Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2023, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
6db63c6b9d5da292e3fcd36f9f8a0b33
-
SHA1
7530690b0f7301a15330da001a45d84a04d976ad
-
SHA256
00a710cbb0b3f38fd05729d07b7a5663b8f284bd2cf1c456db6b5a6ad316db1d
-
SHA512
59cb2446890c31e6f1a94fce446beecd0cc584d1c1e05620e192dc10ca2f95954a716760352914c5b569a7f7fe30e136624e9ad6353ae1855243100ed73a5f14
-
SSDEEP
49152:3m8Sm5JHVu8j4dshIEB3yaRkzzUef5CDpct9tGdutuOGUU:2m5JHfr/B3NezUeIYmutuOG
Malware Config
Extracted
redline
frant
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
gigant
77.91.124.55:19071
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
amadey
3.83
http://5.42.65.80/8bmeVwqx/index.php
-
install_dir
207aa4515d
-
install_file
oneetx.exe
-
strings_key
3e634dd0840c68ae2ced83c2be7bf0d4
Extracted
redline
cheat
54.91.200.119:80
Extracted
redline
@ytlogsbot
176.123.4.46:33783
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
DcRat 3 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe 5368 schtasks.exe 5904 schtasks.exe -
Detect Mystic stealer payload 11 IoCs
resource yara_rule behavioral2/memory/1740-70-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1740-71-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1740-72-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1740-74-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/5092-344-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/5092-346-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/5092-349-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1580-348-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1580-347-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1580-351-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/5092-353-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x0009000000023102-396.dat healer behavioral2/files/0x0009000000023102-397.dat healer behavioral2/memory/5580-407-0x0000000000840000-0x000000000084A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" B824.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" B824.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" B824.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection B824.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" B824.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" B824.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 8 IoCs
resource yara_rule behavioral2/memory/3732-83-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral2/files/0x00060000000230f7-369.dat family_redline behavioral2/files/0x00060000000230f7-368.dat family_redline behavioral2/memory/5400-371-0x0000000000410000-0x000000000044E000-memory.dmp family_redline behavioral2/memory/5576-512-0x00000000007F0000-0x000000000080E000-memory.dmp family_redline behavioral2/memory/5168-525-0x0000000000470000-0x000000000066C000-memory.dmp family_redline behavioral2/memory/5996-527-0x00000000001D0000-0x000000000020E000-memory.dmp family_redline behavioral2/memory/5168-533-0x0000000000470000-0x000000000066C000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/5576-512-0x00000000007F0000-0x000000000080E000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation BCC8.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation C555.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 28 IoCs
pid Process 4064 NT4gC88.exe 2184 DE2mI47.exe 2364 yC8jL66.exe 2388 1rW57hT8.exe 3104 2rA1748.exe 3896 3uY93uD.exe 2924 4ks352Ux.exe 4684 5ps6bd8.exe 3944 A14C.exe 3924 oX7xC9gU.exe 1244 mh0bq2vW.exe 440 Wz4rH6ni.exe 3884 zt5KQ3vK.exe 1392 1jq34PW6.exe 1308 cacls.exe 5440 B360.exe 5400 2AQ748yK.exe 5580 B824.exe 5812 BCC8.exe 6072 C555.exe 4412 explothe.exe 5168 CE4F.exe 5576 D63F.exe 5712 oneetx.exe 5720 explothe.exe 5580 oneetx.exe 1696 explothe.exe 5128 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2880 rundll32.exe -
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" B824.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" DE2mI47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" yC8jL66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" mh0bq2vW.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Wz4rH6ni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" zt5KQ3vK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" NT4gC88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" A14C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" oX7xC9gU.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2388 set thread context of 2088 2388 1rW57hT8.exe 89 PID 3104 set thread context of 1740 3104 2rA1748.exe 94 PID 3896 set thread context of 3108 3896 3uY93uD.exe 102 PID 2924 set thread context of 3732 2924 4ks352Ux.exe 108 PID 1308 set thread context of 5092 1308 cacls.exe 151 PID 1392 set thread context of 1580 1392 1jq34PW6.exe 152 PID 5440 set thread context of 5932 5440 B360.exe 169 PID 5168 set thread context of 5996 5168 CE4F.exe 185 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 4396 2388 WerFault.exe 88 3848 3104 WerFault.exe 93 756 1740 WerFault.exe 94 4552 3896 WerFault.exe 99 4488 2924 WerFault.exe 105 3248 1308 WerFault.exe 147 5160 1392 WerFault.exe 146 5168 1580 WerFault.exe 152 6120 5440 WerFault.exe 165 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5368 schtasks.exe 5904 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2088 AppLaunch.exe 2088 AppLaunch.exe 3108 AppLaunch.exe 3108 AppLaunch.exe 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3980 msedge.exe 3980 msedge.exe 3124 Process not Found 3124 Process not Found 3904 msedge.exe 3904 msedge.exe 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3108 AppLaunch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2088 AppLaunch.exe Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeDebugPrivilege 5580 B824.exe Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeDebugPrivilege 5576 D63F.exe Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeDebugPrivilege 5996 vbc.exe Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 6072 C555.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3124 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3880 wrote to memory of 4064 3880 file.exe 85 PID 3880 wrote to memory of 4064 3880 file.exe 85 PID 3880 wrote to memory of 4064 3880 file.exe 85 PID 4064 wrote to memory of 2184 4064 NT4gC88.exe 86 PID 4064 wrote to memory of 2184 4064 NT4gC88.exe 86 PID 4064 wrote to memory of 2184 4064 NT4gC88.exe 86 PID 2184 wrote to memory of 2364 2184 DE2mI47.exe 87 PID 2184 wrote to memory of 2364 2184 DE2mI47.exe 87 PID 2184 wrote to memory of 2364 2184 DE2mI47.exe 87 PID 2364 wrote to memory of 2388 2364 yC8jL66.exe 88 PID 2364 wrote to memory of 2388 2364 yC8jL66.exe 88 PID 2364 wrote to memory of 2388 2364 yC8jL66.exe 88 PID 2388 wrote to memory of 2088 2388 1rW57hT8.exe 89 PID 2388 wrote to memory of 2088 2388 1rW57hT8.exe 89 PID 2388 wrote to memory of 2088 2388 1rW57hT8.exe 89 PID 2388 wrote to memory of 2088 2388 1rW57hT8.exe 89 PID 2388 wrote to memory of 2088 2388 1rW57hT8.exe 89 PID 2388 wrote to memory of 2088 2388 1rW57hT8.exe 89 PID 2388 wrote to memory of 2088 2388 1rW57hT8.exe 89 PID 2388 wrote to memory of 2088 2388 1rW57hT8.exe 89 PID 2388 wrote to memory of 2088 2388 1rW57hT8.exe 89 PID 2364 wrote to memory of 3104 2364 yC8jL66.exe 93 PID 2364 wrote to memory of 3104 2364 yC8jL66.exe 93 PID 2364 wrote to memory of 3104 2364 yC8jL66.exe 93 PID 3104 wrote to memory of 1740 3104 2rA1748.exe 94 PID 3104 wrote to memory of 1740 3104 2rA1748.exe 94 PID 3104 wrote to memory of 1740 3104 2rA1748.exe 94 PID 3104 wrote to memory of 1740 3104 2rA1748.exe 94 PID 3104 wrote to memory of 1740 3104 2rA1748.exe 94 PID 3104 wrote to memory of 1740 3104 2rA1748.exe 94 PID 3104 wrote to memory of 1740 3104 2rA1748.exe 94 PID 3104 wrote to memory of 1740 3104 2rA1748.exe 94 PID 3104 wrote to memory of 1740 3104 2rA1748.exe 94 PID 3104 wrote to memory of 1740 3104 2rA1748.exe 94 PID 2184 wrote to memory of 3896 2184 DE2mI47.exe 99 PID 2184 wrote to memory of 3896 2184 DE2mI47.exe 99 PID 2184 wrote to memory of 3896 2184 DE2mI47.exe 99 PID 3896 wrote to memory of 3108 3896 3uY93uD.exe 102 PID 3896 wrote to memory of 3108 3896 3uY93uD.exe 102 PID 3896 wrote to memory of 3108 3896 3uY93uD.exe 102 PID 3896 wrote to memory of 3108 3896 3uY93uD.exe 102 PID 3896 wrote to memory of 3108 3896 3uY93uD.exe 102 PID 3896 wrote to memory of 3108 3896 3uY93uD.exe 102 PID 4064 wrote to memory of 2924 4064 NT4gC88.exe 105 PID 4064 wrote to memory of 2924 4064 NT4gC88.exe 105 PID 4064 wrote to memory of 2924 4064 NT4gC88.exe 105 PID 2924 wrote to memory of 3732 2924 4ks352Ux.exe 108 PID 2924 wrote to memory of 3732 2924 4ks352Ux.exe 108 PID 2924 wrote to memory of 3732 2924 4ks352Ux.exe 108 PID 2924 wrote to memory of 3732 2924 4ks352Ux.exe 108 PID 2924 wrote to memory of 3732 2924 4ks352Ux.exe 108 PID 2924 wrote to memory of 3732 2924 4ks352Ux.exe 108 PID 2924 wrote to memory of 3732 2924 4ks352Ux.exe 108 PID 2924 wrote to memory of 3732 2924 4ks352Ux.exe 108 PID 3880 wrote to memory of 4684 3880 file.exe 111 PID 3880 wrote to memory of 4684 3880 file.exe 111 PID 3880 wrote to memory of 4684 3880 file.exe 111 PID 4684 wrote to memory of 3612 4684 5ps6bd8.exe 113 PID 4684 wrote to memory of 3612 4684 5ps6bd8.exe 113 PID 3612 wrote to memory of 4520 3612 cmd.exe 115 PID 3612 wrote to memory of 4520 3612 cmd.exe 115 PID 3612 wrote to memory of 1956 3612 cmd.exe 117 PID 3612 wrote to memory of 1956 3612 cmd.exe 117 PID 4520 wrote to memory of 2672 4520 msedge.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- DcRat
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NT4gC88.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NT4gC88.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\DE2mI47.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\DE2mI47.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\yC8jL66.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\yC8jL66.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1rW57hT8.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1rW57hT8.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 5846⤵
- Program crash
PID:4396
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2rA1748.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2rA1748.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 1927⤵
- Program crash
PID:756
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 5726⤵
- Program crash
PID:3848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3uY93uD.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3uY93uD.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 6005⤵
- Program crash
PID:4552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4ks352Ux.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4ks352Ux.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 1964⤵
- Program crash
PID:4488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5ps6bd8.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5ps6bd8.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\43F9.tmp\43FA.tmp\43FB.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5ps6bd8.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x184,0x188,0x18c,0x160,0x190,0x7ffa96c546f8,0x7ffa96c54708,0x7ffa96c547185⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,11440379588605098085,7435606811284403702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,11440379588605098085,7435606811284403702,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:25⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,11440379588605098085,7435606811284403702,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:85⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11440379588605098085,7435606811284403702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:15⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11440379588605098085,7435606811284403702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3584 /prefetch:15⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11440379588605098085,7435606811284403702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:15⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11440379588605098085,7435606811284403702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:15⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11440379588605098085,7435606811284403702,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:15⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,11440379588605098085,7435606811284403702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:85⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,11440379588605098085,7435606811284403702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:85⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11440379588605098085,7435606811284403702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:15⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11440379588605098085,7435606811284403702,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:15⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11440379588605098085,7435606811284403702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:15⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11440379588605098085,7435606811284403702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4296 /prefetch:15⤵PID:5664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,11440379588605098085,7435606811284403702,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1076 /prefetch:25⤵PID:5824
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵PID:1956
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffa96c546f8,0x7ffa96c54708,0x7ffa96c547185⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,4285262854760858474,2925497321766306309,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:25⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,4285262854760858474,2925497321766306309,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2388 -ip 23881⤵PID:1760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3104 -ip 31041⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1740 -ip 17401⤵PID:972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3896 -ip 38961⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2924 -ip 29241⤵PID:3276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\A14C.exeC:\Users\Admin\AppData\Local\Temp\A14C.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\oX7xC9gU.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\oX7xC9gU.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mh0bq2vW.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mh0bq2vW.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Wz4rH6ni.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Wz4rH6ni.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:440 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\zt5KQ3vK.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\zt5KQ3vK.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1jq34PW6.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1jq34PW6.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 5408⤵
- Program crash
PID:5168
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 6007⤵
- Program crash
PID:5160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2AQ748yK.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2AQ748yK.exe6⤵
- Executes dropped EXE
PID:5400
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\A92D.exeC:\Users\Admin\AppData\Local\Temp\A92D.exe1⤵PID:1308
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1308 -s 4042⤵
- Program crash
PID:3248
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AB50.bat" "1⤵PID:3224
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login2⤵PID:5288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa96c546f8,0x7ffa96c54708,0x7ffa96c547183⤵PID:5304
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵PID:5392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa96c546f8,0x7ffa96c54708,0x7ffa96c547183⤵PID:5424
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1308 -ip 13081⤵PID:3012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1392 -ip 13921⤵PID:760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1580 -ip 15801⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\B360.exeC:\Users\Admin\AppData\Local\Temp\B360.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:5932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5440 -s 3882⤵
- Program crash
PID:6120
-
-
C:\Users\Admin\AppData\Local\Temp\B824.exeC:\Users\Admin\AppData\Local\Temp\B824.exe1⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:5580
-
C:\Users\Admin\AppData\Local\Temp\BCC8.exeC:\Users\Admin\AppData\Local\Temp\BCC8.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:5812 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4412 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F3⤵
- DcRat
- Creates scheduled task(s)
PID:5368
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵PID:5452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"4⤵PID:5956
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E4⤵PID:5328
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:2216
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1616
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:5292
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:2880
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5440 -ip 54401⤵PID:5996
-
C:\Users\Admin\AppData\Local\Temp\C555.exeC:\Users\Admin\AppData\Local\Temp\C555.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:6072 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5712 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F3⤵
- DcRat
- Creates scheduled task(s)
PID:5904
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit3⤵PID:6008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3248
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1308
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:5212
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5408
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"4⤵PID:3848
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E4⤵PID:2008
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CE4F.exeC:\Users\Admin\AppData\Local\Temp\CE4F.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5168 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5996
-
-
C:\Users\Admin\AppData\Local\Temp\D63F.exeC:\Users\Admin\AppData\Local\Temp\D63F.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5576
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:5720
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:5580
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1696
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:5128
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Scripting
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
321B
MD5baf5d1398fdb79e947b60fe51e45397f
SHA149e7b8389f47b93509d621b8030b75e96bb577af
SHA25610c8c7b5fa58f8c6b69f44e92a4e2af111b59fcf4f21a07e04b19e14876ccdf8
SHA512b2c9ef5581d5eae7c17ae260fe9f52344ed737fa851cb44d1cea58a32359d0ac5d0ca3099c970209bd30a0d4af6e504101f21b7054cf5eca91c0831cf12fb413
-
Filesize
152B
MD5451fddf78747a5a4ebf64cabb4ac94e7
SHA16925bd970418494447d800e213bfd85368ac8dc9
SHA25664d12f59d409aa1b03f0b2924e0b2419b65c231de9e04fce15cc3a76e1b9894d
SHA512edb85a2a94c207815360820731d55f6b4710161551c74008df0c2ae10596e1886c8a9e11d43ddf121878ae35ac9f06fc66b4c325b01ed4e7bf4d3841b27e0864
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3c748773-8371-429e-930c-c78053bd07d3.tmp
Filesize24KB
MD5d985875547ce8936a14b00d1e571365f
SHA1040d8e5bd318357941fca03b49f66a1470824cb3
SHA2568455a012296a7f4b10ade39e1300cda1b04fd0fc1832ffc043e66f48c6aecfbf
SHA512ca31d3d6c44d52a1f817731da2e7ac98402cd19eeb4b48906950a2f22f961c8b1f665c3eaa62bf73cd44eb94ea377f7e2ceff9ef682a543771344dab9dbf5a38
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5b5a9010d2e6e410c043952fb2353576d
SHA1ee6e5bc7eed7aa04d5d2df4eb56d90c797b19b21
SHA256038765c66baeb481e4cda747cff49021e8e7435ab3713b66ff202d60eaf0c80f
SHA5123c839cb8d6570b213039e6ea44519eab726fa3e4baaffe50a4cf136f0bdaffd7c3eb525797c07ed0229e57c009614dff507ab771256e6ef66107bf5e4df19947
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD539bb925cc3716ca9fca0912c3868fe27
SHA12f741c42359f8657853b1f27664217dca6d31ce9
SHA256d1d01d7c784d76a6239d3254e3b9a40f12a0e06c51a783a88b424ee2e388ed5c
SHA51298252cc49fd9b177c36710f2a007e29660fe172369420de54069c34c9600f451cbe66d4dd0be804b2b44177b924704361879f506f948df836999118d5c7407bc
-
Filesize
6KB
MD52157a190cc6098a8a997ea406c3c2be2
SHA16f49958dc93ba1cb22905546704d3e59e61dc5f2
SHA256cffe0ee85e939d35762bfb4567de17beab6746d978072fe169705a55638fa8e5
SHA512dbe04943c546435eca2eef8fcf482efa25b25beaf5dfaed5af09dab9ac39ba0f05a613c0471e8bce1a5fd6de1e185484349d2724dac7318c7f05258aad752335
-
Filesize
6KB
MD563bcdd749be8af2c0f5f4137bafd329c
SHA1cda407687b40f026c1219b47957f3fb8be5a8d8b
SHA256f1a308a42e23f407353d6bcc29fddd5ad8ce2022beba98ff5809bd5a8d31879b
SHA51297f3f80573d5b725d63ac06667959a64a0cf943a995583799c442da0266eae3367231d948480fbb9217e3a5135c5794c6e604b1e46ac40cd909c7c504cfcabf1
-
Filesize
5KB
MD52e801071cb08bac962ab41e985aa1a98
SHA170cb7237097c542ec687f97efdd9b1d5c878e35b
SHA256c9082db35abc25d7b4b2425e50e2bf9994be2c0ea88cf32ac98d390633aa66a1
SHA512a76cc8600996709fa1b4fc4b1214027310c9b3fe012af9cf9b525976485fb24f3113edb0069e949f1dae1ba939c832930794c09de27e08ca3276a8a63d6b55a0
-
Filesize
872B
MD5da63e8505290564284a91c79728ce7bf
SHA111fa684f40a254e2e1818974780edbf4ac5f8573
SHA256ced6ddfcd3e3b8fb939383d77ef2547be157a49435eabe7ff9fedfc9303ba6e0
SHA51272aaeadc456925d66faf08efdab71999da08b3e8ac5d7081ae2741fabe9bb6ef1cb66c8be2a975b603e85cfec6e3b65dd6f88216728aa0d544a54fd9a208a06c
-
Filesize
872B
MD5b722919c4f7b42eace7bc10435e4d7e4
SHA15e651e0d40f3bc1eb2cb011c69c398272271643f
SHA2568abc9f54a7602a2e608cd303f04fc56dc7294e0c5c22b966594b2ebbc80bba41
SHA512c3f37976a02aee69bba8f030d05ce307d2dfe0f1ec62a64fcf111ea72ab99201d3ca14736a266004dbb17886d8f099dade3e4b52e8118dc47043fc56bf0ef104
-
Filesize
872B
MD5ae30d0baad84c090f43bdc43ac2ae396
SHA1389aa80a0cc174cc7ae7e8f3a86aa2b36a08ce46
SHA25614a6eae5885e8bb9072dde88701502ebec111eb6c5e5b535bc435eec26e81c48
SHA5125e646871d3916b0512c333d0474ce730b7e1bb163d2b97ac317b3cffc376db761457a5f67ef4e0c4b6f2d355a4031db72bd2671258bf806c8bea0fb316206d56
-
Filesize
872B
MD59ccb01382588ae51de82e610371f2abd
SHA1971fe0d5a2f4c586d559137ccd4faf7f290e85b5
SHA2565f750de01124daca4f383c2c6a693029a7206f5cc697d7ba5d2d4ff51e732a8d
SHA5124a07fa80f569bdc9b487d8aeb2c31db1b63bcba42df06fffbfd593850529252d34fdc731017a9f47784962183f8eeb20cdacc6f83d51d8087eb6345aa920c7ff
-
Filesize
872B
MD5f751392c9cc3809bda255ce440f8f60c
SHA1b46d8e2975402b4667c866d9f8de2b07050335ef
SHA256f327761d9223d02400173a53149926de0683fce5c28228a764581a05842ea02a
SHA51266d3dcfa37dbbe059451d33029dd4d863caeeffd8c2694f706ffacdf44670288ab5cb74a84f8b9ab65777276043b20d8769375e53b3313c3c1655271e647c719
-
Filesize
872B
MD5d2f267f9524da584264fa9ecf3cd8c2e
SHA1a93b0c7660a492d5bea9cead8a762db131cabc8d
SHA2563af661b94ebe69371d8179e40ff6c14a0a360ce643ef3a6d43a294f9b6fe153d
SHA5129e20432bb7c0f6a70eee74549c075cc9cbf51990b3748f9e3dc14e35219c8dd440d09ad290fed77315b56a61942696da524c6d6a0396e2e4be3fc42f9c2a3397
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
2KB
MD570082cf6121a73f73ea1f651c9cad14a
SHA1b9e7e14be7754a508fa4acae28c8ba85085f0e43
SHA256bffe561ae376a211bf56000df18056e021f228a0228891b46c1ff03fa163491c
SHA51295513d287fa28aa877649b6eff4f930defc7e43bd5a3d3b44c939d95b043976f290aec67a1b5a373b3c87f4360ee31865116edc0f1f2d633f59d5b0c5c3400ad
-
Filesize
10KB
MD5520dff39e1d6c5f1156e4c96816bde23
SHA14e1ec47ed4f4d3f100a461d2f6bcdf9e0a4fd297
SHA2561bdad535f564f83ea429ae90ebcab96d9919d4adae539d62e433984a492fdf6c
SHA512b4dc0ae3a779c5d057ee930c385889ab48d913a81bacd43ddabda02bdd9ec54cef614fc62fb70f70274d6b02f1081a438064c8e1295082472e7be3b42e2d9486
-
Filesize
10KB
MD59533df52785549027f5dc2a21e462269
SHA16263d0eab274d5a8cab2be9d2192d9d00a08d25b
SHA2565228af28d270e28da64b023d8374c8f25531b42bf1fa66f07b5921f4a16a9f89
SHA51272ec7a8fda8b2fae554e28bb527b6b3ff8d5f8c8abd6b45380b7bb5f9515b9a5dfbd59c49dd4e93c25544663e639c7c622b644d3d2ce59a954f1260ee08f8e7e
-
Filesize
10KB
MD56e42012f57d9082546ac720a09fea8fd
SHA1dd5017fe05aa0bc95a11b8fdfd61bcbad6de1e78
SHA25608452633f114632d9a9f4080b2b4f8e31d9c59b5eeafa785242746be85e68058
SHA512cab837dc65605ad7caf5d6b2444214c169dd3468761c06c22247db169ec83e95763c696e986086000f3601c3be9fe6e8c27b844f5e548f58267dfe89ad03a31a
-
Filesize
2KB
MD570082cf6121a73f73ea1f651c9cad14a
SHA1b9e7e14be7754a508fa4acae28c8ba85085f0e43
SHA256bffe561ae376a211bf56000df18056e021f228a0228891b46c1ff03fa163491c
SHA51295513d287fa28aa877649b6eff4f930defc7e43bd5a3d3b44c939d95b043976f290aec67a1b5a373b3c87f4360ee31865116edc0f1f2d633f59d5b0c5c3400ad
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
90B
MD55a115a88ca30a9f57fdbb545490c2043
SHA167e90f37fc4c1ada2745052c612818588a5595f4
SHA25652c4113e7f308faa933ae6e8ff5d1b955ba62d1edac0eb7c972caa26e1ae4e2d
SHA51217c399dad7b7343d5b16156e4d83de78ff5755d12add358bd2987ed4216dd13d24cfec9ecdb92d9d6723bb1d20d8874c0bad969dbec69eed95beb7a2817eb4fe
-
Filesize
1.6MB
MD5160d13e49449fc11dd9ee1ab42387bed
SHA16e09ec14b090628481e8e88d910d7a1d1823761d
SHA256afbc9d4376a9e33eea44506a3fa59ea06542ecedc70f56d6a7cbbb729ba96054
SHA5123f7ff08c69de90896884f3f1cc1e8acda2c3b6c0af81bddd2a07c81019d75f1bff2ec771cad96b68a1f8f665e7c0e853ced7229148aa45aaabea109060272c3d
-
Filesize
1.6MB
MD5160d13e49449fc11dd9ee1ab42387bed
SHA16e09ec14b090628481e8e88d910d7a1d1823761d
SHA256afbc9d4376a9e33eea44506a3fa59ea06542ecedc70f56d6a7cbbb729ba96054
SHA5123f7ff08c69de90896884f3f1cc1e8acda2c3b6c0af81bddd2a07c81019d75f1bff2ec771cad96b68a1f8f665e7c0e853ced7229148aa45aaabea109060272c3d
-
Filesize
1.8MB
MD5bd032be5afa292fc8ed69763de8eb291
SHA16ed592304dd4a21ef621dd3ff3de57801a7e1c9c
SHA256c4e722f57977f3c8a94cadc754675ddd632db29d038b99bcae4122da7ec4b4cf
SHA51285d43e140ff20a8c084929b4916f7ab23d614280eb5985bbf33e67d1499ef7348f92c44fd6a34b118db1afe3842800075715d7541590724a9efe8258ab688a75
-
Filesize
1.8MB
MD5bd032be5afa292fc8ed69763de8eb291
SHA16ed592304dd4a21ef621dd3ff3de57801a7e1c9c
SHA256c4e722f57977f3c8a94cadc754675ddd632db29d038b99bcae4122da7ec4b4cf
SHA51285d43e140ff20a8c084929b4916f7ab23d614280eb5985bbf33e67d1499ef7348f92c44fd6a34b118db1afe3842800075715d7541590724a9efe8258ab688a75
-
Filesize
79B
MD5403991c4d18ac84521ba17f264fa79f2
SHA1850cc068de0963854b0fe8f485d951072474fd45
SHA256ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576
-
Filesize
1.8MB
MD5a61d93cb359969784417ca1a89a2506e
SHA15b2482b9d9e8b73e0f942f0eedd625afbf6228ef
SHA256c6979072f9d72bad49c18b16e4b6a32ef5353ebdc79037b289f7d2862ceffe98
SHA512b037e4151ea42df8ea0e34ba63b249a4e198ad77384835a774f1fc498387c19306b959370e61ed3996abb37e6f69751c7602b51ae694bd10ba84fd6786cfcbc5
-
Filesize
1.8MB
MD5a61d93cb359969784417ca1a89a2506e
SHA15b2482b9d9e8b73e0f942f0eedd625afbf6228ef
SHA256c6979072f9d72bad49c18b16e4b6a32ef5353ebdc79037b289f7d2862ceffe98
SHA512b037e4151ea42df8ea0e34ba63b249a4e198ad77384835a774f1fc498387c19306b959370e61ed3996abb37e6f69751c7602b51ae694bd10ba84fd6786cfcbc5
-
Filesize
19KB
MD5cb71132b03f15b037d3e8a5e4d9e0285
SHA195963fba539b45eb6f6acbd062c48976733519a1
SHA2567f7d4ba0b7b46eff509b3aa2105d10d25f79e13ef3c1b1ec9c889cf2f0f1d373
SHA512d140809bcac5b6b47f710c18ca1df1a3dd9b9adb95dbc368049cdc91874070c9a9f67137941ab17147143ebfabb81de7f1e697e42b0a28d51776b2f9c48cba4a
-
Filesize
19KB
MD5cb71132b03f15b037d3e8a5e4d9e0285
SHA195963fba539b45eb6f6acbd062c48976733519a1
SHA2567f7d4ba0b7b46eff509b3aa2105d10d25f79e13ef3c1b1ec9c889cf2f0f1d373
SHA512d140809bcac5b6b47f710c18ca1df1a3dd9b9adb95dbc368049cdc91874070c9a9f67137941ab17147143ebfabb81de7f1e697e42b0a28d51776b2f9c48cba4a
-
Filesize
227KB
MD569d468f64dc451287c4d2af9e7e1e649
SHA17799b32a7a3c0e8679dade16ff97e60324e8b93c
SHA256e88701f5f2bc931ade631c04c5d2d50e21ba0e64217c022d75b9c38fb132f451
SHA512b8dc99a347a6d4fb7492830221bc89384f44f0f13cb17ef884e6b27e8fa7da5c7dda74bd276f9a3a6ff87373d01a11ed13243cb670cf372955270a558bc6f2bd
-
Filesize
227KB
MD569d468f64dc451287c4d2af9e7e1e649
SHA17799b32a7a3c0e8679dade16ff97e60324e8b93c
SHA256e88701f5f2bc931ade631c04c5d2d50e21ba0e64217c022d75b9c38fb132f451
SHA512b8dc99a347a6d4fb7492830221bc89384f44f0f13cb17ef884e6b27e8fa7da5c7dda74bd276f9a3a6ff87373d01a11ed13243cb670cf372955270a558bc6f2bd
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
99KB
MD5164182669c04e315fe70c9541800dd19
SHA110b41687eb78eea5086511357d7315161c8b4d29
SHA256e63ec1df389a569ba3cd43b00a255ad99b43f8e462c8b02e437889fe7b52c17a
SHA512f9b15a26ec540a729425fbeee1ee613ab65144d6338708a978056c9e1e4279727047d44d1431a49454db854502e28ad2ee23256a2dd318d77bf6cc3911107bcb
-
Filesize
99KB
MD5164182669c04e315fe70c9541800dd19
SHA110b41687eb78eea5086511357d7315161c8b4d29
SHA256e63ec1df389a569ba3cd43b00a255ad99b43f8e462c8b02e437889fe7b52c17a
SHA512f9b15a26ec540a729425fbeee1ee613ab65144d6338708a978056c9e1e4279727047d44d1431a49454db854502e28ad2ee23256a2dd318d77bf6cc3911107bcb
-
Filesize
99KB
MD5d1ce97375b55301672ea2652820d4241
SHA185070152fd32895dd229b9a41b5412d6332a3f8d
SHA256d5b06aee07134cbd8804947d5d6134352b1290f278a791244b18ce3eab5fdb54
SHA512b72e9d88567c2afcdb9fef044432b90230dc334b312242f923861235e35e29a3b00b3420a3f3f7fc0c7a1091831f4a55acea5d3d8b843e28585a5535ffb16e2e
-
Filesize
1.7MB
MD5762fc98000d3c80ff1e36b38b001ad20
SHA1222374f08d356fda8038533886bb74971551b26a
SHA256b99e0fd5fbd51bd25cb41cacba4bbefc6482202f0c65ded59c9bb2c56c004dad
SHA5126320481e2c14004fd90cc87cd6224e5aef3d64a07bf2389457809cd449ce52476b0793958d334743c31db00e85b23fce6e27addb2e2c3bc925badbdbc6fd384e
-
Filesize
1.7MB
MD5762fc98000d3c80ff1e36b38b001ad20
SHA1222374f08d356fda8038533886bb74971551b26a
SHA256b99e0fd5fbd51bd25cb41cacba4bbefc6482202f0c65ded59c9bb2c56c004dad
SHA5126320481e2c14004fd90cc87cd6224e5aef3d64a07bf2389457809cd449ce52476b0793958d334743c31db00e85b23fce6e27addb2e2c3bc925badbdbc6fd384e
-
Filesize
1.5MB
MD589a3c064e8f5d5325510465dbee4c585
SHA1d53770c894b6b22d237eedbe7b61b82ebb5a6420
SHA256ffb90ac8bd2ce1a7bb151f8d85d6a6f3b5b0fd89f8e35e32e6ce8c3f3a0b1b2a
SHA5126cae29582ec00d48eb6195ff9d0b8e3cb5ed7bb5ed144eab38b181187ba4ddb0dc4f436285846133e64e2fdb06066e13f9941bfb3140be307260948536057d2d
-
Filesize
1.5MB
MD589a3c064e8f5d5325510465dbee4c585
SHA1d53770c894b6b22d237eedbe7b61b82ebb5a6420
SHA256ffb90ac8bd2ce1a7bb151f8d85d6a6f3b5b0fd89f8e35e32e6ce8c3f3a0b1b2a
SHA5126cae29582ec00d48eb6195ff9d0b8e3cb5ed7bb5ed144eab38b181187ba4ddb0dc4f436285846133e64e2fdb06066e13f9941bfb3140be307260948536057d2d
-
Filesize
1.8MB
MD5a61d93cb359969784417ca1a89a2506e
SHA15b2482b9d9e8b73e0f942f0eedd625afbf6228ef
SHA256c6979072f9d72bad49c18b16e4b6a32ef5353ebdc79037b289f7d2862ceffe98
SHA512b037e4151ea42df8ea0e34ba63b249a4e198ad77384835a774f1fc498387c19306b959370e61ed3996abb37e6f69751c7602b51ae694bd10ba84fd6786cfcbc5
-
Filesize
1.8MB
MD5a61d93cb359969784417ca1a89a2506e
SHA15b2482b9d9e8b73e0f942f0eedd625afbf6228ef
SHA256c6979072f9d72bad49c18b16e4b6a32ef5353ebdc79037b289f7d2862ceffe98
SHA512b037e4151ea42df8ea0e34ba63b249a4e198ad77384835a774f1fc498387c19306b959370e61ed3996abb37e6f69751c7602b51ae694bd10ba84fd6786cfcbc5
-
Filesize
1.2MB
MD542337f958a56664bf8c6e3942bbc0498
SHA14481d07c11df796864c3e38c13295962fd0bdaa1
SHA2564fdbbc79087f53a4bc72dbaaa292f5eb6e74612a42df6a8f6dcedc9d393cf4b8
SHA51205e16f8201523647b05b70a9839486d57833898d65b8b5bb6adc0c23a7fa3fbc3d6c446d49b68abc69e5d02168a14a44ceb0e25beb57c2a4c745c6080aad78f1
-
Filesize
1.2MB
MD542337f958a56664bf8c6e3942bbc0498
SHA14481d07c11df796864c3e38c13295962fd0bdaa1
SHA2564fdbbc79087f53a4bc72dbaaa292f5eb6e74612a42df6a8f6dcedc9d393cf4b8
SHA51205e16f8201523647b05b70a9839486d57833898d65b8b5bb6adc0c23a7fa3fbc3d6c446d49b68abc69e5d02168a14a44ceb0e25beb57c2a4c745c6080aad78f1
-
Filesize
1.6MB
MD5cd1af740ec16c24e33ad2038c233320f
SHA132f26fe00bded3ad1d69f913f200ed76c3f2086f
SHA256961dc505a86a3e0db5c77d3ad4c966cfcd43ec23e94190a879a2b171b930beb3
SHA512f6feb514040dfaf2fdf0117a098b96eb6625d9b9014f59f2ded4ae85d4a6b674d0b31fdc76bae4fe2270ccf216d2daf2b80ee926c62dd7e81fbf73f0aa86448c
-
Filesize
1.6MB
MD5cd1af740ec16c24e33ad2038c233320f
SHA132f26fe00bded3ad1d69f913f200ed76c3f2086f
SHA256961dc505a86a3e0db5c77d3ad4c966cfcd43ec23e94190a879a2b171b930beb3
SHA512f6feb514040dfaf2fdf0117a098b96eb6625d9b9014f59f2ded4ae85d4a6b674d0b31fdc76bae4fe2270ccf216d2daf2b80ee926c62dd7e81fbf73f0aa86448c
-
Filesize
1.3MB
MD57edee8c9c737c359b5405d66e7327e73
SHA1c58ed3fff47bafc6b1365deffbfec4f6a8b4965d
SHA2562226c8797d31e94a3a2742bb154b023553938ba55504f88fb61ef3b1c2789717
SHA5128255fecb5861e37ca5bb0c1525b196da1566f9b00da02a88ea5f6ad92a96cfd66324ac7dd90d9c003ada8baec775b2a41af765a6da33d83a33858be2d0eab98f
-
Filesize
1.3MB
MD57edee8c9c737c359b5405d66e7327e73
SHA1c58ed3fff47bafc6b1365deffbfec4f6a8b4965d
SHA2562226c8797d31e94a3a2742bb154b023553938ba55504f88fb61ef3b1c2789717
SHA5128255fecb5861e37ca5bb0c1525b196da1566f9b00da02a88ea5f6ad92a96cfd66324ac7dd90d9c003ada8baec775b2a41af765a6da33d83a33858be2d0eab98f
-
Filesize
748KB
MD508772f121227fb3019a297bd1db02cd4
SHA116bdd019c27ac07b56dbbceea30ca33e04ef6ae2
SHA2566401088e39243a88c2c063a09bc1e180bd33508e1f7951d7793f16fe093854d4
SHA5126a8dba8f3994cc1e479a776a1f32ace18683ce419973a192ad5ebe129ec5b62d7a3d022c227ea0612c2292673a243c65fc525224025f08001c3b67bdce9853f1
-
Filesize
748KB
MD508772f121227fb3019a297bd1db02cd4
SHA116bdd019c27ac07b56dbbceea30ca33e04ef6ae2
SHA2566401088e39243a88c2c063a09bc1e180bd33508e1f7951d7793f16fe093854d4
SHA5126a8dba8f3994cc1e479a776a1f32ace18683ce419973a192ad5ebe129ec5b62d7a3d022c227ea0612c2292673a243c65fc525224025f08001c3b67bdce9853f1
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD5bd032be5afa292fc8ed69763de8eb291
SHA16ed592304dd4a21ef621dd3ff3de57801a7e1c9c
SHA256c4e722f57977f3c8a94cadc754675ddd632db29d038b99bcae4122da7ec4b4cf
SHA51285d43e140ff20a8c084929b4916f7ab23d614280eb5985bbf33e67d1499ef7348f92c44fd6a34b118db1afe3842800075715d7541590724a9efe8258ab688a75
-
Filesize
1.8MB
MD5bd032be5afa292fc8ed69763de8eb291
SHA16ed592304dd4a21ef621dd3ff3de57801a7e1c9c
SHA256c4e722f57977f3c8a94cadc754675ddd632db29d038b99bcae4122da7ec4b4cf
SHA51285d43e140ff20a8c084929b4916f7ab23d614280eb5985bbf33e67d1499ef7348f92c44fd6a34b118db1afe3842800075715d7541590724a9efe8258ab688a75
-
Filesize
1.8MB
MD5a61d93cb359969784417ca1a89a2506e
SHA15b2482b9d9e8b73e0f942f0eedd625afbf6228ef
SHA256c6979072f9d72bad49c18b16e4b6a32ef5353ebdc79037b289f7d2862ceffe98
SHA512b037e4151ea42df8ea0e34ba63b249a4e198ad77384835a774f1fc498387c19306b959370e61ed3996abb37e6f69751c7602b51ae694bd10ba84fd6786cfcbc5
-
Filesize
825KB
MD5a4ee5288ae78c8629786a3ccf46fc18b
SHA146c39400910ff7bc63d70acf449c8b277c6f9e52
SHA256086f04cf10ceed11b8d9467f51f9b1c7ed04c6d021e037800ec67640b83f90d1
SHA5129735efa258edc1cca7bbb779ac433a5b5173e8328816a47715ee86ff45b3edc183932187fc3bec3f5312c880ae921f21d89d9293726193733f0f9cc9781313d8
-
Filesize
825KB
MD5a4ee5288ae78c8629786a3ccf46fc18b
SHA146c39400910ff7bc63d70acf449c8b277c6f9e52
SHA256086f04cf10ceed11b8d9467f51f9b1c7ed04c6d021e037800ec67640b83f90d1
SHA5129735efa258edc1cca7bbb779ac433a5b5173e8328816a47715ee86ff45b3edc183932187fc3bec3f5312c880ae921f21d89d9293726193733f0f9cc9781313d8
-
Filesize
653KB
MD56409a405aa89dd47420089584707e630
SHA16c4f442dd2e9561a7871476e8e1cf2d5316f7b21
SHA25624ff09533f364fe9c84d13bb0bdf4db79432c550c2125185982a138aecbe7f46
SHA5121a3e6c6785c69d11e48a987d2d4c04e7e9c7d7b45cd9eca9b067dbecff20064db8220eec30401560d60042792c02469a52edde46441e6cc1b0d9f6a72d6c0617
-
Filesize
653KB
MD56409a405aa89dd47420089584707e630
SHA16c4f442dd2e9561a7871476e8e1cf2d5316f7b21
SHA25624ff09533f364fe9c84d13bb0bdf4db79432c550c2125185982a138aecbe7f46
SHA5121a3e6c6785c69d11e48a987d2d4c04e7e9c7d7b45cd9eca9b067dbecff20064db8220eec30401560d60042792c02469a52edde46441e6cc1b0d9f6a72d6c0617
-
Filesize
1.8MB
MD5bd032be5afa292fc8ed69763de8eb291
SHA16ed592304dd4a21ef621dd3ff3de57801a7e1c9c
SHA256c4e722f57977f3c8a94cadc754675ddd632db29d038b99bcae4122da7ec4b4cf
SHA51285d43e140ff20a8c084929b4916f7ab23d614280eb5985bbf33e67d1499ef7348f92c44fd6a34b118db1afe3842800075715d7541590724a9efe8258ab688a75
-
Filesize
1.8MB
MD5bd032be5afa292fc8ed69763de8eb291
SHA16ed592304dd4a21ef621dd3ff3de57801a7e1c9c
SHA256c4e722f57977f3c8a94cadc754675ddd632db29d038b99bcae4122da7ec4b4cf
SHA51285d43e140ff20a8c084929b4916f7ab23d614280eb5985bbf33e67d1499ef7348f92c44fd6a34b118db1afe3842800075715d7541590724a9efe8258ab688a75
-
Filesize
1.8MB
MD5bd032be5afa292fc8ed69763de8eb291
SHA16ed592304dd4a21ef621dd3ff3de57801a7e1c9c
SHA256c4e722f57977f3c8a94cadc754675ddd632db29d038b99bcae4122da7ec4b4cf
SHA51285d43e140ff20a8c084929b4916f7ab23d614280eb5985bbf33e67d1499ef7348f92c44fd6a34b118db1afe3842800075715d7541590724a9efe8258ab688a75
-
Filesize
230KB
MD5fc4a21b4451288276fef020274562268
SHA1c184f06c470741252d08c66bebc56fd02daa5c8e
SHA256fb097c1c27b18b5b34209694ad00578c18134ffe7f62cd03420bd5876c8414be
SHA5129f254556b534cc511ea3aaf06e4f0a6f976b87c1d44e5cdd2739a191f5e247c2a69edbf9352616a53bad1e231146f532074cbf28246822d56f3868e43e0eda50
-
Filesize
230KB
MD5fc4a21b4451288276fef020274562268
SHA1c184f06c470741252d08c66bebc56fd02daa5c8e
SHA256fb097c1c27b18b5b34209694ad00578c18134ffe7f62cd03420bd5876c8414be
SHA5129f254556b534cc511ea3aaf06e4f0a6f976b87c1d44e5cdd2739a191f5e247c2a69edbf9352616a53bad1e231146f532074cbf28246822d56f3868e43e0eda50
-
Filesize
227KB
MD569d468f64dc451287c4d2af9e7e1e649
SHA17799b32a7a3c0e8679dade16ff97e60324e8b93c
SHA256e88701f5f2bc931ade631c04c5d2d50e21ba0e64217c022d75b9c38fb132f451
SHA512b8dc99a347a6d4fb7492830221bc89384f44f0f13cb17ef884e6b27e8fa7da5c7dda74bd276f9a3a6ff87373d01a11ed13243cb670cf372955270a558bc6f2bd
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9