf132df7a592ed33d22cea8a3ffb9c63d
SHA5124082caf4cda5c39b1b0ead84e3aceeaea4660d54718515d3a66998cd28e493ab6a199288819085658c2fd7249724ab52b47a2fa4e75047d7f2c6f2eb0e110770
-
MD5
66755a94c84a0a90fd2b4a2996388813
SHA16be430b2a0d18089d2eccb5f94527d59c7ec7610
SHA256d51b96e34ec51a1e534265d98bc793132446d92761c3bdc509eb805ce8e01fc6
SHA512d3fe80170f4b0371622c8e94c640f583de8b59bc1a50bbd16666eb20e8e4d18e05764a80e2adba3b1c25fa814ee7abb669afe5b0ff7e88691be868ce7a7ee4ae
-
MD5
46ed11456fdf2a4822a368fc33322119
SHA1e57ff5cc9ba7c6fc8836f07391d0679303e1f9ef
SHA256379997586f324b7a0dbfdf849b8f5c8cf368aaddcccdb6bda1b0ce39bda276f0
SHA512c72bc9954396a3d39e5512a339fc0d27d1b2e275d689faf3d4eb13d4170fd50c6a1e557b1ff097928f8cf8ef6143dbccd64116b0e3df7ff19c9d7998504770e6
-
MD5
91aa393a3084376b23f7d3ed79a3c322
SHA1ca4e0b0984f29418096cd8cb8dc3212ed31d7994
SHA256db64ce77db71b3fe5abf6c850e51ec488816c1ea1901c7dac7a75d365b856691
SHA51252549aaabb06dee4cd04cc904e845df8e4a7ba4c878cb9c3ebcdd29d69e75d3b6107426fd9bb934572a1a32a8060867d2e56b3452b5148f82375391fc8f98db7
-
MD5
304d7585f9e7b01e134ff048ca78bf34
SHA10b446204850db383a98ebde27a1fa91c57fc5454
SHA256d0bee377dd71dbb8984a31535bed20391d8e0e3e6c4c077b242c7dfde4505e29
SHA51240f272a14d706d5fcf34415145ee569c39640f49dedf15af9bb3c2dd208417bf8f1261d2c36149486608c321323ef3a299acb4d981bf85634e9443fe94056d4a
-
MD5
9d672f6c54a90e60997815521c3669a8
SHA126e2c0e84740adf32b1c8b2c7d3b1e9bdb0bfcb4
SHA2560f81b225458351add449fd05d4869c224a82ee852d0380f44c7dbb4d82c249c1
SHA512c3729b9adeb4db69a89732eeaee97bedf6187f6c97deabfafde673792d7b890fd1ab9830fc95f019a0d4346e9899fb1f07a6b2e47efc56a937fccef3f77ed008
-
MD5
22fc096afdcaeb96a0d3e275e4c1eb48
SHA10db90c2e93c74f0641bf0205e89359a29fcc6023
SHA2566ff67ca91c6868f79ac1ad868fdf2303d3b0e9b93ce6491500af8c1d7aa72461
SHA5120be589372aa56f59a595d6378700883b50a98a4ecae05d745b99ee88bb593547c69e9d3a8b8ff6d323ca0e8d69e6df625997caeea4ad582a906f6bcab709062c
-
MD5
d7e3fe7fc6fde713bff30e8ea537816a
SHA1778b3f31ecc22f1462516e64e794d741b5c1ebe9
SHA2563e95c8fa0ab1a7cb2b5d4d70941b3701de453af8302736d3b2036450590c5dae
SHA512ea73cefa5fde75887431837a7a89c030056be26014f07c4c1719cd664d77ae617fc79676b4c1839f401e9b8fbc40d5548fe33576f57222e21310b3cfddc89bf0
-
MD5
4d47c9595c0c41a42ba9de3396b8095b
SHA107a63305ea91163ff871b5b2f4067a79859e0a4c
SHA256d282b7f23f5636d1abb0627acb4422fc9db14f3042c131277a25d3e75589273d
SHA5126ec9d039563f61f833ebbc0e3045b85ab7b421af1c6fc49a1ef03d3080cd36fb36322bd2e7d233dff4871d18eaa9f28e6b91ef45203af3e6544754871d5b39b0
-
MD5
146d3ebef24b5a338c6ad25bb96060d4
SHA11238d6710ac6241aca98eebf383e85449f7abf76
SHA256612e50a17e2e68eb5c7ab545f3c764db9cafaf96e898feab8c97cf751c1f7510
SHA512a4c3ef53b87cff956b38e1f81ef7b82890d1b6cfcc34aef66f23bbda2fffb4ee24dad224e4c201bfc5f91d29082f1f754c7cdbd0d7c54525de1f82a24bb4c7f9
-
MD5
5617caca801f991bb1783470c78efa37
SHA115a48e128de3b76887473f8b2e0bb4dda3b1c13f
SHA2562d04286feb724a9f86a2c3d863d7aa43ebc0288c54a44a5a392cd0539ce9c27d
SHA51210f4191c82fc7e869a9fca263a9f347d214a3421f0b35b5ee4dfa00bd352ad83f0a661920b4689af8627e62ea4ceaf5c76d0b3277862672f5774f0cc1195611e
-
MD5
fdf93305d4f60872ee413a62b06a32fd
SHA1011bd88541f0bbd6336c69fccd71c4c85805e59b
SHA256a79a6b49b917740ab59e2dd91572029dc91ccdf7ec12c704828b19ff01f2ab1d
SHA51293d63862f61bc1536ac0d9920c3059db338c03b80bfd9b5e16b3fec7b5899e7dc10431241ad9288a82f58144159cfaab3eda0d9eabc07762a82c1dfcf45f4a58
-
MD5
43a39b8866de10f2b010d7ac5920ccc3
SHA17e9b4454edf123b4c9b1b87263f4072a78c64027
SHA256f2262ce72bd0276aa30ff8033c3f7b9fc5238ded6b23146b7d9d5e412e4d5a3a
SHA5124aa9ec20f35315eda3f7d95da313d8df3dd7fbd571ec7ab287af4d33c03c1a2b3aad2c91c55e343b6afbfc5e661a7807f5b41e0fc6db86735f0dbf04bfcf5875
-
MD5
4d043570ce015963369c7282ac6cdcfd
SHA1b87a41adf317b0769c730d1120889f2edac5906c
SHA25648e282d34f203d7148cc24c8c304c94a8f3317d1ad85521dd2955e289974d26d
SHA512d41ad3f6e5c0cfdb559cec33bc848802dc918c2308de7a33e8af90248ab37aed5e0352c37871083d951138d2ca6645c986669f8342aad9403a00bb5d855d690b
-
MD5
9bee695df0e2c24bca98bc1cb1222524
SHA144d004d2a021d3bbbfd58d8e27541484dc5d3b6a
SHA256fa4c85bd7d8d77d3b8d0390df3bef93e8fa707d7375c44382152af0affc28326
SHA512e5ecfe41b4380d6cdd4610895af4e43d405606fa6c7e7610d3fb36cde8d64cb236deb114d02ba6b30683f7971034934aeede6a39061e78b3108e7a79fb915bb2
-
MD5
6d9628c1db409e9d8bce5a5595723afd
SHA169ba2303ca7a4484ef86b478c51fbe59e550280a
SHA2567b1f99c25fd26a6f5dfab8b6345a0c8bcd33190224dd327c5c2036edbeafef23
SHA51223afe2837bc349e9be9002a11dd35639155dbcf083768768ea1981b0107a38be2b233c1e05473f9b15c9a06277e66d2ddff8a84398f8c4a69f7afff01d5bf0db
-
MD5
25c9b519c1c20352d2f9da859087ec4e
SHA1041a35f9e19018c74d5fce372ce1619bfb0b21aa
SHA256dddc1d5f457964175aa35ecc34e6a68fa2b307946ad0d35c1aceb41acf5d3324
SHA5128322baffc529a914b0ddb6c154b328a76e36985f1e6b9f256f4ebba998cea7c6d3e4b52b1e62b71014d2e52a71a0ed00669fe9cbfb5ed8c6c5d3a0c8a502cb8c
-
MD5
4026dd1b827947d7cc9a11e7e2a85ad3
SHA1426d6d92f3de75584a479512c8a66acc6315db31
SHA25604b7d143d5f917810ff37c190a977037a474210096cd60d185d0fb2d833be2d0
SHA512974e26a27f717de9482de59f7c7c8303cdcd11251916c42f0f6bd8f2e03f8a96db4644ba8252b78cb106768112f9b87323f6a79a18915bef821050ad049ce486
-
MD5
0e3ea617985912097a02366dd4db9cd4
SHA157c5860496036f12d7f9c62add065320ac51df9a
SHA2567bdf31df523190746f0a964f9b933f14391f0cdd32a881cec24363b7098a168e
SHA5125008eeb866037c0b8154c41d18ec629f8973ea1a4c12b2a959fb66c5f18788e3dc227c7775521282788304f678fc21c282f080c682260a44f16490e31da3c5cc
-
MD5
698e7640806b2765412ff2b935513bbe
SHA1712a10cec98d65790219b389421aa416dd5b723c
SHA256c7a26a08a45924c2027e90362d6bf44a3c8b737a635ab9cb555e3b525533b59e
SHA512c095d2bdd83b020120f448c591696b54fb400ca0c47dd9a6018b2d42b19b2e2eafcf391cbf66ea3c627cca9d93e7137108ca0e69356e9f4e70cca9c4ad6baccf
-
MD5
53a6b9f8b5642a33309aa50da6fc24d4
SHA1ac7a2d48a0f32a0db4fc7c2550f33f94834414bd
SHA2568f3e30501486d711633e7f3d9e2ae3c3469f4392669ca62b0267b0b1667e6cc8
SHA512f4c3ee1c90345cfb7e2bd6e5311270bbfd4ea0c1c33179dcfbcaeb9eb503520299762cc84bd1cd90f1d05654f4af222488f676a6d4f3e7106558c093233398c9
-
MD5
310b8b35e1359d623149b032b0e86189
SHA1f3ab9f6035abfc14b5660e4868f01f0d9d3a8985
SHA256d4894934e2976055d53cde9312f9caddf132df7a592ed33d22cea8a3ffb9c63d
SHA5124082caf4cda5c39b1b0ead84e3aceeaea4660d54718515d3a66998cd28e493ab6a199288819085658c2fd7249724ab52b47a2fa4e75047d7f2c6f2eb0e110770
-
MD5
66755a94c84a0a90fd2b4a2996388813
SHA16be430b2a0d18089d2eccb5f94527d59c7ec7610
SHA256d51b96e34ec51a1e534265d98bc793132446d92761c3bdc509eb805ce8e01fc6
SHA512d3fe80170f4b0371622c8e94c640f583de8b59bc1a50bbd16666eb20e8e4d18e05764a80e2adba3b1c25fa814ee7abb669afe5b0ff7e88691be868ce7a7ee4ae
-
MD5
46ed11456fdf2a4822a368fc33322119
SHA1e57ff5cc9ba7c6fc8836f07391d0679303e1f9ef
SHA256379997586f324b7a0dbfdf849b8f5c8cf368aaddcccdb6bda1b0ce39bda276f0
SHA512c72bc9954396a3d39e5512a339fc0d27d1b2e275d689faf3d4eb13d4170fd50c6a1e557b1ff097928f8cf8ef6143dbccd64116b0e3df7ff19c9d7998504770e6
-
MD5
91aa393a3084376b23f7d3ed79a3c322
SHA1ca4e0b0984f29418096cd8cb8dc3212ed31d7994
SHA256db64ce77db71b3fe5abf6c850e51ec488816c1ea1901c7dac7a75d365b856691
SHA51252549aaabb06dee4cd04cc904e845df8e4a7ba4c878cb9c3ebcdd29d69e75d3b6107426fd9bb934572a1a32a8060867d2e56b3452b5148f82375391fc8f98db7
-
MD5
304d7585f9e7b01e134ff048ca78bf34
SHA10b446204850db383a98ebde27a1fa91c57fc5454
SHA256d0bee377dd71dbb8984a31535bed20391d8e0e3e6c4c077b242c7dfde4505e29
SHA51240f272a14d706d5fcf34415145ee569c39640f49dedf15af9bb3c2dd208417bf8f1261d2c36149486608c321323ef3a299acb4d981bf85634e9443fe94056d4a
-
MD5
9d672f6c54a90e60997815521c3669a8
SHA126e2c0e84740adf32b1c8b2c7d3b1e9bdb0bfcb4
SHA2560f81b225458351add449fd05d4869c224a82ee852d0380f44c7dbb4d82c249c1
SHA512c3729b9adeb4db69a89732eeaee97bedf6187f6c97deabfafde673792d7b890fd1ab9830fc95f019a0d4346e9899fb1f07a6b2e47efc56a937fccef3f77ed008
-
MD5
22fc096afdcaeb96a0d3e275e4c1eb48
SHA10db90c2e93c74f0641bf0205e89359a29fcc6023
SHA2566ff67ca91c6868f79ac1ad868fdf2303d3b0e9b93ce6491500af8c1d7aa72461
SHA5120be589372aa56f59a595d6378700883b50a98a4ecae05d745b99ee88bb593547c69e9d3a8b8ff6d323ca0e8d69e6df625997caeea4ad582a906f6bcab709062c
-
MD5
d7e3fe7fc6fde713bff30e8ea537816a
SHA1778b3f31ecc22f1462516e64e794d741b5c1ebe9
SHA2563e95c8fa0ab1a7cb2b5d4d70941b3701de453af8302736d3b2036450590c5dae
SHA512ea73cefa5fde75887431837a7a89c030056be26014f07c4c1719cd664d77ae617fc79676b4c1839f401e9b8fbc40d5548fe33576f57222e21310b3cfddc89bf0
-
MD5
4d47c9595c0c41a42ba9de3396b8095b
SHA107a63305ea91163ff871b5b2f4067a79859e0a4c
SHA256d282b7f23f5636d1abb0627acb4422fc9db14f3042c131277a25d3e75589273d
SHA5126ec9d039563f61f833ebbc0e3045b85ab7b421af1c6fc49a1ef03d3080cd36fb36322bd2e7d233dff4871d18eaa9f28e6b91ef45203af3e6544754871d5b39b0
-
MD5
146d3ebef24b5a338c6ad25bb96060d4
SHA11238d6710ac6241aca98eebf383e85449f7abf76
SHA256612e50a17e2e68eb5c7ab545f3c764db9cafaf96e898feab8c97cf751c1f7510
SHA512a4c3ef53b87cff956b38e1f81ef7b82890d1b6cfcc34aef66f23bbda2fffb4ee24dad224e4c201bfc5f91d29082f1f754c7cdbd0d7c54525de1f82a24bb4c7f9
-
MD5
5617caca801f991bb1783470c78efa37
SHA115a48e128de3b76887473f8b2e0bb4dda3b1c13f
SHA2562d04286feb724a9f86a2c3d863d7aa43ebc0288c54a44a5a392cd0539ce9c27d
SHA51210f4191c82fc7e869a9fca263a9f347d214a3421f0b35b5ee4dfa00bd352ad83f0a661920b4689af8627e62ea4ceaf5c76d0b3277862672f5774f0cc1195611e
-
MD5
fdf93305d4f60872ee413a62b06a32fd
SHA1011bd88541f0bbd6336c69fccd71c4c85805e59b
SHA256a79a6b49b917740ab59e2dd91572029dc91ccdf7ec12c704828b19ff01f2ab1d
SHA51293d63862f61bc1536ac0d9920c3059db338c03b80bfd9b5e16b3fec7b5899e7dc10431241ad9288a82f58144159cfaab3eda0d9eabc07762a82c1dfcf45f4a58
-
MD5
43a39b8866de10f2b010d7ac5920ccc3
SHA17e9b4454edf123b4c9b1b87263f4072a78c64027
SHA256f2262ce72bd0276aa30ff8033c3f7b9fc5238ded6b23146b7d9d5e412e4d5a3a
SHA5124aa9ec20f35315eda3f7d95da313d8df3dd7fbd571ec7ab287af4d33c03c1a2b3aad2c91c55e343b6afbfc5e661a7807f5b41e0fc6db86735f0dbf04bfcf5875
-
MD5
4d043570ce015963369c7282ac6cdcfd
SHA1b87a41adf317b0769c730d1120889f2edac5906c
SHA25648e282d34f203d7148cc24c8c304c94a8f3317d1ad85521dd2955e289974d26d
SHA512d41ad3f6e5c0cfdb559cec33bc848802dc918c2308de7a33e8af90248ab37aed5e0352c37871083d951138d2ca6645c986669f8342aad9403a00bb5d855d690b
-
MD5
9bee695df0e2c24bca98bc1cb1222524
SHA144d004d2a021d3bbbfd58d8e27541484dc5d3b6a
SHA256fa4c85bd7d8d77d3b8d0390df3bef93e8fa707d7375c44382152af0affc28326
SHA512e5ecfe41b4380d6cdd4610895af4e43d405606fa6c7e7610d3fb36cde8d64cb236deb114d02ba6b30683f7971034934aeede6a39061e78b3108e7a79fb915bb2
-
MD5
6d9628c1db409e9d8bce5a5595723afd
SHA169ba2303ca7a4484ef86b478c51fbe59e550280a
SHA2567b1f99c25fd26a6f5dfab8b6345a0c8bcd33190224dd327c5c2036edbeafef23
SHA51223afe2837bc349e9be9002a11dd35639155dbcf083768768ea1981b0107a38be2b233c1e05473f9b15c9a06277e66d2ddff8a84398f8c4a69f7afff01d5bf0db
-
MD5
25c9b519c1c20352d2f9da859087ec4e
SHA1041a35f9e19018c74d5fce372ce1619bfb0b21aa
SHA256dddc1d5f457964175aa35ecc34e6a68fa2b307946ad0d35c1aceb41acf5d3324
SHA5128322baffc529a914b0ddb6c154b328a76e36985f1e6b9f256f4ebba998cea7c6d3e4b52b1e62b71014d2e52a71a0ed00669fe9cbfb5ed8c6c5d3a0c8a502cb8c
-
MD5
4026dd1b827947d7cc9a11e7e2a85ad3
SHA1426d6d92f3de75584a479512c8a66acc6315db31
SHA25604b7d143d5f917810ff37c190a977037a474210096cd60d185d0fb2d833be2d0
SHA512974e26a27f717de9482de59f7c7c8303cdcd11251916c42f0f6bd8f2e03f8a96db4644ba8252b78cb106768112f9b87323f6a79a18915bef821050ad049ce486