Analysis
-
max time kernel
98s -
max time network
304s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
04-09-2023 01:23
Behavioral task
behavioral1
Sample
t5655565.exe
Resource
win7-20230831-en
General
-
Target
t5655565.exe
-
Size
315KB
-
MD5
71093161f1d6ec3b68cbdbce4d5e4e1d
-
SHA1
dee7b380964d3ec003b7764dc29319a10aea1942
-
SHA256
c3596938478ccf615dc1ae8422ffabf14b989277fb6926c328969c38710efbd6
-
SHA512
cfc5443e3a1b828fe192064c7db9ea10002aaba80a3348cdfadfdcea329cb500af0ae217d968572ca774faec3ff3e64ba2b300e81475f7fda009692daa62ef50
-
SSDEEP
6144:zR/tsQnf6X0M6+koYhXMxjwigfwfgbePu97rrAOQ322222KTq:zRlHVckoaXMxcePu97Hg22222iq
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
-
install_dir
ebb444342c
-
install_file
legosa.exe
-
strings_key
0b59a358b8646634fe523e0d5fe7fc43
Extracted
redline
10K
77.232.38.234:80
-
auth_value
e0b9a8ef2c92da39d627d67103b3b93f
Extracted
redline
91.103.252.3:48665
-
auth_value
0c16e9e64d9b037e5f1ff9082d8f439f
Extracted
amadey
3.83
5.42.65.80/8bmeVwqx/index.php
-
install_dir
207aa4515d
-
install_file
oneetx.exe
-
strings_key
3e634dd0840c68ae2ced83c2be7bf0d4
Extracted
amadey
3.88
79.110.62.80/8bmeVwqx/index.php
-
install_dir
e8bff37b77
-
install_file
yiueea.exe
-
strings_key
dc58c693b6742b940cbf7234174a0f66
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/memory/968-16-0x00000000003F0000-0x000000000061E000-memory.dmp family_redline behavioral2/memory/2976-17-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral2/memory/968-30-0x00000000003F0000-0x000000000061E000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 9 IoCs
description pid Process procid_target PID 4860 created 3184 4860 msedge.exe 41 PID 3544 created 3184 3544 msedge.exe 41 PID 364 created 3184 364 msedge.exe 41 PID 4860 created 3184 4860 msedge.exe 41 PID 3544 created 3184 3544 msedge.exe 41 PID 4860 created 3184 4860 msedge.exe 41 PID 4860 created 3184 4860 msedge.exe 41 PID 3544 created 3184 3544 msedge.exe 41 PID 3544 created 3184 3544 msedge.exe 41 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winlog.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winlog.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winlog.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts msedge.exe File created C:\Windows\System32\drivers\etc\hosts msedge.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winlog.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3618012334-189558363-1282585034-1000\Control Panel\International\Geo\Nation Meduza.exe -
Executes dropped EXE 29 IoCs
pid Process 3748 legosa.exe 968 10c7b9izmah9.exe 4400 pf3bv0f2aw4mj.exe 4528 useyyoou_crypted.exe 4864 crypted158.exe 5008 rockas.exe 1420 oneetx.exe 2144 rockas.exe 2272 Amadey.exe 4448 yiueea.exe 380 Meduza.exe 328 ss41.exe 3360 taskhost.exe 1204 winlog.exe 4860 msedge.exe 3708 toolspub2.exe 4484 taskhost.exe 2700 winlog.exe 3544 msedge.exe 1156 31839b57a4f11171d6abc8bbc4451ee4.exe 2740 taskhost.exe 2332 winlog.exe 364 msedge.exe 1216 taskhost.exe 3372 taskhost.exe 3480 taskhost.exe 840 sc.exe 940 yiueea.exe 1160 oneetx.exe -
Loads dropped DLL 4 IoCs
pid Process 720 rundll32.exe 5436 rundll32.exe 5368 rundll32.exe 5508 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3618012334-189558363-1282585034-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Meduza.exe Key opened \REGISTRY\USER\S-1-5-21-3618012334-189558363-1282585034-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Meduza.exe Key opened \REGISTRY\USER\S-1-5-21-3618012334-189558363-1282585034-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Meduza.exe Key opened \REGISTRY\USER\S-1-5-21-3618012334-189558363-1282585034-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Meduza.exe Key opened \REGISTRY\USER\S-1-5-21-3618012334-189558363-1282585034-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Meduza.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlog.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 api.ipify.org 36 api.ipify.org 115 ipinfo.io 116 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1204 winlog.exe 2700 winlog.exe 2332 winlog.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 968 set thread context of 2976 968 10c7b9izmah9.exe 82 PID 4400 set thread context of 4676 4400 pf3bv0f2aw4mj.exe 84 PID 4528 set thread context of 5088 4528 useyyoou_crypted.exe 88 PID 4864 set thread context of 2988 4864 crypted158.exe 89 PID 3360 set thread context of 1216 3360 taskhost.exe 124 PID 4484 set thread context of 3372 4484 taskhost.exe 130 PID 2740 set thread context of 3480 2740 taskhost.exe 133 -
Launches sc.exe 20 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5800 sc.exe 5080 sc.exe 6128 sc.exe 5992 sc.exe 4676 sc.exe 5092 sc.exe 5700 sc.exe 5200 sc.exe 5412 sc.exe 5668 sc.exe 6004 sc.exe 5536 sc.exe 5364 sc.exe 1292 sc.exe 1284 sc.exe 4100 sc.exe 5212 sc.exe 840 sc.exe 4476 sc.exe 3216 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3348 4864 WerFault.exe 86 5680 5508 WerFault.exe 144 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4356 schtasks.exe 1368 schtasks.exe 3416 schtasks.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4724 tasklist.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 112 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2976 vbc.exe 2976 vbc.exe 4676 sc.exe 4676 sc.exe 4860 msedge.exe 4860 msedge.exe 4676 sc.exe 3544 msedge.exe 3544 msedge.exe 364 msedge.exe 364 msedge.exe 4860 msedge.exe 4860 msedge.exe 1216 taskhost.exe 1216 taskhost.exe 1108 powershell.exe 1108 powershell.exe 3544 msedge.exe 3544 msedge.exe 1108 powershell.exe 3656 powershell.exe 3656 powershell.exe 1108 powershell.exe 3372 taskhost.exe 3372 taskhost.exe 3656 powershell.exe 364 msedge.exe 364 msedge.exe 5088 vbc.exe 5088 vbc.exe 3656 powershell.exe 5968 powershell.exe 5968 powershell.exe 3480 taskhost.exe 3480 taskhost.exe 5968 powershell.exe 5968 powershell.exe 4860 msedge.exe 4860 msedge.exe 2976 vbc.exe 2976 vbc.exe 3544 msedge.exe 3544 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 5144 powershell.exe 5144 powershell.exe 5144 powershell.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 5144 powershell.exe 5420 powershell.exe 5420 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2976 vbc.exe Token: SeDebugPrivilege 3360 taskhost.exe Token: SeDebugPrivilege 4676 sc.exe Token: SeDebugPrivilege 4484 taskhost.exe Token: SeDebugPrivilege 2740 taskhost.exe Token: SeDebugPrivilege 1216 taskhost.exe Token: SeDebugPrivilege 1108 powershell.exe Token: SeDebugPrivilege 3656 powershell.exe Token: SeDebugPrivilege 3372 taskhost.exe Token: SeDebugPrivilege 5088 vbc.exe Token: SeDebugPrivilege 5968 powershell.exe Token: SeDebugPrivilege 3480 taskhost.exe Token: SeIncreaseQuotaPrivilege 1108 powershell.exe Token: SeSecurityPrivilege 1108 powershell.exe Token: SeTakeOwnershipPrivilege 1108 powershell.exe Token: SeLoadDriverPrivilege 1108 powershell.exe Token: SeSystemProfilePrivilege 1108 powershell.exe Token: SeSystemtimePrivilege 1108 powershell.exe Token: SeProfSingleProcessPrivilege 1108 powershell.exe Token: SeIncBasePriorityPrivilege 1108 powershell.exe Token: SeCreatePagefilePrivilege 1108 powershell.exe Token: SeBackupPrivilege 1108 powershell.exe Token: SeRestorePrivilege 1108 powershell.exe Token: SeShutdownPrivilege 1108 powershell.exe Token: SeDebugPrivilege 1108 powershell.exe Token: SeSystemEnvironmentPrivilege 1108 powershell.exe Token: SeRemoteShutdownPrivilege 1108 powershell.exe Token: SeUndockPrivilege 1108 powershell.exe Token: SeManageVolumePrivilege 1108 powershell.exe Token: 33 1108 powershell.exe Token: 34 1108 powershell.exe Token: 35 1108 powershell.exe Token: 36 1108 powershell.exe Token: SeIncreaseQuotaPrivilege 3656 powershell.exe Token: SeSecurityPrivilege 3656 powershell.exe Token: SeTakeOwnershipPrivilege 3656 powershell.exe Token: SeLoadDriverPrivilege 3656 powershell.exe Token: SeSystemProfilePrivilege 3656 powershell.exe Token: SeSystemtimePrivilege 3656 powershell.exe Token: SeProfSingleProcessPrivilege 3656 powershell.exe Token: SeIncBasePriorityPrivilege 3656 powershell.exe Token: SeCreatePagefilePrivilege 3656 powershell.exe Token: SeBackupPrivilege 3656 powershell.exe Token: SeRestorePrivilege 3656 powershell.exe Token: SeShutdownPrivilege 3656 powershell.exe Token: SeDebugPrivilege 3656 powershell.exe Token: SeSystemEnvironmentPrivilege 3656 powershell.exe Token: SeRemoteShutdownPrivilege 3656 powershell.exe Token: SeUndockPrivilege 3656 powershell.exe Token: SeManageVolumePrivilege 3656 powershell.exe Token: 33 3656 powershell.exe Token: 34 3656 powershell.exe Token: 35 3656 powershell.exe Token: 36 3656 powershell.exe Token: SeIncreaseQuotaPrivilege 5968 powershell.exe Token: SeSecurityPrivilege 5968 powershell.exe Token: SeTakeOwnershipPrivilege 5968 powershell.exe Token: SeLoadDriverPrivilege 5968 powershell.exe Token: SeSystemProfilePrivilege 5968 powershell.exe Token: SeSystemtimePrivilege 5968 powershell.exe Token: SeProfSingleProcessPrivilege 5968 powershell.exe Token: SeIncBasePriorityPrivilege 5968 powershell.exe Token: SeCreatePagefilePrivilege 5968 powershell.exe Token: SeBackupPrivilege 5968 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3748 4692 t5655565.exe 70 PID 4692 wrote to memory of 3748 4692 t5655565.exe 70 PID 4692 wrote to memory of 3748 4692 t5655565.exe 70 PID 3748 wrote to memory of 4356 3748 legosa.exe 71 PID 3748 wrote to memory of 4356 3748 legosa.exe 71 PID 3748 wrote to memory of 4356 3748 legosa.exe 71 PID 3748 wrote to memory of 3476 3748 legosa.exe 72 PID 3748 wrote to memory of 3476 3748 legosa.exe 72 PID 3748 wrote to memory of 3476 3748 legosa.exe 72 PID 3476 wrote to memory of 1204 3476 cmd.exe 75 PID 3476 wrote to memory of 1204 3476 cmd.exe 75 PID 3476 wrote to memory of 1204 3476 cmd.exe 75 PID 3476 wrote to memory of 936 3476 cmd.exe 76 PID 3476 wrote to memory of 936 3476 cmd.exe 76 PID 3476 wrote to memory of 936 3476 cmd.exe 76 PID 3476 wrote to memory of 2556 3476 cmd.exe 77 PID 3476 wrote to memory of 2556 3476 cmd.exe 77 PID 3476 wrote to memory of 2556 3476 cmd.exe 77 PID 3476 wrote to memory of 428 3476 cmd.exe 79 PID 3476 wrote to memory of 428 3476 cmd.exe 79 PID 3476 wrote to memory of 428 3476 cmd.exe 79 PID 3476 wrote to memory of 208 3476 cmd.exe 78 PID 3476 wrote to memory of 208 3476 cmd.exe 78 PID 3476 wrote to memory of 208 3476 cmd.exe 78 PID 3476 wrote to memory of 5040 3476 cmd.exe 80 PID 3476 wrote to memory of 5040 3476 cmd.exe 80 PID 3476 wrote to memory of 5040 3476 cmd.exe 80 PID 3748 wrote to memory of 968 3748 legosa.exe 81 PID 3748 wrote to memory of 968 3748 legosa.exe 81 PID 3748 wrote to memory of 968 3748 legosa.exe 81 PID 968 wrote to memory of 2976 968 10c7b9izmah9.exe 82 PID 968 wrote to memory of 2976 968 10c7b9izmah9.exe 82 PID 968 wrote to memory of 2976 968 10c7b9izmah9.exe 82 PID 968 wrote to memory of 2976 968 10c7b9izmah9.exe 82 PID 968 wrote to memory of 2976 968 10c7b9izmah9.exe 82 PID 3748 wrote to memory of 4400 3748 legosa.exe 83 PID 3748 wrote to memory of 4400 3748 legosa.exe 83 PID 3748 wrote to memory of 4400 3748 legosa.exe 83 PID 4400 wrote to memory of 4676 4400 pf3bv0f2aw4mj.exe 84 PID 4400 wrote to memory of 4676 4400 pf3bv0f2aw4mj.exe 84 PID 4400 wrote to memory of 4676 4400 pf3bv0f2aw4mj.exe 84 PID 4400 wrote to memory of 4676 4400 pf3bv0f2aw4mj.exe 84 PID 4400 wrote to memory of 4676 4400 pf3bv0f2aw4mj.exe 84 PID 3748 wrote to memory of 4528 3748 legosa.exe 85 PID 3748 wrote to memory of 4528 3748 legosa.exe 85 PID 3748 wrote to memory of 4528 3748 legosa.exe 85 PID 3748 wrote to memory of 4864 3748 legosa.exe 86 PID 3748 wrote to memory of 4864 3748 legosa.exe 86 PID 3748 wrote to memory of 4864 3748 legosa.exe 86 PID 4528 wrote to memory of 5088 4528 useyyoou_crypted.exe 88 PID 4528 wrote to memory of 5088 4528 useyyoou_crypted.exe 88 PID 4528 wrote to memory of 5088 4528 useyyoou_crypted.exe 88 PID 4528 wrote to memory of 5088 4528 useyyoou_crypted.exe 88 PID 4528 wrote to memory of 5088 4528 useyyoou_crypted.exe 88 PID 4864 wrote to memory of 2988 4864 crypted158.exe 89 PID 4864 wrote to memory of 2988 4864 crypted158.exe 89 PID 4864 wrote to memory of 2988 4864 crypted158.exe 89 PID 4864 wrote to memory of 2988 4864 crypted158.exe 89 PID 4864 wrote to memory of 2988 4864 crypted158.exe 89 PID 4864 wrote to memory of 2988 4864 crypted158.exe 89 PID 4864 wrote to memory of 2988 4864 crypted158.exe 89 PID 4864 wrote to memory of 2988 4864 crypted158.exe 89 PID 4864 wrote to memory of 2988 4864 crypted158.exe 89 PID 3748 wrote to memory of 5008 3748 legosa.exe 93 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3618012334-189558363-1282585034-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Meduza.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3618012334-189558363-1282585034-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Meduza.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\t5655565.exe"C:\Users\Admin\AppData\Local\Temp\t5655565.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe"C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legosa.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe" /F4⤵
- Creates scheduled task(s)
PID:4356
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legosa.exe" /P "Admin:N"&&CACLS "legosa.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1204
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legosa.exe" /P "Admin:N"5⤵PID:936
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legosa.exe" /P "Admin:R" /E5⤵PID:2556
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:N"5⤵PID:208
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:428
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:R" /E5⤵PID:5040
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000139001\10c7b9izmah9.exe"C:\Users\Admin\AppData\Local\Temp\1000139001\10c7b9izmah9.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000146001\pf3bv0f2aw4mj.exe"C:\Users\Admin\AppData\Local\Temp\1000146001\pf3bv0f2aw4mj.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"5⤵PID:4676
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000147001\useyyoou_crypted.exe"C:\Users\Admin\AppData\Local\Temp\1000147001\useyyoou_crypted.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000155001\crypted158.exe"C:\Users\Admin\AppData\Local\Temp\1000155001\crypted158.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 2925⤵
- Program crash
PID:3348
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000159001\rockas.exe"C:\Users\Admin\AppData\Local\Temp\1000159001\rockas.exe"4⤵
- Executes dropped EXE
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"5⤵
- Executes dropped EXE
PID:1420 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F6⤵
- Creates scheduled task(s)
PID:1368
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit6⤵PID:3172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"7⤵PID:3476
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E7⤵PID:3176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"7⤵PID:4744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E7⤵PID:4140
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000438001\ss41.exe"C:\Users\Admin\AppData\Local\Temp\1000438001\ss41.exe"6⤵
- Executes dropped EXE
PID:328
-
-
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\winlog.exe"C:\Users\Admin\AppData\Local\Temp\winlog.exe"8⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\is-B1NOS.tmp\winlog.tmp"C:\Users\Admin\AppData\Local\Temp\is-B1NOS.tmp\winlog.tmp" /SL5="$C01F8,25895378,832512,C:\Users\Admin\AppData\Local\Temp\winlog.exe"9⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\winlog.exe"C:\Users\Admin\AppData\Local\Temp\winlog.exe" /SILENT10⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\is-MSSD1.tmp\winlog.tmp"C:\Users\Admin\AppData\Local\Temp\is-MSSD1.tmp\winlog.tmp" /SL5="$D01F8,25895378,832512,C:\Users\Admin\AppData\Local\Temp\winlog.exe" /SILENT11⤵PID:5824
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Public\Document\python.exe C:\Users\Public\Document\dsc.py"12⤵PID:6788
-
C:\Users\Public\Document\python.exeC:\Users\Public\Document\python.exe C:\Users\Public\Document\dsc.py13⤵PID:1388
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1204
-
-
C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe"6⤵
- Executes dropped EXE
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe"7⤵PID:5924
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe"6⤵
- Executes dropped EXE
PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2332 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe7⤵PID:3320
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000167001\rockas.exe"C:\Users\Admin\AppData\Local\Temp\1000167001\rockas.exe"4⤵
- Executes dropped EXE
PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\1000172001\Amadey.exe"C:\Users\Admin\AppData\Local\Temp\1000172001\Amadey.exe"4⤵
- Executes dropped EXE
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe"C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe"5⤵
- Executes dropped EXE
PID:4448 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe" /F6⤵
- Creates scheduled task(s)
PID:3416
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\e8bff37b77" /P "Admin:N"&&CACLS "..\e8bff37b77" /P "Admin:R" /E&&Exit6⤵PID:5100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "yiueea.exe" /P "Admin:N"7⤵PID:3484
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "yiueea.exe" /P "Admin:R" /E7⤵PID:5096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4356
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\e8bff37b77" /P "Admin:N"7⤵PID:3948
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\e8bff37b77" /P "Admin:R" /E7⤵PID:2584
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\aca439ae61e801\cred64.dll, Main6⤵
- Loads dropped DLL
PID:5368 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\aca439ae61e801\cred64.dll, Main7⤵
- Loads dropped DLL
PID:5508 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5508 -s 5968⤵
- Program crash
PID:5680
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\aca439ae61e801\clip64.dll, Main6⤵
- Loads dropped DLL
PID:5436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000173001\Meduza.exe"C:\Users\Admin\AppData\Local\Temp\1000173001\Meduza.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:380
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:720
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5968
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:5388
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:6004
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5200
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:5412
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:5700
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:5080
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:5464
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:5800
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3216
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:6128
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:5212
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:5668
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5144
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:5196
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:5220
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:5324
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:5348
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:788
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5420
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:6100
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:6052
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:5212
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:4424
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:4664
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:5284
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:5992
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5536
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Executes dropped EXE
- Launches sc.exe
PID:840
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:4476
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:5364
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:1812
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:5416
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:6256
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:6284
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:6384
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:6424
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:6808
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:6884
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:7152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:6252
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:6788
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1292
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1284
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:5092
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4100
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:212
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4932
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4924
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:6844
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:236
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:5764
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:5816
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:6968
-
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:1160
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe1⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exeC:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe1⤵
- Executes dropped EXE
PID:940
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3172
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵PID:6864
-
\??\c:\windows\system32\mshta.exemshta.exe vbscript:Execute("Set oShell = CreateObject (""Wscript.Shell""):Dim strArgs:strArgs = ""cmd -windowstyle hidden /c C:\Users\Public\Document\python.exe C:\Users\Public\Document\run.py"":oShell.Run strArgs, 0, false:window.close")1⤵PID:5552
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" -windowstyle hidden /c C:\Users\Public\Document\python.exe C:\Users\Public\Document\run.py2⤵PID:5072
-
C:\Users\Public\Document\python.exeC:\Users\Public\Document\python.exe C:\Users\Public\Document\run.py3⤵PID:5528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:968
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:4724
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.3MB
MD5c1d22d64c028c750f90bc2e763d3535c
SHA14403b1cdfb2fd7ecfba5b8e9cda93b6132accd49
SHA256864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee
SHA512dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5
-
Filesize
4KB
MD524be8a92460b5b7a555b1da559296958
SHA194147054e8a04e82fea1c185af30c7c90b194064
SHA25677a3cfe6b7eb676af438d5de88c7efcb6abcc494e0b65da90201969e6d79b2a3
SHA512ed8ef0453e050392c430fdcf556249f679570c130decd18057e077471a45ab0bc0fba513cb2d4d1c61f3d1935318113b3733dec2bc7828a169b18a1081e609a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize342B
MD5025c39adacf787b6c98abedd51c112bc
SHA188fc8bd43fbd5aa5ed41ebc1e0a03c93725909f4
SHA2563c10481d9e5d4f747b9f7c749d59b7f8bb42e78c8256a69eacf137ef5ab48877
SHA5125f3282694d935c00531d84f78fc8b7d31a9816a0f7830b89976c830ff4e09c19b4e204acb7b7b4883af7bdea734416e43bfacc5270bf48b0a44995a19232543f
-
Filesize
1KB
MD574b02915b8ed39b3508a8bd2d27b8e0d
SHA16e9a8794724a958b03eb3e0056a0cfdce33b7072
SHA2562789a602511280d8d60d78ff578a8fcd215b71b70c9c32b8b926a4351ff5ea15
SHA512c7eff4872c014e0b0e14618e9ca786eeb73431d203871ee82ed4af61d5a90d0c6fe487f99e14a9d348072fa6761e30a4c54fbcf68f799b78f6b30d594c9d4f05
-
Filesize
1KB
MD5266284db2063b639be999809e11c8a21
SHA1285fe2a74fa3ddb5352bc635181faef43e5edb18
SHA256a95fe3723a1e002fc223d1d7ef39180b06eb04ee8b3271da4c046ba785acd96f
SHA51218326a6889e54cc5ae4f6b77ee93865ccf912ec0b7d11f06dd5bda92ba7b5649d926161538e81bd6e0d11ee4ae717074f2ccdc91817ecfc96f11064e99c756ed
-
Filesize
1KB
MD5bd23e6bcc89fa9afdea626685cffa5fb
SHA151e37c2cd8ba216d1eb316cfac9cd962c771d750
SHA25663c3cce9090f9fe9632fbe496218fb2d5f0225abdc7124265344fc9bb0cfb6ec
SHA5129f2e60818b81c58e1184ff3407322c73e7a271f4a753ed354787266b6781684d8a9c89ea83da325e398e623ddf5b3e579329d2dff141015d5073736873049b00
-
Filesize
1KB
MD5bd23e6bcc89fa9afdea626685cffa5fb
SHA151e37c2cd8ba216d1eb316cfac9cd962c771d750
SHA25663c3cce9090f9fe9632fbe496218fb2d5f0225abdc7124265344fc9bb0cfb6ec
SHA5129f2e60818b81c58e1184ff3407322c73e7a271f4a753ed354787266b6781684d8a9c89ea83da325e398e623ddf5b3e579329d2dff141015d5073736873049b00
-
Filesize
2.1MB
MD511087397686f250611da155d5a73143f
SHA151b39613601709a41332cede168749b09f6294f4
SHA256a58281cf014986d06046512ca984861c6390c6ae99bf164d04d1943a8c959e7b
SHA51209a1df0dcc5df7e8c63da422b07a9bc3843e8be18e9cce74274dc01ddaa0d16294071885128ccd97f6264a2d8bf14d453f3dcfb78e99060fe59c6d40811a17b0
-
Filesize
2.1MB
MD511087397686f250611da155d5a73143f
SHA151b39613601709a41332cede168749b09f6294f4
SHA256a58281cf014986d06046512ca984861c6390c6ae99bf164d04d1943a8c959e7b
SHA51209a1df0dcc5df7e8c63da422b07a9bc3843e8be18e9cce74274dc01ddaa0d16294071885128ccd97f6264a2d8bf14d453f3dcfb78e99060fe59c6d40811a17b0
-
Filesize
2.1MB
MD511087397686f250611da155d5a73143f
SHA151b39613601709a41332cede168749b09f6294f4
SHA256a58281cf014986d06046512ca984861c6390c6ae99bf164d04d1943a8c959e7b
SHA51209a1df0dcc5df7e8c63da422b07a9bc3843e8be18e9cce74274dc01ddaa0d16294071885128ccd97f6264a2d8bf14d453f3dcfb78e99060fe59c6d40811a17b0
-
Filesize
1.6MB
MD5960401d9c2113bdb6207353557fe199d
SHA13513d8ed2314fdc0bc4c150b6f1028befc837639
SHA25653bb60a7357a31c914145dafb72c45559d4f214f471274c997d2ed37969e300c
SHA512c221693c430ee8287301e2030577971f8a06308205fbec1557d436eb2c228f6cebc6c87a11e0f56f2a098b06a3a340747b8bb751ed18a5bb035b2b11b2987fb2
-
Filesize
1.6MB
MD5960401d9c2113bdb6207353557fe199d
SHA13513d8ed2314fdc0bc4c150b6f1028befc837639
SHA25653bb60a7357a31c914145dafb72c45559d4f214f471274c997d2ed37969e300c
SHA512c221693c430ee8287301e2030577971f8a06308205fbec1557d436eb2c228f6cebc6c87a11e0f56f2a098b06a3a340747b8bb751ed18a5bb035b2b11b2987fb2
-
Filesize
1.6MB
MD5960401d9c2113bdb6207353557fe199d
SHA13513d8ed2314fdc0bc4c150b6f1028befc837639
SHA25653bb60a7357a31c914145dafb72c45559d4f214f471274c997d2ed37969e300c
SHA512c221693c430ee8287301e2030577971f8a06308205fbec1557d436eb2c228f6cebc6c87a11e0f56f2a098b06a3a340747b8bb751ed18a5bb035b2b11b2987fb2
-
Filesize
1.6MB
MD5887e2ba60e03c2b0d79a63a6548e1720
SHA104b44c1bdbac152d6379eec5a6de4e46fd6328b3
SHA2561379aee1bf57a5d4e826d7ef56254274f6cffa3fecaa08b2ff96dd9dfc6c7d51
SHA5127497f8ea8d4b411e50d81e9e974144cd9a82911ac08fafe0355c33f7833c29f39dc077e7ccfa52748289e479b333662d1ede0f85d101a5ec5a86384bf0db9fb4
-
Filesize
1.6MB
MD5887e2ba60e03c2b0d79a63a6548e1720
SHA104b44c1bdbac152d6379eec5a6de4e46fd6328b3
SHA2561379aee1bf57a5d4e826d7ef56254274f6cffa3fecaa08b2ff96dd9dfc6c7d51
SHA5127497f8ea8d4b411e50d81e9e974144cd9a82911ac08fafe0355c33f7833c29f39dc077e7ccfa52748289e479b333662d1ede0f85d101a5ec5a86384bf0db9fb4
-
Filesize
1.6MB
MD5887e2ba60e03c2b0d79a63a6548e1720
SHA104b44c1bdbac152d6379eec5a6de4e46fd6328b3
SHA2561379aee1bf57a5d4e826d7ef56254274f6cffa3fecaa08b2ff96dd9dfc6c7d51
SHA5127497f8ea8d4b411e50d81e9e974144cd9a82911ac08fafe0355c33f7833c29f39dc077e7ccfa52748289e479b333662d1ede0f85d101a5ec5a86384bf0db9fb4
-
Filesize
702KB
MD5bb115dccc24769565832379a2029f709
SHA1fee2c45c8d2b14e87da81baf041adf6258519114
SHA2560dbde9f9147ace2898ded2819edb2c6ad460cbbfaf6f82f15313c011634d602a
SHA512319904a041a1cd4325c5e9e6d9cb5118517df0f0f9db85c3b9ee1d443e24f17439930e196e3439bab47aa04ec7f8806646672a873ac280d58523c9ba33d96edd
-
Filesize
702KB
MD5bb115dccc24769565832379a2029f709
SHA1fee2c45c8d2b14e87da81baf041adf6258519114
SHA2560dbde9f9147ace2898ded2819edb2c6ad460cbbfaf6f82f15313c011634d602a
SHA512319904a041a1cd4325c5e9e6d9cb5118517df0f0f9db85c3b9ee1d443e24f17439930e196e3439bab47aa04ec7f8806646672a873ac280d58523c9ba33d96edd
-
Filesize
702KB
MD5bb115dccc24769565832379a2029f709
SHA1fee2c45c8d2b14e87da81baf041adf6258519114
SHA2560dbde9f9147ace2898ded2819edb2c6ad460cbbfaf6f82f15313c011634d602a
SHA512319904a041a1cd4325c5e9e6d9cb5118517df0f0f9db85c3b9ee1d443e24f17439930e196e3439bab47aa04ec7f8806646672a873ac280d58523c9ba33d96edd
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
317KB
MD55f7b99739158d0b321c6c1e673365956
SHA1f22fb296a543017263c1ef507ca61da91203f490
SHA25633cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221
SHA51249a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459
-
Filesize
317KB
MD55f7b99739158d0b321c6c1e673365956
SHA1f22fb296a543017263c1ef507ca61da91203f490
SHA25633cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221
SHA51249a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459
-
Filesize
317KB
MD55f7b99739158d0b321c6c1e673365956
SHA1f22fb296a543017263c1ef507ca61da91203f490
SHA25633cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221
SHA51249a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459
-
Filesize
771KB
MD5c6068c2c575e85eb94e2299fc05cbf64
SHA1a0021d91efc13b0e3d4acc829c04333f209c0967
SHA2560d0a4622c58f3f17d16fb5cbd0aa5403bc614ca58847b4a725f432d202a55454
SHA51284f3cc1773e8cd48c58f5c80389678e3cd9985afbc3850253f9a27fe7cff386cf06cfda6a7f1b4e4aa5f9e79cd1a7321dced411dd5c8fbd155aca011c4002302
-
Filesize
771KB
MD5c6068c2c575e85eb94e2299fc05cbf64
SHA1a0021d91efc13b0e3d4acc829c04333f209c0967
SHA2560d0a4622c58f3f17d16fb5cbd0aa5403bc614ca58847b4a725f432d202a55454
SHA51284f3cc1773e8cd48c58f5c80389678e3cd9985afbc3850253f9a27fe7cff386cf06cfda6a7f1b4e4aa5f9e79cd1a7321dced411dd5c8fbd155aca011c4002302
-
Filesize
771KB
MD5c6068c2c575e85eb94e2299fc05cbf64
SHA1a0021d91efc13b0e3d4acc829c04333f209c0967
SHA2560d0a4622c58f3f17d16fb5cbd0aa5403bc614ca58847b4a725f432d202a55454
SHA51284f3cc1773e8cd48c58f5c80389678e3cd9985afbc3850253f9a27fe7cff386cf06cfda6a7f1b4e4aa5f9e79cd1a7321dced411dd5c8fbd155aca011c4002302
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
3.5MB
MD5062fe47e8efc9041880ed273eda7c8f3
SHA1b77fffa5fce64689758a7180477ffa25bd62f509
SHA256589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344
SHA51267a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80
-
Filesize
3.5MB
MD5062fe47e8efc9041880ed273eda7c8f3
SHA1b77fffa5fce64689758a7180477ffa25bd62f509
SHA256589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344
SHA51267a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80
-
Filesize
3.5MB
MD5062fe47e8efc9041880ed273eda7c8f3
SHA1b77fffa5fce64689758a7180477ffa25bd62f509
SHA256589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344
SHA51267a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80
-
Filesize
3.5MB
MD5062fe47e8efc9041880ed273eda7c8f3
SHA1b77fffa5fce64689758a7180477ffa25bd62f509
SHA256589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344
SHA51267a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80
-
Filesize
3.5MB
MD5062fe47e8efc9041880ed273eda7c8f3
SHA1b77fffa5fce64689758a7180477ffa25bd62f509
SHA256589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344
SHA51267a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80
-
Filesize
7.3MB
MD5c1d22d64c028c750f90bc2e763d3535c
SHA14403b1cdfb2fd7ecfba5b8e9cda93b6132accd49
SHA256864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee
SHA512dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5
-
Filesize
7.3MB
MD5c1d22d64c028c750f90bc2e763d3535c
SHA14403b1cdfb2fd7ecfba5b8e9cda93b6132accd49
SHA256864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee
SHA512dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5
-
Filesize
7.3MB
MD5c1d22d64c028c750f90bc2e763d3535c
SHA14403b1cdfb2fd7ecfba5b8e9cda93b6132accd49
SHA256864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee
SHA512dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5
-
Filesize
7.3MB
MD5c1d22d64c028c750f90bc2e763d3535c
SHA14403b1cdfb2fd7ecfba5b8e9cda93b6132accd49
SHA256864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee
SHA512dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5
-
Filesize
7.3MB
MD5c1d22d64c028c750f90bc2e763d3535c
SHA14403b1cdfb2fd7ecfba5b8e9cda93b6132accd49
SHA256864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee
SHA512dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5
-
Filesize
715KB
MD5ee767793010f352fe7af89e00e31e469
SHA1d8b031befe57c39dfc3312ab8c18330d69f110d6
SHA256b20a10018c71a9dffe1b76b1be20fd71abc3bb4ccc5c485012288de14caaba5a
SHA5126fd1702199dbec14b4c85f36e0b8ff14ead1ca7ade40892038d6042a47752a04428a603cfb5b8daca71bfd6bae754a4416fed5092ae6180904e3f3b75c783840
-
Filesize
715KB
MD5ee767793010f352fe7af89e00e31e469
SHA1d8b031befe57c39dfc3312ab8c18330d69f110d6
SHA256b20a10018c71a9dffe1b76b1be20fd71abc3bb4ccc5c485012288de14caaba5a
SHA5126fd1702199dbec14b4c85f36e0b8ff14ead1ca7ade40892038d6042a47752a04428a603cfb5b8daca71bfd6bae754a4416fed5092ae6180904e3f3b75c783840
-
Filesize
715KB
MD5ee767793010f352fe7af89e00e31e469
SHA1d8b031befe57c39dfc3312ab8c18330d69f110d6
SHA256b20a10018c71a9dffe1b76b1be20fd71abc3bb4ccc5c485012288de14caaba5a
SHA5126fd1702199dbec14b4c85f36e0b8ff14ead1ca7ade40892038d6042a47752a04428a603cfb5b8daca71bfd6bae754a4416fed5092ae6180904e3f3b75c783840
-
Filesize
281KB
MD55d6301d736e52991cd8cde81748245b1
SHA1c844b7aee010e053466eec2bb9728b23bc5210e9
SHA256b9d5f28e9a2202320f803f236b5f4a1d73a5bc6330ac210020136b50180c71f9
SHA51249a5965f4d75f396b27ac0f2a1898e115f57a9b848e457c40a18584956465b099ccc62ebdb5423b7bc6636643a37ee6243031e86278a1b51cb6f82c6eb02cf16
-
Filesize
281KB
MD55d6301d736e52991cd8cde81748245b1
SHA1c844b7aee010e053466eec2bb9728b23bc5210e9
SHA256b9d5f28e9a2202320f803f236b5f4a1d73a5bc6330ac210020136b50180c71f9
SHA51249a5965f4d75f396b27ac0f2a1898e115f57a9b848e457c40a18584956465b099ccc62ebdb5423b7bc6636643a37ee6243031e86278a1b51cb6f82c6eb02cf16
-
Filesize
281KB
MD55d6301d736e52991cd8cde81748245b1
SHA1c844b7aee010e053466eec2bb9728b23bc5210e9
SHA256b9d5f28e9a2202320f803f236b5f4a1d73a5bc6330ac210020136b50180c71f9
SHA51249a5965f4d75f396b27ac0f2a1898e115f57a9b848e457c40a18584956465b099ccc62ebdb5423b7bc6636643a37ee6243031e86278a1b51cb6f82c6eb02cf16
-
Filesize
4.3MB
MD548758ca363f8042e6b099a731e3b4bbe
SHA1fd11b4088422f15576cd91f76c705683002b94b8
SHA256a09d7d79ba4e1177ee17cc8f10e21508b3b69cf2a29c0f8b3bb478a65ad60846
SHA512b93afea3115a9ff16c7c4a92f39536d34a8d9540041dd0191b71a12a59a180127c5b4386254cc46c6a74d4db0ca26ac3e1d63f4e68d098cfda1971b1f59193cf
-
Filesize
4.3MB
MD548758ca363f8042e6b099a731e3b4bbe
SHA1fd11b4088422f15576cd91f76c705683002b94b8
SHA256a09d7d79ba4e1177ee17cc8f10e21508b3b69cf2a29c0f8b3bb478a65ad60846
SHA512b93afea3115a9ff16c7c4a92f39536d34a8d9540041dd0191b71a12a59a180127c5b4386254cc46c6a74d4db0ca26ac3e1d63f4e68d098cfda1971b1f59193cf
-
Filesize
4.3MB
MD548758ca363f8042e6b099a731e3b4bbe
SHA1fd11b4088422f15576cd91f76c705683002b94b8
SHA256a09d7d79ba4e1177ee17cc8f10e21508b3b69cf2a29c0f8b3bb478a65ad60846
SHA512b93afea3115a9ff16c7c4a92f39536d34a8d9540041dd0191b71a12a59a180127c5b4386254cc46c6a74d4db0ca26ac3e1d63f4e68d098cfda1971b1f59193cf
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
82KB
MD5ab02560735b1e79dd0657007133defed
SHA1fae1ce330db7a061f353635c8ed27690a4757ecf
SHA2566677619c34d27bbb52c0a01c7ee83226310119d7cec76671f5ae20f4cfe52dd0
SHA51261086a365d4dd232cf1f11d6e2a82260d9d8a0b6eeb69c8084a197c0de560d03bb397f1b1a7e34ddc5bb2eb45fdbea1f92624ed9b502e6c24b25a7eb63183c66
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
97KB
MD5c82abdb8395549812529245002e92ba9
SHA102070766fe57114722bb05198efd8a83aa0a842a
SHA256ac6109388e14085b08769950e3d340ba100c6c680f565792a43d18e8a35fd98c
SHA512e8bfe407e0fca882ac79ac58846fe1a0a6351604a24d374fbb0c74cc3437d01c3fb2bc4ec1844c2a4350d7634269ce68ad3063a8a93b56ba785f91d32e4506e8
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
317KB
MD55f7b99739158d0b321c6c1e673365956
SHA1f22fb296a543017263c1ef507ca61da91203f490
SHA25633cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221
SHA51249a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459
-
Filesize
317KB
MD55f7b99739158d0b321c6c1e673365956
SHA1f22fb296a543017263c1ef507ca61da91203f490
SHA25633cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221
SHA51249a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459
-
Filesize
317KB
MD55f7b99739158d0b321c6c1e673365956
SHA1f22fb296a543017263c1ef507ca61da91203f490
SHA25633cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221
SHA51249a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459
-
Filesize
315KB
MD571093161f1d6ec3b68cbdbce4d5e4e1d
SHA1dee7b380964d3ec003b7764dc29319a10aea1942
SHA256c3596938478ccf615dc1ae8422ffabf14b989277fb6926c328969c38710efbd6
SHA512cfc5443e3a1b828fe192064c7db9ea10002aaba80a3348cdfadfdcea329cb500af0ae217d968572ca774faec3ff3e64ba2b300e81475f7fda009692daa62ef50
-
Filesize
315KB
MD571093161f1d6ec3b68cbdbce4d5e4e1d
SHA1dee7b380964d3ec003b7764dc29319a10aea1942
SHA256c3596938478ccf615dc1ae8422ffabf14b989277fb6926c328969c38710efbd6
SHA512cfc5443e3a1b828fe192064c7db9ea10002aaba80a3348cdfadfdcea329cb500af0ae217d968572ca774faec3ff3e64ba2b300e81475f7fda009692daa62ef50
-
Filesize
315KB
MD571093161f1d6ec3b68cbdbce4d5e4e1d
SHA1dee7b380964d3ec003b7764dc29319a10aea1942
SHA256c3596938478ccf615dc1ae8422ffabf14b989277fb6926c328969c38710efbd6
SHA512cfc5443e3a1b828fe192064c7db9ea10002aaba80a3348cdfadfdcea329cb500af0ae217d968572ca774faec3ff3e64ba2b300e81475f7fda009692daa62ef50
-
Filesize
745.5MB
MD537d4cc098f6a49c21a416cb5c76eb8ed
SHA1008624d718d8492fa60f4c00e81713abe4d7a10d
SHA256c77db08e8186eb040828256cb860f9a36abb9862968285557b48d6b17dd35a66
SHA5121158b229741bd17395b8dc97368644d1d83d2f31b1a1cc3736a9f95d4d11b35014567c0530ddf3a0f5aa102fd45010004fada9a29f8e7c864556ac9b192ff7e6
-
Filesize
3.4MB
MD598c9367d1a517429810ed89215fabf19
SHA184e855ed4edf35cf02e021ffafecdcd70651969e
SHA25600572ba3901b66212d3532f9763c53d8fef1c6ba4b21ae06f32adb26222b60b7
SHA5129ceed3ae844abe7274e9fc72248b2d631faf2562becbfbbaaf80dc7da0bdf766fc35567fb780cbd52f373768d332d89aa484ca1ef9b7b1a0da8c97d8c93899f7
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD55c4423d666bcbdea8f5e1da46667b314
SHA1fa81ed0fb90e6502c2d0113d51e137c9f5eb3731
SHA256305bdfdd37152690828b2538ddc04a4d5a17cf17815f40b69d8ae6c4dd154554
SHA512d3c97f20d0e4637f63d0f87f093c32e78a98ee868f1f6c1525f29727032de1ef1aaf0f25f7defc097a06fa6760b7f8543f3b2f2836f071f0e6cbb9aea3421767
-
Filesize
89KB
MD55c4423d666bcbdea8f5e1da46667b314
SHA1fa81ed0fb90e6502c2d0113d51e137c9f5eb3731
SHA256305bdfdd37152690828b2538ddc04a4d5a17cf17815f40b69d8ae6c4dd154554
SHA512d3c97f20d0e4637f63d0f87f093c32e78a98ee868f1f6c1525f29727032de1ef1aaf0f25f7defc097a06fa6760b7f8543f3b2f2836f071f0e6cbb9aea3421767
-
Filesize
1.1MB
MD5bb0775d62b675a99bf113a5282ee527d
SHA185bbd1fa8a66fe7dcf53df16dfdf0cb5511cdb73
SHA25688d82f209133f753957f901cead443ad4e6a0daa148c098dacb565a64be2e80d
SHA512c89715f568e26bb9df2d66e962b406bac05edaeb086fd6ebb1067222c3776295c0cfc0c0f8f9cdea6a65b45c3a4fe4c60f19a40dd01b87a7dc083d585829295b
-
Filesize
1.1MB
MD5bb0775d62b675a99bf113a5282ee527d
SHA185bbd1fa8a66fe7dcf53df16dfdf0cb5511cdb73
SHA25688d82f209133f753957f901cead443ad4e6a0daa148c098dacb565a64be2e80d
SHA512c89715f568e26bb9df2d66e962b406bac05edaeb086fd6ebb1067222c3776295c0cfc0c0f8f9cdea6a65b45c3a4fe4c60f19a40dd01b87a7dc083d585829295b
-
Filesize
1.2MB
MD52d2f5592fa6d4c0ba50f17dc0506bf5a
SHA169ac49d96453fd2b0c7f0e0397b48c9f50eb5b41
SHA256493bd1d0e13f3cb906ae8b35074be37a90997610a51238da08492acae64d30e7
SHA5121123151ca444cd418fc77de99b550ed8593d54fbe4342d79f65630de443286979750edba7b207b401423848eb3ffd19e4a4c23b8d0df83c06908a0855f30781f
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
59B
MD50fc1b4d3e705f5c110975b1b90d43670
SHA114a9b683b19e8d7d9cb25262cdefcb72109b5569
SHA2561040e52584b5ef6107dfd19489d37ff056e435c598f4e555f1edf4015e7ca67d
SHA5128a147c06c8b0a960c9a3fa6da3b30a3b18d3612af9c663ee24c8d2066f45419a2ff4aa3a636606232eca12d7faef3da0cbbd3670a2d72a3281544e1c0b8edf81
-
Filesize
135B
MD5f45c606ffc55fd2f41f42012d917bce9
SHA1ca93419cc53fb4efef251483abe766da4b8e2dfd
SHA256f0bb50af1caea5b284bd463e5938229e7d22cc610b2d767ee1778e92a85849b4
SHA512ba7bebe62a6c2216e68e2d484c098662ba3d5217b39a3156b30e776d2bb3cf5d4f31dcdc48a2eb99bc5d80fffe388b212ec707b7d10b48df601430a07608fd46
-
Filesize
192B
MD53d90a8bdf51de0d7fae66fc1389e2b45
SHA1b1d30b405f4f6fce37727c9ec19590b42de172ee
SHA2567d1a6fe54dc90c23b0f60a0f0b3f9d5cae9ac1afecb9d6578f75b501cde59508
SHA512bd4ea236807a3c128c1ec228a19f75a0a6ef2b29603c571ee5d578847b20b395fec219855d66a409b5057b5612e924edcd5983986bef531f1309aba2fe7f0636
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
89KB
MD55c4423d666bcbdea8f5e1da46667b314
SHA1fa81ed0fb90e6502c2d0113d51e137c9f5eb3731
SHA256305bdfdd37152690828b2538ddc04a4d5a17cf17815f40b69d8ae6c4dd154554
SHA512d3c97f20d0e4637f63d0f87f093c32e78a98ee868f1f6c1525f29727032de1ef1aaf0f25f7defc097a06fa6760b7f8543f3b2f2836f071f0e6cbb9aea3421767
-
Filesize
1.1MB
MD5bb0775d62b675a99bf113a5282ee527d
SHA185bbd1fa8a66fe7dcf53df16dfdf0cb5511cdb73
SHA25688d82f209133f753957f901cead443ad4e6a0daa148c098dacb565a64be2e80d
SHA512c89715f568e26bb9df2d66e962b406bac05edaeb086fd6ebb1067222c3776295c0cfc0c0f8f9cdea6a65b45c3a4fe4c60f19a40dd01b87a7dc083d585829295b
-
Filesize
1.1MB
MD5bb0775d62b675a99bf113a5282ee527d
SHA185bbd1fa8a66fe7dcf53df16dfdf0cb5511cdb73
SHA25688d82f209133f753957f901cead443ad4e6a0daa148c098dacb565a64be2e80d
SHA512c89715f568e26bb9df2d66e962b406bac05edaeb086fd6ebb1067222c3776295c0cfc0c0f8f9cdea6a65b45c3a4fe4c60f19a40dd01b87a7dc083d585829295b