Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2023, 04:14
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
General
-
Target
tmp.exe
-
Size
544KB
-
MD5
b845df3aaaad96d130c777e0f1fc8c6d
-
SHA1
9983a70ecaa59c2b971fce43d3536dcaef11a799
-
SHA256
2757622e10dfe3c86c4b32d6bb8af6745af1bc797a2a1761e7f0be08350b66c5
-
SHA512
7a77f43f7628714315b7c65fa719dcf736601fe028ff207e23316b3167f848030d8cbcbccff3e067713d6fe3a6310b72152a820f9c80841e6812f86be43f22c6
-
SSDEEP
12288:nG7TdJx/2aqY2V4s2nX7eFK3b/NtVJ6vgL4Xp9xqrTFpNDzTzXxNTZV6nkJoS:4TdJLRQkXoWVJ2gL4j43FzzTzBNTZV6n
Malware Config
Signatures
-
Detect Blackmoon payload 6 IoCs
resource yara_rule behavioral2/memory/2224-134-0x0000000000400000-0x000000000058A000-memory.dmp family_blackmoon behavioral2/memory/2224-135-0x0000000000400000-0x000000000058A000-memory.dmp family_blackmoon behavioral2/memory/2224-136-0x0000000000400000-0x000000000058A000-memory.dmp family_blackmoon behavioral2/memory/2224-138-0x0000000000400000-0x000000000058A000-memory.dmp family_blackmoon behavioral2/memory/4664-197-0x0000000000400000-0x000000000058A000-memory.dmp family_blackmoon behavioral2/memory/4664-199-0x0000000000400000-0x000000000058A000-memory.dmp family_blackmoon -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 2996 Chrome.xx 4664 ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe 3032 Chrome.xx -
Loads dropped DLL 3 IoCs
pid Process 2996 Chrome.xx 3032 Chrome.xx 3032 Chrome.xx -
resource yara_rule behavioral2/memory/2224-133-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral2/memory/2224-134-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral2/memory/2224-135-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral2/memory/2224-136-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral2/files/0x000300000000073d-137.dat upx behavioral2/memory/2224-138-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral2/memory/2996-144-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-143-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-145-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-147-0x0000000000400000-0x0000000000A37000-memory.dmp upx behavioral2/memory/2996-149-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-146-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-151-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-153-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-155-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-157-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-159-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-161-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-163-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-165-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-167-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-169-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-171-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-173-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-175-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-177-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-179-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-181-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-183-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-185-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2996-187-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/files/0x0005000000009f71-193.dat upx behavioral2/memory/2996-194-0x0000000000400000-0x0000000000A37000-memory.dmp upx behavioral2/memory/2996-195-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4664-197-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral2/files/0x000300000000073d-198.dat upx behavioral2/memory/4664-199-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral2/memory/3032-202-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3032-203-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3032-204-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3032-206-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3032-208-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3032-210-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3032-212-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3032-214-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3032-216-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3032-223-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3032-226-0x0000000000400000-0x0000000000A37000-memory.dmp upx behavioral2/memory/3032-346-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3032-360-0x0000000000400000-0x0000000000A37000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Chrome.xx File opened for modification \??\PhysicalDrive0 Chrome.xx -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2996 Chrome.xx 2996 Chrome.xx 3032 Chrome.xx 3032 Chrome.xx 3032 Chrome.xx 3032 Chrome.xx 2268 msedge.exe 2268 msedge.exe 2364 msedge.exe 2364 msedge.exe 5920 identity_helper.exe 5920 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 5240 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5240 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2996 Chrome.xx 2996 Chrome.xx 2996 Chrome.xx 3032 Chrome.xx 3032 Chrome.xx 3032 Chrome.xx 2364 msedge.exe 2364 msedge.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2996 Chrome.xx 3032 Chrome.xx -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2224 tmp.exe 2996 Chrome.xx 2996 Chrome.xx 2996 Chrome.xx 4664 ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe 3032 Chrome.xx 3032 Chrome.xx 3032 Chrome.xx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2996 2224 tmp.exe 85 PID 2224 wrote to memory of 2996 2224 tmp.exe 85 PID 2224 wrote to memory of 2996 2224 tmp.exe 85 PID 2996 wrote to memory of 4664 2996 Chrome.xx 86 PID 2996 wrote to memory of 4664 2996 Chrome.xx 86 PID 2996 wrote to memory of 4664 2996 Chrome.xx 86 PID 4664 wrote to memory of 3032 4664 ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe 87 PID 4664 wrote to memory of 3032 4664 ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe 87 PID 4664 wrote to memory of 3032 4664 ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe 87 PID 3032 wrote to memory of 2364 3032 Chrome.xx 88 PID 3032 wrote to memory of 2364 3032 Chrome.xx 88 PID 2364 wrote to memory of 4924 2364 msedge.exe 89 PID 2364 wrote to memory of 4924 2364 msedge.exe 89 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2104 2364 msedge.exe 90 PID 2364 wrote to memory of 2268 2364 msedge.exe 91 PID 2364 wrote to memory of 2268 2364 msedge.exe 91 PID 2364 wrote to memory of 4576 2364 msedge.exe 92 PID 2364 wrote to memory of 4576 2364 msedge.exe 92 PID 2364 wrote to memory of 4576 2364 msedge.exe 92 PID 2364 wrote to memory of 4576 2364 msedge.exe 92 PID 2364 wrote to memory of 4576 2364 msedge.exe 92 PID 2364 wrote to memory of 4576 2364 msedge.exe 92 PID 2364 wrote to memory of 4576 2364 msedge.exe 92 PID 2364 wrote to memory of 4576 2364 msedge.exe 92 PID 2364 wrote to memory of 4576 2364 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Chrome.xxC:\Users\Admin\AppData\Local\Temp\Chrome.xx2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exeC:\Users\Admin\AppData\Local\Temp\×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\Chrome.xxC:\Users\Admin\AppData\Local\Temp\Chrome.xx4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=62990 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --no-default-browser-check --no-first-run about:blank5⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\userdate\62990 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\userdate\62990\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\userdate\62990 --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcd77246f8,0x7ffcd7724708,0x7ffcd77247186⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:26⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --mojo-platform-channel-handle=2240 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --mojo-platform-channel-handle=2696 /prefetch:86⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=62990 --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:16⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=62990 --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:16⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=62990 --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:16⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=62990 --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:16⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=62990 --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:16⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=62990 --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:16⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=62990 --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:16⤵PID:5344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=62990 --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:16⤵PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=62990 --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6784 /prefetch:16⤵PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=62990 --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6672 /prefetch:16⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --mojo-platform-channel-handle=6792 /prefetch:86⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --mojo-platform-channel-handle=6792 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
PID:5920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=62990 --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7132 /prefetch:16⤵PID:6116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=62990 --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7160 /prefetch:16⤵PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2128,6538996981542049970,17392995824497807441,131072 --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Local\Temp\userdate\62990" --mojo-platform-channel-handle=7872 /prefetch:86⤵PID:388
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3276
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x500 0x4f01⤵
- Suspicious use of AdjustPrivilegeToken
PID:5240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5c98f169c204562fab20fffb2417e037a
SHA1e8fa26609efe1eac8022cf3264dba0b0a6016f58
SHA256022607c07e9fa8c9140025038d0e2942451be2f03fa509c7fe4d9c787d2d0dc9
SHA512ab5186a1e5d9b201a7cc8602ec67184a3a1ba713950bc95e81e72129aff315a5baa0f07da061c53dda85282091d36aea69efbd6747b87c1aca190cb3191da88b
-
Filesize
3.5MB
MD5c98f169c204562fab20fffb2417e037a
SHA1e8fa26609efe1eac8022cf3264dba0b0a6016f58
SHA256022607c07e9fa8c9140025038d0e2942451be2f03fa509c7fe4d9c787d2d0dc9
SHA512ab5186a1e5d9b201a7cc8602ec67184a3a1ba713950bc95e81e72129aff315a5baa0f07da061c53dda85282091d36aea69efbd6747b87c1aca190cb3191da88b
-
Filesize
2.1MB
MD504869ada712c189caba4822be0e81ea5
SHA19c45486b30e6d3ccf0737c5766796baaf58232ab
SHA25623078015adb0cf53ebf632a895a1a224b3718174e6c2887e1bbb2d28be5e2b8b
SHA51216f98af15583c60da0cb947ea2230f759bfa27f86ef93ef5f7ffe2adcec6c5f115f52ffa74bae6cf8add94bb6a380fa276f391619256be7a45c53bb7421fdd9c
-
Filesize
2.1MB
MD504869ada712c189caba4822be0e81ea5
SHA19c45486b30e6d3ccf0737c5766796baaf58232ab
SHA25623078015adb0cf53ebf632a895a1a224b3718174e6c2887e1bbb2d28be5e2b8b
SHA51216f98af15583c60da0cb947ea2230f759bfa27f86ef93ef5f7ffe2adcec6c5f115f52ffa74bae6cf8add94bb6a380fa276f391619256be7a45c53bb7421fdd9c
-
Filesize
2.1MB
MD504869ada712c189caba4822be0e81ea5
SHA19c45486b30e6d3ccf0737c5766796baaf58232ab
SHA25623078015adb0cf53ebf632a895a1a224b3718174e6c2887e1bbb2d28be5e2b8b
SHA51216f98af15583c60da0cb947ea2230f759bfa27f86ef93ef5f7ffe2adcec6c5f115f52ffa74bae6cf8add94bb6a380fa276f391619256be7a45c53bb7421fdd9c
-
Filesize
2.1MB
MD504869ada712c189caba4822be0e81ea5
SHA19c45486b30e6d3ccf0737c5766796baaf58232ab
SHA25623078015adb0cf53ebf632a895a1a224b3718174e6c2887e1bbb2d28be5e2b8b
SHA51216f98af15583c60da0cb947ea2230f759bfa27f86ef93ef5f7ffe2adcec6c5f115f52ffa74bae6cf8add94bb6a380fa276f391619256be7a45c53bb7421fdd9c
-
Filesize
126KB
MD506567999fb99885b06c69740eaf13430
SHA10411b572e70b44fecb694f9930d5c8bc6db51d3c
SHA2564ab513e6b4d0e72981c2b2ce91c13f183704bb067d21713cd6c2f9b53a545728
SHA512170d99cf5f6bae1c4ef8165a7e75033e2050e49aa5f65a094bb9cec646e72321cb121f3fb0c2b9ad1e9aa8155c67699ba7c03e6b703f2531d9cd185423dabf0f
-
Filesize
126KB
MD506567999fb99885b06c69740eaf13430
SHA10411b572e70b44fecb694f9930d5c8bc6db51d3c
SHA2564ab513e6b4d0e72981c2b2ce91c13f183704bb067d21713cd6c2f9b53a545728
SHA512170d99cf5f6bae1c4ef8165a7e75033e2050e49aa5f65a094bb9cec646e72321cb121f3fb0c2b9ad1e9aa8155c67699ba7c03e6b703f2531d9cd185423dabf0f
-
Filesize
152B
MD5539bba645572ec2b8862c5546eec9fc9
SHA1f702ef8f4eb32747cdcf94f2e8407ef367d0ff0d
SHA256e4ddb36b9e389592f8796a7cb0e436bdb3c12b0fd2611ac07d71217302abe085
SHA512557fc3b5ac5a052e8d08f833e8382db9b70e13dff708357a7193360426b472a2cc298579f5174a21608b06da4c162386fa127e9b1adc2001bfbdfcf18d08d485
-
Filesize
152B
MD585554a74922a9bc369446e8c76bed745
SHA1c49c4d6772c3acdaa3bf250a23aff1b3adaa6ec8
SHA2564a7e2a867e297cd8b34233107ff447498028df8dcfe4eec933405e1e31d5715f
SHA512f0042f812fea022533a5d98a819abf199d75e323bd4ffded82dc8fa869db4a2488d8074d1722a158be3e7d139f0ec7b2015df43168572515b79e8213b49ffb2b
-
Filesize
152B
MD52fff4fbe2e36fdeb99bc1d6b061d936f
SHA1bdf1fd59b1b62db081dfe0abbcfcef3deb548318
SHA25680f9ba1a6e0dd9acb532de1ad0c1a4ea86fc5e763eab871c946797c09da88a21
SHA51229518c55b519f5f01ef0bc1807bfd011b36a5df8d9baf9c59e2415fcaaf5183eded87a6b6c4511f24840fa860c978a0810cd745d5ee088d46e44c7d8d6dc8479
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
44KB
MD5db567d305a1cf96bb11f187a34278eca
SHA1a832e54157ceb6bf6c951017c981dabdd610c74e
SHA256a73d492571a03fae2784a51057f13ccfad155e4f2dcefdf3c59b7e9cb7a0cc2d
SHA512da31e3b5eae4d5dc29df9918588e37debd317932412ebb4ca1b7cfbfaf5a78e857407cc6ff491b5d6a290d2c136a42207b5ac0ee1d663c23c9d4be1c5bac8629
-
Filesize
264KB
MD538355bfe15842a9ba5a61176a8671772
SHA13e3806a7dc6449e4085d9774208c1be5a93c9113
SHA256e80a1a3d6ffc94df682b9c08450d32c75943060219b9d4596bf49fd5e4378793
SHA512358a40634fb5d97c5bed639f79cc8df7afabb6a6436b1292ea61006a21ed2f9e5ab16fec94dade6fa3dde1d9e4f771b5e585727a40c50e577ac6d3f4ca3444a0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
408B
MD5a610495153e36710cfab84fdae4b7c81
SHA1b01a7a9a46dc70b8bc2f8586192e4db8e786005d
SHA256c17dfa42e1f10a69d95065277a8781ca5ed00e8abddd8a24978721eacb8f34ac
SHA512bf104130c9829f9dbb619a75c41a48bf35af7c3af8e80e1ebadc19fb3c25a75a9f934eb80da839792a1d01ccd7a10be33c28737d9c6af806228790e539d89a5c
-
C:\Users\Admin\AppData\Local\Temp\userdate\62990\Default\Code Cache\js\index-dir\the-real-index~RFe57ef71.TMP
Filesize48B
MD5b5a9ce5a7662506ad34db5a1e10324df
SHA197c6b86906cf12f4cf295a1b5b41ddda5452987f
SHA256a07a3afbb0f0b2dbaaf478e1f7843d1fc0567166898199fb70109ddc359fe9f5
SHA5126348123d1a889fffc2ae79a337fec1722dcd69e8c0c0909e1dd3993ff3dc34c577e7434bfb234e00ea8b110b71379724bc082663c4c25a46d784bee7b0938dff
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
1KB
MD57ef2c96dfbe7c19ff52c9801df78a39c
SHA113a8cf67266b39dae48d02d8bf8c029085714891
SHA256a720b417a5ee6492defdbf5dbf0582f3fdb96ca22e4edf8b487f448237d25bd4
SHA512c4926f40ee7bacd9b478ee9e2b7f5e6c464ff6c328416389b291a957994232e225befb9f306aca28a11e0eda9af55c6b6739c85df32249175377028c0345de58
-
Filesize
59B
MD578bfcecb05ed1904edce3b60cb5c7e62
SHA1bf77a7461de9d41d12aa88fba056ba758793d9ce
SHA256c257f929cff0e4380bf08d9f36f310753f7b1ccb5cb2ab811b52760dd8cb9572
SHA5122420dff6eb853f5e1856cdab99561a896ea0743fcff3e04b37cb87eddf063770608a30c6ffb0319e5d353b0132c5f8135b7082488e425666b2c22b753a6a4d73
-
Filesize
490B
MD5a9660f13eb6ee5366d7c25fd021da6f4
SHA10d798ec5d4ee64034fb4017ad49123c2f3b24b33
SHA2561ef10850be5f46770482a224d3f1b5658c8a0445a901a47100da697648e72cde
SHA5127c8fdb9425a5fbd08f472b222bdc89db174eb9f76bcca44b15ab7c874b922bd467bdba5ff24eab783e95de67bfc5fd8379f93cc612e945e24bc67d605652a128
-
Filesize
4KB
MD5d93899cab74cd4804a7f4332c4b1adce
SHA1e6474e3315087c5a114dac37f4cf1801c1bfaa19
SHA2560df31c33da510705470f7b67ba136591b547c3fa5debdba8b3881db1b1eea468
SHA5120c47083bc955789b2d30259cdb76f0ea4afd59b265f49242f5390d557e5d2d6fef46ccf71d45f989a76213de99b1ea7352d58b1b55c22abb52015185ec883d2b
-
Filesize
5KB
MD52fc47fd66b9eca645595701f2f4e6e36
SHA12130629d18353e3613630172713d1e1a659304c1
SHA256f95b3803cf2d66a6acbfdbf648c074939ea6444670880c324d8dbc4860d82276
SHA512a77bf2d908db728dbb9487bf2fbfb6a7b6f930df212006605d5ecf9fa829fd61791c309fc9dd4fa68235ce5180c443ba8c2f9068b262d5401d725fda97c466eb
-
Filesize
5KB
MD5986d3eaa273eafdb6e01e7c48785edd0
SHA127860e8ad64c6b1640f81596fd82b39cc250c0a4
SHA256161ff13650157d6de9c6ba752d295428a5601717e654c1518fbfa0017ff12d49
SHA512a100ef4b74f593811f8ad2ef105381a59048c5758d28ad706bb1a4d3e39d948e3675996fae4abdb9f41c708d4cae37a4825f165c48aaef4340f4b1d09d41a60b
-
Filesize
5KB
MD5ccdca9f0b31b8eaac11f5c78a1ba6b51
SHA15119b00549158561f64e0352ad0ba9aaae2d58e2
SHA256ca1136ad62d3dbfea65b26fa90b25a4134a8593d47943b206d3790efac37f8ff
SHA5120aa5adea7827fd16ac5d9093b26d7b8415d5f4d890fdf6ca8c740fc140b506fbaa6a1af86ca8ca6e0a18ffe806285c5175f506c7c790815d2cc4d258ff4fc2fe
-
Filesize
24KB
MD596731ad17373927ae4bf3eb44d15b424
SHA14df777bb0cd1210bf7b78bd9eb1d23b82d52a978
SHA256b1d5e879cbb3c8b4d2367cbaf867c4c225180c5f4d070d8b95cf1639d3093fd8
SHA512f5d22820bc4c0159517614ee574e5b67075293573edc1d458779808fcc3746db9648ed1917d3b4b974fea0b35a505edead413538338abca944be1bc939d89af4
-
Filesize
24KB
MD5aa4a981c586a1b425a85a85dfd0b19c3
SHA18b7729433a372081e5e97744e30f9c462790cebe
SHA2560a540e3c16b2e0cafa3e2cee83181b050c2eb51397c28b5e37560a7cee7f0a26
SHA512ab9127112049f8ae5fda6dab9e15931612b8399adcc1a463f75630e3a5ade34cbb067cea21448b6bf1ee8254728becadde7198adbf5b15e9e54affaaae9301c4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
203B
MD5adc797e5c1346c99ecc088512cb4a99e
SHA16b6e7ad3bfdb4575e100910e1271ebe1d9bc675f
SHA2563acd4eebc8b015d64f686c2d2cd2ef1d36723bd84417affbee1974b79afbb998
SHA512531fd20c44a3420ca1625605dfc41c90338fb8db53621d80031d919251d78d4ea52d7ace14ad5c7cb471e2e3201b47480a32f9effe4744344787769fc31c19c6
-
Filesize
203B
MD5013b0c07293d1ca3d9667965ec79579c
SHA1474f551987d120f6e5169ff1ca80610ea25fbc9d
SHA25685a2a1a965d40d9daf0cbb2a771bd8ef5e1eee1839ec4b379b1b4fb1cc70cc87
SHA5122acfa8dc73cfb6aa6446fb99f48249eabc92e4efd49fc018ddaadedc0d4198bca1855d07d550ab3da8f9925c71afe59ea089d13a10d817e3bca8f3b745a235e9
-
Filesize
203B
MD5c5f570d0312824c7d98c167d327aded1
SHA13568136eedd325fc95994c3a3fbbdda2e6e0f0ec
SHA25678bdbf77389e6736a5c08f8f305d5e304bf9e650041c27828ef9ad2439acd68a
SHA51228ed808cb9648ec2757050ea8d26920797f7c71fd9acfb1f659217d5d0db77742188510dc03e92a35adcb7ea54e15a74c79be5b1ec179c29c099cc3303a0f7dd
-
Filesize
203B
MD5d1a7521a5fa94edd967dea3708d4f992
SHA15bf1727c8de8ff26274f5aad8a7b730e781acf4b
SHA2562dd35192d093f0ebf26f9ba94b72e6845c30f6b40bd5e05610e3d4a184205a24
SHA5128d1dd86d84cbaa43578e90d9c90d57982080fcd59c3563bfd05a4d9c0d5caee9a672a4097d6cb6e86696c33f598924db6cc4b1c80051412ecb6586184713262c
-
Filesize
203B
MD52515fa30974e5a30c260204dfa2adc17
SHA16d99e13973415f2ca19768ae22d870e08739dd3e
SHA256c4f4759bc1ed572ded84f41f16c4d0edf685d9e485725f36249e9a672eb963a5
SHA512205c1a7f9a72e346a5f97637e2cee37ae027b8bdc383b29b3157b4bae016a73e7fef3b39fce85050c95cf03d7c4aa3fcbd0314e7ad2e3b99f35ba2b571971080
-
Filesize
203B
MD555e9fa094ece2a1834d0b588d2023132
SHA179c3455e6661c1c198ba7cff11afa31dbbde608b
SHA256749c5fed70c46c0c68c857b21a8c72755d2fe18b5e8272016a8041d64e9361b9
SHA5129dca079945ceb026ac20a0aa1511104019d0be16c55f1ed897c75d9e9ad9faa978b9fda28311b5bbde1dbdd99bc12d0474e8cb25ab7fea1caf82ba53720fff95
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD511382463881ec7a00a96ed81d677e24c
SHA1263eac69da2560ee4ccbaf631762cd3ca888bbd3
SHA25611dd6d3119b054fbe667d3f276409ee4fd9b6fbaaadd31696163431f97384150
SHA51228ceca4df53e6c61ec538ca6cf48fd4716f56979ac985eb1f3a2bb970d64459016f2826003896a5f5a73218eeec805705087c4fac9839ea6390ebf96f4481884
-
Filesize
11KB
MD599bcc8497e4c2b3fd3d3594db7f28d87
SHA147b20d53694cf747b74321ef8d88540ba7ceeb65
SHA256796b2360f74cbf78f393893f49083f3f21e3dfdd2b7320399b9bf1e9b3937f1b
SHA5124acdb6288c05ddd4dfde5936ea96dd65b0f881b039b6a6cb815f97e90840946bf92d197e70314c2e9670aaf6a79a34bc4ec0984d84b04995be19e8559ca79092
-
Filesize
544KB
MD5b845df3aaaad96d130c777e0f1fc8c6d
SHA19983a70ecaa59c2b971fce43d3536dcaef11a799
SHA2562757622e10dfe3c86c4b32d6bb8af6745af1bc797a2a1761e7f0be08350b66c5
SHA5127a77f43f7628714315b7c65fa719dcf736601fe028ff207e23316b3167f848030d8cbcbccff3e067713d6fe3a6310b72152a820f9c80841e6812f86be43f22c6