Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2023 13:49
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9cexe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9cexe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9cexe_JC.exe
-
Size
1.1MB
-
MD5
9e8e8914c4edc0d0c1419bdbbab56110
-
SHA1
b461b0ff15785db016c24fbeb8f436dfcb73932d
-
SHA256
05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9c
-
SHA512
1dea66c95bec6edee881f41cb8bdbe4297fd8b0954bb0d803d2429410f0ebcb8892103abc7ef7d0a10e7ce33761df259ee059f9cd626ef65748494d0121718a2
-
SSDEEP
24576:/yrwgFn4dBaSprQ28P45T3f2NNzxZ22ErFjFNYG9kUN4O6k7YT:KrwgFn4dBa4rQwG1xZhErbNYR47Y
Malware Config
Extracted
redline
frant
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
redline
magia
77.91.124.55:19071
Extracted
amadey
3.83
http://5.42.65.80/8bmeVwqx/index.php
-
install_dir
207aa4515d
-
install_file
oneetx.exe
-
strings_key
3e634dd0840c68ae2ced83c2be7bf0d4
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
DcRat 3 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeNEAS.05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9cexe_JC.exeschtasks.exepid process 4776 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9cexe_JC.exe 5924 schtasks.exe -
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2064-71-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2064-72-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2064-73-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2064-75-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\72BE.exe healer C:\Users\Admin\AppData\Local\Temp\72BE.exe healer behavioral2/memory/3632-355-0x0000000000E90000-0x0000000000E9A000-memory.dmp healer -
Processes:
72BE.exe1hD97Id0.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 72BE.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1hD97Id0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1hD97Id0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1hD97Id0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1hD97Id0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1hD97Id0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 72BE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1hD97Id0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 72BE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 72BE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 72BE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 72BE.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/4444-84-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral2/memory/3012-365-0x0000000000400000-0x000000000043E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Ek793RU.exe family_redline C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Ek793RU.exe family_redline behavioral2/memory/5244-386-0x0000000000DA0000-0x0000000000DDE000-memory.dmp family_redline behavioral2/memory/4204-418-0x0000000000470000-0x00000000004CA000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7792.exeexplothe.exeoneetx.exe759D.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 7792.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 759D.exe -
Executes dropped EXE 28 IoCs
Processes:
zT9tA25.exekG8dY74.exehv6Vk21.exe1hD97Id0.exe2EL1641.exe3Aq78uT.exe4PS866Ri.exe5Kc2IE7.exe6B48.exedx8EA9Ar.exelQ0Gc4nf.exe6E08.exegI0FE6YH.exeIh3ZH7kq.exe1Vg97KX6.exe7165.exe72BE.exe759D.exe7792.exe7B2D.exe2Ek793RU.exeexplothe.exe84E3.exeoneetx.exeexplothe.exeoneetx.exeexplothe.exeoneetx.exepid process 3784 zT9tA25.exe 1648 kG8dY74.exe 2704 hv6Vk21.exe 3024 1hD97Id0.exe 968 2EL1641.exe 3788 3Aq78uT.exe 1808 4PS866Ri.exe 4044 5Kc2IE7.exe 3136 6B48.exe 924 dx8EA9Ar.exe 4324 lQ0Gc4nf.exe 1216 6E08.exe 4496 gI0FE6YH.exe 1276 Ih3ZH7kq.exe 3868 1Vg97KX6.exe 3392 7165.exe 3632 72BE.exe 2928 759D.exe 4752 7792.exe 4204 7B2D.exe 5244 2Ek793RU.exe 5452 explothe.exe 5552 84E3.exe 5904 oneetx.exe 1016 explothe.exe 5496 oneetx.exe 3384 explothe.exe 3904 oneetx.exe -
Loads dropped DLL 3 IoCs
Processes:
7B2D.exerundll32.exepid process 4204 7B2D.exe 4204 7B2D.exe 4356 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
1hD97Id0.exe72BE.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1hD97Id0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1hD97Id0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 72BE.exe -
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
NEAS.05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9cexe_JC.exehv6Vk21.exedx8EA9Ar.exelQ0Gc4nf.exeIh3ZH7kq.exezT9tA25.exekG8dY74.exe6B48.exegI0FE6YH.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9cexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" hv6Vk21.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dx8EA9Ar.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" lQ0Gc4nf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" Ih3ZH7kq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zT9tA25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kG8dY74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6B48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" gI0FE6YH.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
2EL1641.exe3Aq78uT.exe4PS866Ri.execmd.exe1Vg97KX6.exe7165.exedescription pid process target process PID 968 set thread context of 2064 968 2EL1641.exe AppLaunch.exe PID 3788 set thread context of 2292 3788 3Aq78uT.exe AppLaunch.exe PID 1808 set thread context of 4444 1808 4PS866Ri.exe AppLaunch.exe PID 1216 set thread context of 4188 1216 cmd.exe AppLaunch.exe PID 3868 set thread context of 4896 3868 1Vg97KX6.exe AppLaunch.exe PID 3392 set thread context of 3012 3392 7165.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1392 968 WerFault.exe 2EL1641.exe 1092 2064 WerFault.exe AppLaunch.exe 1784 3788 WerFault.exe 3Aq78uT.exe 1104 1808 WerFault.exe 4PS866Ri.exe 4452 1216 WerFault.exe 6E08.exe 2776 3868 WerFault.exe 1Vg97KX6.exe 4716 4896 WerFault.exe AppLaunch.exe 4712 3392 WerFault.exe 7165.exe 6000 4204 WerFault.exe 7B2D.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
84E3.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 84E3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 84E3.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 5924 schtasks.exe 4776 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1hD97Id0.exeAppLaunch.exemsedge.exemsedge.exemsedge.exepid process 3024 1hD97Id0.exe 3024 1hD97Id0.exe 2292 AppLaunch.exe 2292 AppLaunch.exe 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 5016 msedge.exe 5016 msedge.exe 3160 3160 4232 msedge.exe 4232 msedge.exe 3160 3160 3160 3160 3160 3160 4340 msedge.exe 4340 msedge.exe 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
AppLaunch.exepid process 2292 AppLaunch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
Processes:
1hD97Id0.exe72BE.exe84E3.exedescription pid process Token: SeDebugPrivilege 3024 1hD97Id0.exe Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeDebugPrivilege 3632 72BE.exe Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeShutdownPrivilege 3160 Token: SeCreatePagefilePrivilege 3160 Token: SeDebugPrivilege 5552 84E3.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
msedge.exe7792.exepid process 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4752 7792.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3160 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
NEAS.05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9cexe_JC.exezT9tA25.exekG8dY74.exehv6Vk21.exe2EL1641.exe3Aq78uT.exe4PS866Ri.exe5Kc2IE7.execmd.exemsedge.exemsedge.exedescription pid process target process PID 2208 wrote to memory of 3784 2208 NEAS.05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9cexe_JC.exe zT9tA25.exe PID 2208 wrote to memory of 3784 2208 NEAS.05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9cexe_JC.exe zT9tA25.exe PID 2208 wrote to memory of 3784 2208 NEAS.05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9cexe_JC.exe zT9tA25.exe PID 3784 wrote to memory of 1648 3784 zT9tA25.exe kG8dY74.exe PID 3784 wrote to memory of 1648 3784 zT9tA25.exe kG8dY74.exe PID 3784 wrote to memory of 1648 3784 zT9tA25.exe kG8dY74.exe PID 1648 wrote to memory of 2704 1648 kG8dY74.exe hv6Vk21.exe PID 1648 wrote to memory of 2704 1648 kG8dY74.exe hv6Vk21.exe PID 1648 wrote to memory of 2704 1648 kG8dY74.exe hv6Vk21.exe PID 2704 wrote to memory of 3024 2704 hv6Vk21.exe 1hD97Id0.exe PID 2704 wrote to memory of 3024 2704 hv6Vk21.exe 1hD97Id0.exe PID 2704 wrote to memory of 3024 2704 hv6Vk21.exe 1hD97Id0.exe PID 2704 wrote to memory of 968 2704 hv6Vk21.exe 2EL1641.exe PID 2704 wrote to memory of 968 2704 hv6Vk21.exe 2EL1641.exe PID 2704 wrote to memory of 968 2704 hv6Vk21.exe 2EL1641.exe PID 968 wrote to memory of 2064 968 2EL1641.exe AppLaunch.exe PID 968 wrote to memory of 2064 968 2EL1641.exe AppLaunch.exe PID 968 wrote to memory of 2064 968 2EL1641.exe AppLaunch.exe PID 968 wrote to memory of 2064 968 2EL1641.exe AppLaunch.exe PID 968 wrote to memory of 2064 968 2EL1641.exe AppLaunch.exe PID 968 wrote to memory of 2064 968 2EL1641.exe AppLaunch.exe PID 968 wrote to memory of 2064 968 2EL1641.exe AppLaunch.exe PID 968 wrote to memory of 2064 968 2EL1641.exe AppLaunch.exe PID 968 wrote to memory of 2064 968 2EL1641.exe AppLaunch.exe PID 968 wrote to memory of 2064 968 2EL1641.exe AppLaunch.exe PID 1648 wrote to memory of 3788 1648 kG8dY74.exe 3Aq78uT.exe PID 1648 wrote to memory of 3788 1648 kG8dY74.exe 3Aq78uT.exe PID 1648 wrote to memory of 3788 1648 kG8dY74.exe 3Aq78uT.exe PID 3788 wrote to memory of 2292 3788 3Aq78uT.exe AppLaunch.exe PID 3788 wrote to memory of 2292 3788 3Aq78uT.exe AppLaunch.exe PID 3788 wrote to memory of 2292 3788 3Aq78uT.exe AppLaunch.exe PID 3788 wrote to memory of 2292 3788 3Aq78uT.exe AppLaunch.exe PID 3788 wrote to memory of 2292 3788 3Aq78uT.exe AppLaunch.exe PID 3788 wrote to memory of 2292 3788 3Aq78uT.exe AppLaunch.exe PID 3784 wrote to memory of 1808 3784 zT9tA25.exe 4PS866Ri.exe PID 3784 wrote to memory of 1808 3784 zT9tA25.exe 4PS866Ri.exe PID 3784 wrote to memory of 1808 3784 zT9tA25.exe 4PS866Ri.exe PID 1808 wrote to memory of 5072 1808 4PS866Ri.exe AppLaunch.exe PID 1808 wrote to memory of 5072 1808 4PS866Ri.exe AppLaunch.exe PID 1808 wrote to memory of 5072 1808 4PS866Ri.exe AppLaunch.exe PID 1808 wrote to memory of 4444 1808 4PS866Ri.exe AppLaunch.exe PID 1808 wrote to memory of 4444 1808 4PS866Ri.exe AppLaunch.exe PID 1808 wrote to memory of 4444 1808 4PS866Ri.exe AppLaunch.exe PID 1808 wrote to memory of 4444 1808 4PS866Ri.exe AppLaunch.exe PID 1808 wrote to memory of 4444 1808 4PS866Ri.exe AppLaunch.exe PID 1808 wrote to memory of 4444 1808 4PS866Ri.exe AppLaunch.exe PID 1808 wrote to memory of 4444 1808 4PS866Ri.exe AppLaunch.exe PID 1808 wrote to memory of 4444 1808 4PS866Ri.exe AppLaunch.exe PID 2208 wrote to memory of 4044 2208 NEAS.05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9cexe_JC.exe 5Kc2IE7.exe PID 2208 wrote to memory of 4044 2208 NEAS.05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9cexe_JC.exe 5Kc2IE7.exe PID 2208 wrote to memory of 4044 2208 NEAS.05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9cexe_JC.exe 5Kc2IE7.exe PID 4044 wrote to memory of 3416 4044 5Kc2IE7.exe cmd.exe PID 4044 wrote to memory of 3416 4044 5Kc2IE7.exe cmd.exe PID 3416 wrote to memory of 2080 3416 cmd.exe msedge.exe PID 3416 wrote to memory of 2080 3416 cmd.exe msedge.exe PID 3416 wrote to memory of 4340 3416 cmd.exe msedge.exe PID 3416 wrote to memory of 4340 3416 cmd.exe msedge.exe PID 4340 wrote to memory of 1332 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 1332 4340 msedge.exe msedge.exe PID 2080 wrote to memory of 320 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 320 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 2524 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 2524 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 2524 2080 msedge.exe msedge.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9cexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.05daa945e702ff519d4af6f3cfafdf2a2dfefa71a07f113967f85bdb34778a9cexe_JC.exe"1⤵
- DcRat
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zT9tA25.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zT9tA25.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kG8dY74.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kG8dY74.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hv6Vk21.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hv6Vk21.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1hD97Id0.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1hD97Id0.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2EL1641.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2EL1641.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 5407⤵
- Program crash
PID:1092
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 968 -s 5966⤵
- Program crash
PID:1392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Aq78uT.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Aq78uT.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 2245⤵
- Program crash
PID:1784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4PS866Ri.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4PS866Ri.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:5072
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 6084⤵
- Program crash
PID:1104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Kc2IE7.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Kc2IE7.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\147D.tmp\147E.tmp\147F.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Kc2IE7.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffad35746f8,0x7ffad3574708,0x7ffad35747185⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,18092219302716752953,10734115858797061254,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:25⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,18092219302716752953,10734115858797061254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffad35746f8,0x7ffad3574708,0x7ffad35747185⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2260,16909810527448079092,17350725249940892653,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2284 /prefetch:25⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2260,16909810527448079092,17350725249940892653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2260,16909810527448079092,17350725249940892653,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:85⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,16909810527448079092,17350725249940892653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:15⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,16909810527448079092,17350725249940892653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:15⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,16909810527448079092,17350725249940892653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3848 /prefetch:15⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2260,16909810527448079092,17350725249940892653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:85⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2260,16909810527448079092,17350725249940892653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:85⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,16909810527448079092,17350725249940892653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:15⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,16909810527448079092,17350725249940892653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:15⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,16909810527448079092,17350725249940892653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:15⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,16909810527448079092,17350725249940892653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:15⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,16909810527448079092,17350725249940892653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:15⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,16909810527448079092,17350725249940892653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:15⤵PID:1876
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 968 -ip 9681⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 124 -p 2064 -ip 20641⤵PID:4304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3788 -ip 37881⤵PID:2032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1808 -ip 18081⤵PID:848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\6B48.exeC:\Users\Admin\AppData\Local\Temp\6B48.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dx8EA9Ar.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dx8EA9Ar.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:924 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lQ0Gc4nf.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lQ0Gc4nf.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\gI0FE6YH.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\gI0FE6YH.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Ih3ZH7kq.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Ih3ZH7kq.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1Vg97KX6.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1Vg97KX6.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 5408⤵
- Program crash
PID:4716
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 5687⤵
- Program crash
PID:2776
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Ek793RU.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Ek793RU.exe6⤵
- Executes dropped EXE
PID:5244
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6E08.exeC:\Users\Admin\AppData\Local\Temp\6E08.exe1⤵
- Executes dropped EXE
PID:1216 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 3322⤵
- Program crash
PID:4452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6EF3.bat" "1⤵PID:2556
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login2⤵PID:2036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad35746f8,0x7ffad3574708,0x7ffad35747183⤵PID:3096
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵PID:5944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad35746f8,0x7ffad3574708,0x7ffad35747183⤵PID:5992
-
-
-
C:\Users\Admin\AppData\Local\Temp\7165.exeC:\Users\Admin\AppData\Local\Temp\7165.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3392 -s 4162⤵
- Program crash
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1216 -ip 12161⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\72BE.exeC:\Users\Admin\AppData\Local\Temp\72BE.exe1⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3868 -ip 38681⤵PID:2012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4896 -ip 48961⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\759D.exeC:\Users\Admin\AppData\Local\Temp\759D.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5452 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F3⤵
- DcRat
- Creates scheduled task(s)
PID:5924
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵PID:5976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5208
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"4⤵PID:2168
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E4⤵PID:5460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5424
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:5444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:5512
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:4356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3392 -ip 33921⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\7792.exeC:\Users\Admin\AppData\Local\Temp\7792.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5904 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F3⤵
- DcRat
- Creates scheduled task(s)
PID:4776
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of SetThreadContext
PID:1216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5372
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:5332
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:5400
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"4⤵PID:5596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5560
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E4⤵PID:5584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7B2D.exeC:\Users\Admin\AppData\Local\Temp\7B2D.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 7842⤵
- Program crash
PID:6000
-
-
C:\Users\Admin\AppData\Local\Temp\84E3.exeC:\Users\Admin\AppData\Local\Temp\84E3.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:5552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4204 -ip 42041⤵PID:5840
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1016
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:5496
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3384
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:3904
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56e522816dd3ad553a904ae25ab08b342
SHA1eefc3e358c419dd51735fc481835f913223acca9
SHA256c67dfa7ff5306d4ee9fb92a0af9bbc5ca5cdc264d080d86945d40083b651914b
SHA512a6a97c90fddf5dc2054427239d5b722b6bd8d385fdf0f2f80a38c89384b3c1b71b4fec83b6e4ea627d5813b8327f98dc909db0ecb42dac0ec637fc9a35a0e089
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
Filesize
152B
MD5451fddf78747a5a4ebf64cabb4ac94e7
SHA16925bd970418494447d800e213bfd85368ac8dc9
SHA25664d12f59d409aa1b03f0b2924e0b2419b65c231de9e04fce15cc3a76e1b9894d
SHA512edb85a2a94c207815360820731d55f6b4710161551c74008df0c2ae10596e1886c8a9e11d43ddf121878ae35ac9f06fc66b4c325b01ed4e7bf4d3841b27e0864
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD52dd06007aa45844885be002b7d4571c0
SHA1b4bc848d14fcb48e83fc7685900f4e28f0ad79d4
SHA256b136e625d6ffc2f8bab03122982d05212df9f281a65338fe8385a8cd5089a3ce
SHA512fef0ab7c83f6094631f5cc9368e737bc6e74860e9d8547f8b99866625a038e14cf5571d9b9903207f84c7085923d4b64fe8ba01845b23e1def4d9edfe5a699aa
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD528e6d1a553c32558e87f9509c92e1e50
SHA1830e152d178dd85252eba37a8a680ed44b0961d1
SHA256b8c204f04858a2c4b052fc7323e5df98ec44b9ec0fad2ad0b0bdc0a315431d70
SHA5127a9984cd3fd670bee61cc7f180fcb443c838744048d01eb092fe378fce4dd1a5675b46c4a9ac14b8847b310266946d0825305a6dd76e30a496694bcf67e0de22
-
Filesize
6KB
MD5561e22571e88f0dd55e27b678654d9e8
SHA16edb83a793914f1fd834e832ea8d131cd70a81ed
SHA256e0fc190c989e89e185ede31c4395a14268a3480cc5e3627ff72907911dcb1dac
SHA512d93c2a590c2b399811876860d20db28a6c7d6933ab0b030e1d3e0428a1991955b012127b5ae1f9647c2919d5f1ba0b6bdb8ba15876b749ef3a1021c4f7348535
-
Filesize
6KB
MD53862f1f7fd7a6c5571ab1780b9af3e75
SHA13497f0c3c9a8cc4ecff80314db1703dc30e1f8e5
SHA2567e363c12c00a79f2610a4655ae46bfed6ea4f9a7fba81a6897d3957a1476072d
SHA512cc5813b8660225abffe168b9fb0935650bc193eefeef26b4aee77b83327e60f91fe951a5f84145d61499e860b7657544c7d4079b8f559cd2e577044dc2ca4f31
-
Filesize
5KB
MD5e74f3d7bd430f9571e51d44ae45158ff
SHA107ea924fc481b1bbe6c5e662a94b469fc791944c
SHA256be33809422169b82e631a29c903059645de555be686f169dedb18f9ceb75dfa3
SHA512abe799ea6f3c18f10bdb966d38372cd8e1cc3a5497eb85f6a4081def2228f8cd6a36be93cbe00f844065af67123485efa98c468abb83e444b73485623b84e792
-
Filesize
24KB
MD5d985875547ce8936a14b00d1e571365f
SHA1040d8e5bd318357941fca03b49f66a1470824cb3
SHA2568455a012296a7f4b10ade39e1300cda1b04fd0fc1832ffc043e66f48c6aecfbf
SHA512ca31d3d6c44d52a1f817731da2e7ac98402cd19eeb4b48906950a2f22f961c8b1f665c3eaa62bf73cd44eb94ea377f7e2ceff9ef682a543771344dab9dbf5a38
-
Filesize
872B
MD519e79ddf5562656160a2ff76c0e6905f
SHA11398f0bbb7dc482c77887db3ac71d90b60e42605
SHA256303cd49a54e596fead98fa25c3b79dd3dc553a1795732e45f2a96ac4ebce449e
SHA512697b0f5fdc96eb520cddfcb3971a1cada529d5fd7aca7b128c17dca4b2f839d38ff86d0cf6d83baf934ace908167e0094494205f074c09990996d66e9e04c729
-
Filesize
872B
MD5c7ec93fd3a897f0a3404ce60e17d60f8
SHA1974eca858e6a19fc22a510d07aabf584d434818b
SHA256ed4e71ce0415d40f1514e8bea74ebcfcd34a60fac83ef5a836dcca1df270a26f
SHA512f463dd20c4fc89161331d1d2af3f464b5126de3f93b26457749f3a6b3ddac95dd9277d97f64fb921968b7257a7e659d016be79b872858bdd94c38787930e5a54
-
Filesize
856B
MD5d3c30034b240683300f6b38f433b7785
SHA15f18ee2274af902a64b7f43df4b15db3dbe4e2e0
SHA25645ec5b8f2d9b22d4cc65941258ec5e9d6843d5f4325812d002669107a3448b40
SHA51297148c8829eb788821b1d9c7626c99dc74c270c85b2a857d598536fea081617158e4196a0ffba6dcbd87fb05394a7151becb5c45946bcbabace47f6895172a3b
-
Filesize
872B
MD5acff6e5c106b5cfe705b2430c574d0d6
SHA1983071df14ffd98bda91673ea46f20e872c327a6
SHA256426290382dc11baeda21a47565cb474f14a0ffd43c1e8fe9eaab1e912f0f98d5
SHA512ee793c7162398380814f9a0c4ea235d5418b01ffdf69bd4ccdbe45ff2ecd8a95210b5f49fd386a09b22a4392ba8b335aa91a558380b4514313da9a7cf8b72cf5
-
Filesize
872B
MD5a0e38046a9462d6f78310d4fefdf2ded
SHA1b04f6493ba419b4d39b6d911aecd481bd570286b
SHA256428ac8cf993730a1339f9254af98c79a2b47e00b40a725a68b31d1c7eddf2026
SHA5124899d8a87340f807e89f48f9650e2d5aa39ef14dc66d2a25680e81720ecf1e9cf8c3381316485d8c107e7ab0c7835e83e352f41ab919f0182ef5d284d039ccc1
-
Filesize
852B
MD50d297f2d3a3487e1f93942ed41a6927e
SHA178ed0da093ccf818ac1baa540b5b20a5a5f45934
SHA2561b31880240a048635300d086621b67897ee590b26d3a597a9867348ecc9fff1b
SHA512f540df2a6c0375b6f82c354be6b0a1e3acda44b1926c2d1746df946d4ce9457de6228abb8f2d9cba41fbd232948cc91275ef99db27ddc530013292e8196c4e34
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b23ea71d936d63afb8ee775fb97d5900
SHA13b3574aa1e4547d7b2c519f47c23180b2ab5e356
SHA2567ac6c95f3367dbe25eb0af520e82e0fba12bad08da093e6889b48a774ae2462a
SHA51283c728bce050ab0ad03123c481874d8ac5cbb6a13dd5c42653ac1a433f3c3801754bb130a65b3d1045eb6ed6f7e8631d9700ed6a61b698e275a272ce88d08d97
-
Filesize
2KB
MD56e522816dd3ad553a904ae25ab08b342
SHA1eefc3e358c419dd51735fc481835f913223acca9
SHA256c67dfa7ff5306d4ee9fb92a0af9bbc5ca5cdc264d080d86945d40083b651914b
SHA512a6a97c90fddf5dc2054427239d5b722b6bd8d385fdf0f2f80a38c89384b3c1b71b4fec83b6e4ea627d5813b8327f98dc909db0ecb42dac0ec637fc9a35a0e089
-
Filesize
90B
MD55a115a88ca30a9f57fdbb545490c2043
SHA167e90f37fc4c1ada2745052c612818588a5595f4
SHA25652c4113e7f308faa933ae6e8ff5d1b955ba62d1edac0eb7c972caa26e1ae4e2d
SHA51217c399dad7b7343d5b16156e4d83de78ff5755d12add358bd2987ed4216dd13d24cfec9ecdb92d9d6723bb1d20d8874c0bad969dbec69eed95beb7a2817eb4fe
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
1.2MB
MD57e7e78b783e74c07caa452d7267f1795
SHA19e6115548794070cf7d40c06eb4af1e7a4b8c841
SHA256549f6a72129b20bdac9c5da0216e2ac8cca8df2ea97b98cce785bbd723bb30a1
SHA5121d331af19ff16faa2bf2b85784bf0582871f0c69129b0ca5c4f4b7c80462d8d4ed19ce9aa148d41224815c6c9a20987c251f647c777362ac95505991613325b0
-
Filesize
1.2MB
MD57e7e78b783e74c07caa452d7267f1795
SHA19e6115548794070cf7d40c06eb4af1e7a4b8c841
SHA256549f6a72129b20bdac9c5da0216e2ac8cca8df2ea97b98cce785bbd723bb30a1
SHA5121d331af19ff16faa2bf2b85784bf0582871f0c69129b0ca5c4f4b7c80462d8d4ed19ce9aa148d41224815c6c9a20987c251f647c777362ac95505991613325b0
-
Filesize
423KB
MD54dbbaf9a246f547cd915068db2de46ae
SHA13458d6eb7be8933ebfaed9a0a85c6013bdeb3a3a
SHA2560747f7acce7597a599c00e56ea8af7e38cb400d186027ad9ed680fdf5100ac76
SHA5123b8afb5367aae7069a703a8a6eea0ecb09c4f89ab39864eec843a9d52ffa5f34fbc99abe2d348326d7b72d874ecf1a9c2c0cbb3e3d60dda5c13ab746f028cc16
-
Filesize
423KB
MD54dbbaf9a246f547cd915068db2de46ae
SHA13458d6eb7be8933ebfaed9a0a85c6013bdeb3a3a
SHA2560747f7acce7597a599c00e56ea8af7e38cb400d186027ad9ed680fdf5100ac76
SHA5123b8afb5367aae7069a703a8a6eea0ecb09c4f89ab39864eec843a9d52ffa5f34fbc99abe2d348326d7b72d874ecf1a9c2c0cbb3e3d60dda5c13ab746f028cc16
-
Filesize
79B
MD5403991c4d18ac84521ba17f264fa79f2
SHA1850cc068de0963854b0fe8f485d951072474fd45
SHA256ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576
-
Filesize
462KB
MD56b8cb97fbcec8840760fc4ce004b93df
SHA17c5706dba135e6c649b2ea61597c6d26ea94e391
SHA2569585dfc7aba19b218268425d3f0f4949111f391d8b5babc33ca79d2e961f0825
SHA512bd6c87b238285f6f78154c70d02314e57aecea0f92ad4973070e78108e8e93e1eb2a94f5dfbf9857015015adae87e9104c96186bf66caf7d925d652ab9df5fdb
-
Filesize
462KB
MD56b8cb97fbcec8840760fc4ce004b93df
SHA17c5706dba135e6c649b2ea61597c6d26ea94e391
SHA2569585dfc7aba19b218268425d3f0f4949111f391d8b5babc33ca79d2e961f0825
SHA512bd6c87b238285f6f78154c70d02314e57aecea0f92ad4973070e78108e8e93e1eb2a94f5dfbf9857015015adae87e9104c96186bf66caf7d925d652ab9df5fdb
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
425KB
MD59cad4182d25b774ed3d69305a84f0d14
SHA14cffee5301b04894df53c50b54684e24619d7dd2
SHA256b15e8f35b848a0cb272a4d480235baec025dab7887409c0551ba810e3a15f7fd
SHA512565100515fb2a0af94bbb5abdfa3c486492c03650d622df57ea52a7fb63411664e6a9f4b5d5abfc19a5d859a9d109369da608733553f039905a2ddcf9f7063f2
-
Filesize
425KB
MD59cad4182d25b774ed3d69305a84f0d14
SHA14cffee5301b04894df53c50b54684e24619d7dd2
SHA256b15e8f35b848a0cb272a4d480235baec025dab7887409c0551ba810e3a15f7fd
SHA512565100515fb2a0af94bbb5abdfa3c486492c03650d622df57ea52a7fb63411664e6a9f4b5d5abfc19a5d859a9d109369da608733553f039905a2ddcf9f7063f2
-
Filesize
101KB
MD5d5cfb6297ad2b53b3ed3653abfd3d082
SHA1007684f1987f22e2450040b956f0c3543f5c04d4
SHA2560c1e7a5f2df6eebcbb23f5b657d0076942e45b5ade3c7c2d15bdfdf93bf2f38f
SHA512d818c90d08c5131fac594c85ae61d434bcf6341c1c160421efa6169ee09cff737bcd0a124d9064c9a307130b8a1b2958136a89e63f3c826bbdad267718b0bd9e
-
Filesize
101KB
MD5d5cfb6297ad2b53b3ed3653abfd3d082
SHA1007684f1987f22e2450040b956f0c3543f5c04d4
SHA2560c1e7a5f2df6eebcbb23f5b657d0076942e45b5ade3c7c2d15bdfdf93bf2f38f
SHA512d818c90d08c5131fac594c85ae61d434bcf6341c1c160421efa6169ee09cff737bcd0a124d9064c9a307130b8a1b2958136a89e63f3c826bbdad267718b0bd9e
-
Filesize
1.1MB
MD52be201cc19d06e1c24efeb33b553d754
SHA1b21d41d8f0936069e8a48b7f2b0c7b1de2cccb6a
SHA256291df407c235494894f9e4d5d144bdc1a75f03555428b5534dd412151eaa2098
SHA512a9c11c7d84f40a951fbb86a628afcd0769dd82dc7956ae0173f42cf2cf002c7d24bc42a6e1281626d32df711269d31733ca315b3c95328e739d99a7f036d81a6
-
Filesize
1.1MB
MD52be201cc19d06e1c24efeb33b553d754
SHA1b21d41d8f0936069e8a48b7f2b0c7b1de2cccb6a
SHA256291df407c235494894f9e4d5d144bdc1a75f03555428b5534dd412151eaa2098
SHA512a9c11c7d84f40a951fbb86a628afcd0769dd82dc7956ae0173f42cf2cf002c7d24bc42a6e1281626d32df711269d31733ca315b3c95328e739d99a7f036d81a6
-
Filesize
991KB
MD5e034091396f5a324831a34ade6cf7de9
SHA1455d138fc20e9ce10668538084b85746e72cbab9
SHA25688f2ac03962f69490a20bbafed39bd74d5b0aa6168184c0db2a5d015eb6ab788
SHA5125964b80ab12893b5c510990d158fe82a411edfa3e9da9c3e15776384931a6e10d31cbce93f8e29eaa98d0d5d53d1d704b2c76fa5500f0aa8e40c9eb8f550246c
-
Filesize
991KB
MD5e034091396f5a324831a34ade6cf7de9
SHA1455d138fc20e9ce10668538084b85746e72cbab9
SHA25688f2ac03962f69490a20bbafed39bd74d5b0aa6168184c0db2a5d015eb6ab788
SHA5125964b80ab12893b5c510990d158fe82a411edfa3e9da9c3e15776384931a6e10d31cbce93f8e29eaa98d0d5d53d1d704b2c76fa5500f0aa8e40c9eb8f550246c
-
Filesize
459KB
MD5c004f3fd7139c8239325b8ae59cb5ac8
SHA1bc424207374286725d6c4f4de323b2f2697e36ee
SHA25638e3021df377a1647361b991ad118c666309d103bd6b93e2eea7e9e7f9eace7e
SHA512c411dd1ef65b9135b0de7a80f128d1cba29644fde2ce72f11da44942b14c7da07d15af046f9e19dd32a11498a6a21fa83e7d018f0c24020984dbba6003e10d02
-
Filesize
459KB
MD5c004f3fd7139c8239325b8ae59cb5ac8
SHA1bc424207374286725d6c4f4de323b2f2697e36ee
SHA25638e3021df377a1647361b991ad118c666309d103bd6b93e2eea7e9e7f9eace7e
SHA512c411dd1ef65b9135b0de7a80f128d1cba29644fde2ce72f11da44942b14c7da07d15af046f9e19dd32a11498a6a21fa83e7d018f0c24020984dbba6003e10d02
-
Filesize
696KB
MD5892e45be1fa1331195d676bc278406b1
SHA1d9da35aeb223fce897155147e9c3c48db3107a8b
SHA256c7f21d8d8981fe92c303c3a4cdf6758c70c148442e10c424a4d407404ee21c6f
SHA512652820b46ad147b2a73f958416785b6575263ac5eda175093a9622428aabf54ba0aa61f4c50de7b2b700b428f9976aad1c8552d50319ebaeb5b9298d6d852e69
-
Filesize
696KB
MD5892e45be1fa1331195d676bc278406b1
SHA1d9da35aeb223fce897155147e9c3c48db3107a8b
SHA256c7f21d8d8981fe92c303c3a4cdf6758c70c148442e10c424a4d407404ee21c6f
SHA512652820b46ad147b2a73f958416785b6575263ac5eda175093a9622428aabf54ba0aa61f4c50de7b2b700b428f9976aad1c8552d50319ebaeb5b9298d6d852e69
-
Filesize
268KB
MD5abc62b75143eeafa884a3fca33990710
SHA17ead255bff5b3379473aa4dfd329be107aac7a70
SHA256e565ae93a1df3e0937fc60e0c25567744fc64508290408dc0fa5c0ab32824104
SHA512c722d8b3faf528ace3a4232e529470786e76ed7e898f590419726162237553fb1541f346515a461b0e4d0d34eff3232a8408af671c49d177889848ce72ff5fe4
-
Filesize
268KB
MD5abc62b75143eeafa884a3fca33990710
SHA17ead255bff5b3379473aa4dfd329be107aac7a70
SHA256e565ae93a1df3e0937fc60e0c25567744fc64508290408dc0fa5c0ab32824104
SHA512c722d8b3faf528ace3a4232e529470786e76ed7e898f590419726162237553fb1541f346515a461b0e4d0d34eff3232a8408af671c49d177889848ce72ff5fe4
-
Filesize
452KB
MD5bf6df26e9267bcccfc46604c526f4973
SHA1bbfd87e7214ef070967b7c5da530ee6e91055930
SHA256fc550069d79b3f6468d2c9567ac329b2337d2c78099167b54bcc69a723f1e578
SHA512cf48e1dbad6c7f0aab83ab489166f461094260070b5539b38d244a35fe905da902e92059fc796ae2c7c59dabcd854e33070d0c054497ed94341c9ad59cfc6411
-
Filesize
452KB
MD5bf6df26e9267bcccfc46604c526f4973
SHA1bbfd87e7214ef070967b7c5da530ee6e91055930
SHA256fc550069d79b3f6468d2c9567ac329b2337d2c78099167b54bcc69a723f1e578
SHA512cf48e1dbad6c7f0aab83ab489166f461094260070b5539b38d244a35fe905da902e92059fc796ae2c7c59dabcd854e33070d0c054497ed94341c9ad59cfc6411
-
Filesize
938KB
MD546d754ae3792ce6c69c693e9f16efc25
SHA10b6a1b79e541d3be8739c366e4357263563a4f5e
SHA2566fbe299d79da1ee1fc8c7fa367d176d5d8deb0e536957331c716960aebcaaedb
SHA51242def663d62fa5919a77f75930a115e3e31ac258c6570ed53d7768db58f71972b1ffe3542608dbc5143ef686907504e237623372eeef74a84db9969f7ba588f1
-
Filesize
938KB
MD546d754ae3792ce6c69c693e9f16efc25
SHA10b6a1b79e541d3be8739c366e4357263563a4f5e
SHA2566fbe299d79da1ee1fc8c7fa367d176d5d8deb0e536957331c716960aebcaaedb
SHA51242def663d62fa5919a77f75930a115e3e31ac258c6570ed53d7768db58f71972b1ffe3542608dbc5143ef686907504e237623372eeef74a84db9969f7ba588f1
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
378KB
MD584eb9f7a93e19143a2bdca9e40d96389
SHA186af362c1e699881a7307126516c1ab7092754e4
SHA2565d0f3fa2ca794f5b5c474cfdeaffb4bad8f5b1cd69bcb09de406133a3ae4712d
SHA5121f9d402810705cc2dd5a32073c104330c986ed68a877c83ab4b323577950f6bcc3695c0fabd349b722348d55a959a45cc88a1a52b9a34c2378ae09f25821bffa
-
Filesize
378KB
MD584eb9f7a93e19143a2bdca9e40d96389
SHA186af362c1e699881a7307126516c1ab7092754e4
SHA2565d0f3fa2ca794f5b5c474cfdeaffb4bad8f5b1cd69bcb09de406133a3ae4712d
SHA5121f9d402810705cc2dd5a32073c104330c986ed68a877c83ab4b323577950f6bcc3695c0fabd349b722348d55a959a45cc88a1a52b9a34c2378ae09f25821bffa
-
Filesize
641KB
MD5dc94695c9c0751b8716dc72fb7d9e396
SHA182208fd7a3350e0564c5af783eca58a16d363513
SHA256e49824faf5284d0bee9cb067cae419f4f58c33fe501776ad38b7937e3114d711
SHA5123e81769f37a337a073d4362bb0a17c88041cd6b264830f1598e3b29eff5debf11a3b6a62ff0bced973cd42df6ce01a86c905382e7d2b813d6cf21962f36d6ab4
-
Filesize
641KB
MD5dc94695c9c0751b8716dc72fb7d9e396
SHA182208fd7a3350e0564c5af783eca58a16d363513
SHA256e49824faf5284d0bee9cb067cae419f4f58c33fe501776ad38b7937e3114d711
SHA5123e81769f37a337a073d4362bb0a17c88041cd6b264830f1598e3b29eff5debf11a3b6a62ff0bced973cd42df6ce01a86c905382e7d2b813d6cf21962f36d6ab4
-
Filesize
444KB
MD5c8712f0fac21d3ea867c56593346b9ae
SHA172473322f33587d7dbd2b2ed4f550f793e573d00
SHA256a439f4c3e3a7304825c3b6c94054c6e98c01870a7de8a9936ff302bfde0d7acf
SHA512f4c099c8fc3162cd4ad9e2fcf376ae184921f8f05f9304db9b76491a47303eddb7790ea1d74f62fe2d1de0fb66084f5f8368ac3151eac33811d9e088a0373a18
-
Filesize
444KB
MD5c8712f0fac21d3ea867c56593346b9ae
SHA172473322f33587d7dbd2b2ed4f550f793e573d00
SHA256a439f4c3e3a7304825c3b6c94054c6e98c01870a7de8a9936ff302bfde0d7acf
SHA512f4c099c8fc3162cd4ad9e2fcf376ae184921f8f05f9304db9b76491a47303eddb7790ea1d74f62fe2d1de0fb66084f5f8368ac3151eac33811d9e088a0373a18
-
Filesize
423KB
MD54c2bad1fd96c888ce1fe27e206e3f656
SHA19daab8534f7de7bb43472fc9c9672da31567fa0e
SHA256e6f399a2b4b56b0bd7a9402e01ff13554fbae7195df6ec1e6faeafdc04f72537
SHA5127174cba5194c8ea273d0ff3dce0a426eecb0ac86b4ad8defb1b5f29ad33f9f55a7fbb9d0ded82dfdcb2846963aabc8a23ad319568b6a379fdd27715fd4071976
-
Filesize
423KB
MD54c2bad1fd96c888ce1fe27e206e3f656
SHA19daab8534f7de7bb43472fc9c9672da31567fa0e
SHA256e6f399a2b4b56b0bd7a9402e01ff13554fbae7195df6ec1e6faeafdc04f72537
SHA5127174cba5194c8ea273d0ff3dce0a426eecb0ac86b4ad8defb1b5f29ad33f9f55a7fbb9d0ded82dfdcb2846963aabc8a23ad319568b6a379fdd27715fd4071976
-
Filesize
221KB
MD5e1dd4ed0d2aa7e6d6c34ca64955fb83c
SHA10dca35a0adfc985ec29ecbf75d7ceeb0080b5819
SHA256100fa8f9d9c14758ccd62fcae7de42734d1bcba93752427126edf852dda7e0f2
SHA512563e41811b2cf7a28a439806d0f9848914061645d3776d12247f9f8478a859215d82932227223dace944e1eb96b6958ad8879461add8bfa37b643fbeb2be0b20
-
Filesize
221KB
MD5e1dd4ed0d2aa7e6d6c34ca64955fb83c
SHA10dca35a0adfc985ec29ecbf75d7ceeb0080b5819
SHA256100fa8f9d9c14758ccd62fcae7de42734d1bcba93752427126edf852dda7e0f2
SHA512563e41811b2cf7a28a439806d0f9848914061645d3776d12247f9f8478a859215d82932227223dace944e1eb96b6958ad8879461add8bfa37b643fbeb2be0b20
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e