Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2023 16:45
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46exe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46exe_JC.exe
-
Size
1.1MB
-
MD5
24e0da23f3e5700f63f73c5acb5c16e6
-
SHA1
1c6446e2e7fe531be7cc578f0cc530d356aeea30
-
SHA256
d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46
-
SHA512
2bc72673cb6121faaed63160fce0731a41e2de2b8018fd2dedb0e25ed824a312084be91be3ed8c9f550452e3b6314f80ddeac7f4f9867551cf65ed65e4b0b3eb
-
SSDEEP
24576:3ysGgmsOwA74klKPoGwYDvKZkVe2onAykcwCwg:CsGgpOwA74klX/YDi0e2oBw
Malware Config
Extracted
redline
frant
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
magia
77.91.124.55:19071
Extracted
redline
lutyr
77.91.124.55:19071
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
amadey
3.83
http://5.42.65.80/8bmeVwqx/index.php
-
install_dir
207aa4515d
-
install_file
oneetx.exe
-
strings_key
3e634dd0840c68ae2ced83c2be7bf0d4
Signatures
-
DcRat 3 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
NEAS.d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46exe_JC.exeschtasks.exeschtasks.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46exe_JC.exe 5160 schtasks.exe 5200 schtasks.exe -
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4488-68-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4488-69-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4488-70-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4488-72-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\15F8.exe healer C:\Users\Admin\AppData\Local\Temp\15F8.exe healer behavioral2/memory/5336-367-0x0000000000280000-0x000000000028A000-memory.dmp healer -
Processes:
15F8.exe1xS40Qe3.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 15F8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 15F8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 15F8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 15F8.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1xS40Qe3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1xS40Qe3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1xS40Qe3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1xS40Qe3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 15F8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1xS40Qe3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1xS40Qe3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 15F8.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/5116-81-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral2/memory/5420-369-0x0000000000400000-0x000000000043E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2pP877hY.exe family_redline C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2pP877hY.exe family_redline behavioral2/memory/5500-381-0x00000000007F0000-0x000000000082E000-memory.dmp family_redline behavioral2/memory/5176-472-0x0000000000540000-0x000000000059A000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
oneetx.exe185A.exeexplothe.exe1BF5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation 185A.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation 1BF5.exe -
Executes dropped EXE 27 IoCs
Processes:
mB2UI65.exeTu0uN89.exebB3fW99.exe1xS40Qe3.exe2Xa8634.exe3Oz04Ro.exe4Xb601Xq.exe5dI3Mf8.exeD49.exenV0fk3qA.exeHy5nJ9bV.exeQf6uQ8Mx.exe1096.exebO9zE8So.exe1UO63Hw6.exe150D.exe15F8.exe2pP877hY.exe185A.exe1BF5.exeexplothe.exe21F2.exeoneetx.exeexplothe.exeoneetx.exeexplothe.exeoneetx.exepid process 3664 mB2UI65.exe 2208 Tu0uN89.exe 2960 bB3fW99.exe 1636 1xS40Qe3.exe 4776 2Xa8634.exe 3520 3Oz04Ro.exe 840 4Xb601Xq.exe 4956 5dI3Mf8.exe 4668 D49.exe 2788 nV0fk3qA.exe 2204 Hy5nJ9bV.exe 3508 Qf6uQ8Mx.exe 4556 1096.exe 2528 bO9zE8So.exe 2776 1UO63Hw6.exe 5252 150D.exe 5336 15F8.exe 5500 2pP877hY.exe 5520 185A.exe 5732 1BF5.exe 5832 explothe.exe 5176 21F2.exe 5240 oneetx.exe 228 explothe.exe 3764 oneetx.exe 2984 explothe.exe 2568 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 5432 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
1xS40Qe3.exe15F8.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1xS40Qe3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1xS40Qe3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 15F8.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
Hy5nJ9bV.exeQf6uQ8Mx.exebO9zE8So.exeNEAS.d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46exe_JC.exenV0fk3qA.exebB3fW99.exeD49.exemB2UI65.exeTu0uN89.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Hy5nJ9bV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Qf6uQ8Mx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" bO9zE8So.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" nV0fk3qA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" bB3fW99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" D49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" mB2UI65.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Tu0uN89.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 6 IoCs
Processes:
2Xa8634.exe3Oz04Ro.exe4Xb601Xq.exe1096.exe1UO63Hw6.exe150D.exedescription pid process target process PID 4776 set thread context of 4488 4776 2Xa8634.exe AppLaunch.exe PID 3520 set thread context of 4616 3520 3Oz04Ro.exe AppLaunch.exe PID 840 set thread context of 5116 840 4Xb601Xq.exe AppLaunch.exe PID 4556 set thread context of 1364 4556 1096.exe AppLaunch.exe PID 2776 set thread context of 5000 2776 1UO63Hw6.exe AppLaunch.exe PID 5252 set thread context of 5420 5252 150D.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1460 4776 WerFault.exe 2Xa8634.exe 1952 4488 WerFault.exe AppLaunch.exe 3260 3520 WerFault.exe 3Oz04Ro.exe 3392 840 WerFault.exe 4Xb601Xq.exe 2668 4556 WerFault.exe 1096.exe 5200 2776 WerFault.exe 1UO63Hw6.exe 5208 5000 WerFault.exe AppLaunch.exe 5532 5252 WerFault.exe 150D.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 5160 schtasks.exe 5200 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1xS40Qe3.exeAppLaunch.exemsedge.exemsedge.exemsedge.exepid process 1636 1xS40Qe3.exe 1636 1xS40Qe3.exe 4616 AppLaunch.exe 4616 AppLaunch.exe 2788 msedge.exe 2788 msedge.exe 2796 msedge.exe 2796 msedge.exe 4180 msedge.exe 4180 msedge.exe 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 3212 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
AppLaunch.exepid process 4616 AppLaunch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
Processes:
msedge.exepid process 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
Processes:
1xS40Qe3.exe15F8.exe21F2.exedescription pid process Token: SeDebugPrivilege 1636 1xS40Qe3.exe Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeDebugPrivilege 5336 15F8.exe Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 Token: SeDebugPrivilege 5176 21F2.exe Token: SeShutdownPrivilege 3212 Token: SeCreatePagefilePrivilege 3212 -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
msedge.exe1BF5.exepid process 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 5732 1BF5.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3212 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
NEAS.d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46exe_JC.exemB2UI65.exeTu0uN89.exebB3fW99.exe2Xa8634.exe3Oz04Ro.exe4Xb601Xq.exe5dI3Mf8.execmd.exemsedge.exemsedge.exedescription pid process target process PID 3856 wrote to memory of 3664 3856 NEAS.d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46exe_JC.exe mB2UI65.exe PID 3856 wrote to memory of 3664 3856 NEAS.d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46exe_JC.exe mB2UI65.exe PID 3856 wrote to memory of 3664 3856 NEAS.d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46exe_JC.exe mB2UI65.exe PID 3664 wrote to memory of 2208 3664 mB2UI65.exe Tu0uN89.exe PID 3664 wrote to memory of 2208 3664 mB2UI65.exe Tu0uN89.exe PID 3664 wrote to memory of 2208 3664 mB2UI65.exe Tu0uN89.exe PID 2208 wrote to memory of 2960 2208 Tu0uN89.exe bB3fW99.exe PID 2208 wrote to memory of 2960 2208 Tu0uN89.exe bB3fW99.exe PID 2208 wrote to memory of 2960 2208 Tu0uN89.exe bB3fW99.exe PID 2960 wrote to memory of 1636 2960 bB3fW99.exe 1xS40Qe3.exe PID 2960 wrote to memory of 1636 2960 bB3fW99.exe 1xS40Qe3.exe PID 2960 wrote to memory of 1636 2960 bB3fW99.exe 1xS40Qe3.exe PID 2960 wrote to memory of 4776 2960 bB3fW99.exe 2Xa8634.exe PID 2960 wrote to memory of 4776 2960 bB3fW99.exe 2Xa8634.exe PID 2960 wrote to memory of 4776 2960 bB3fW99.exe 2Xa8634.exe PID 4776 wrote to memory of 1772 4776 2Xa8634.exe AppLaunch.exe PID 4776 wrote to memory of 1772 4776 2Xa8634.exe AppLaunch.exe PID 4776 wrote to memory of 1772 4776 2Xa8634.exe AppLaunch.exe PID 4776 wrote to memory of 4488 4776 2Xa8634.exe AppLaunch.exe PID 4776 wrote to memory of 4488 4776 2Xa8634.exe AppLaunch.exe PID 4776 wrote to memory of 4488 4776 2Xa8634.exe AppLaunch.exe PID 4776 wrote to memory of 4488 4776 2Xa8634.exe AppLaunch.exe PID 4776 wrote to memory of 4488 4776 2Xa8634.exe AppLaunch.exe PID 4776 wrote to memory of 4488 4776 2Xa8634.exe AppLaunch.exe PID 4776 wrote to memory of 4488 4776 2Xa8634.exe AppLaunch.exe PID 4776 wrote to memory of 4488 4776 2Xa8634.exe AppLaunch.exe PID 4776 wrote to memory of 4488 4776 2Xa8634.exe AppLaunch.exe PID 4776 wrote to memory of 4488 4776 2Xa8634.exe AppLaunch.exe PID 2208 wrote to memory of 3520 2208 Tu0uN89.exe 3Oz04Ro.exe PID 2208 wrote to memory of 3520 2208 Tu0uN89.exe 3Oz04Ro.exe PID 2208 wrote to memory of 3520 2208 Tu0uN89.exe 3Oz04Ro.exe PID 3520 wrote to memory of 4616 3520 3Oz04Ro.exe AppLaunch.exe PID 3520 wrote to memory of 4616 3520 3Oz04Ro.exe AppLaunch.exe PID 3520 wrote to memory of 4616 3520 3Oz04Ro.exe AppLaunch.exe PID 3520 wrote to memory of 4616 3520 3Oz04Ro.exe AppLaunch.exe PID 3520 wrote to memory of 4616 3520 3Oz04Ro.exe AppLaunch.exe PID 3520 wrote to memory of 4616 3520 3Oz04Ro.exe AppLaunch.exe PID 3664 wrote to memory of 840 3664 mB2UI65.exe 4Xb601Xq.exe PID 3664 wrote to memory of 840 3664 mB2UI65.exe 4Xb601Xq.exe PID 3664 wrote to memory of 840 3664 mB2UI65.exe 4Xb601Xq.exe PID 840 wrote to memory of 5116 840 4Xb601Xq.exe AppLaunch.exe PID 840 wrote to memory of 5116 840 4Xb601Xq.exe AppLaunch.exe PID 840 wrote to memory of 5116 840 4Xb601Xq.exe AppLaunch.exe PID 840 wrote to memory of 5116 840 4Xb601Xq.exe AppLaunch.exe PID 840 wrote to memory of 5116 840 4Xb601Xq.exe AppLaunch.exe PID 840 wrote to memory of 5116 840 4Xb601Xq.exe AppLaunch.exe PID 840 wrote to memory of 5116 840 4Xb601Xq.exe AppLaunch.exe PID 840 wrote to memory of 5116 840 4Xb601Xq.exe AppLaunch.exe PID 3856 wrote to memory of 4956 3856 NEAS.d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46exe_JC.exe 5dI3Mf8.exe PID 3856 wrote to memory of 4956 3856 NEAS.d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46exe_JC.exe 5dI3Mf8.exe PID 3856 wrote to memory of 4956 3856 NEAS.d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46exe_JC.exe 5dI3Mf8.exe PID 4956 wrote to memory of 3964 4956 5dI3Mf8.exe cmd.exe PID 4956 wrote to memory of 3964 4956 5dI3Mf8.exe cmd.exe PID 3964 wrote to memory of 4180 3964 cmd.exe msedge.exe PID 3964 wrote to memory of 4180 3964 cmd.exe msedge.exe PID 4180 wrote to memory of 4564 4180 msedge.exe msedge.exe PID 4180 wrote to memory of 4564 4180 msedge.exe msedge.exe PID 3964 wrote to memory of 3996 3964 cmd.exe msedge.exe PID 3964 wrote to memory of 3996 3964 cmd.exe msedge.exe PID 3996 wrote to memory of 1736 3996 msedge.exe msedge.exe PID 3996 wrote to memory of 1736 3996 msedge.exe msedge.exe PID 3996 wrote to memory of 1716 3996 msedge.exe msedge.exe PID 3996 wrote to memory of 1716 3996 msedge.exe msedge.exe PID 3996 wrote to memory of 1716 3996 msedge.exe msedge.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d846e2702a0957431920f99f02eeb321fa9e69a6082b6de828e8ee951e1aec46exe_JC.exe"1⤵
- DcRat
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mB2UI65.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mB2UI65.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Tu0uN89.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Tu0uN89.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bB3fW99.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bB3fW99.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1xS40Qe3.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1xS40Qe3.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Xa8634.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Xa8634.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1772
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 1967⤵
- Program crash
PID:1952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 1566⤵
- Program crash
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Oz04Ro.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Oz04Ro.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 1525⤵
- Program crash
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Xb601Xq.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Xb601Xq.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:5116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 2204⤵
- Program crash
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5dI3Mf8.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5dI3Mf8.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\ACDA.tmp\ACDB.tmp\ACDC.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5dI3Mf8.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ffe939346f8,0x7ffe93934708,0x7ffe939347185⤵PID:4564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:25⤵PID:1308
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:85⤵PID:520
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:15⤵PID:4992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:15⤵PID:4552
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3896 /prefetch:15⤵PID:2960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:15⤵PID:3660
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:85⤵PID:3520
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:85⤵PID:1264
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:15⤵PID:3344
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:15⤵PID:1820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:15⤵PID:4956
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:15⤵PID:4612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:15⤵PID:5668
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:15⤵PID:5740
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:15⤵PID:5708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,1595708645074451400,1718601381944453617,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3092 /prefetch:25⤵PID:6084
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x164,0x174,0x7ffe939346f8,0x7ffe93934708,0x7ffe939347185⤵PID:1736
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,4687207363672806876,17198166565638095724,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:25⤵PID:1716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,4687207363672806876,17198166565638095724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4776 -ip 47761⤵PID:4992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4488 -ip 44881⤵PID:3436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3520 -ip 35201⤵PID:5056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 840 -ip 8401⤵PID:1100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\D49.exeC:\Users\Admin\AppData\Local\Temp\D49.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nV0fk3qA.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nV0fk3qA.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Hy5nJ9bV.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Hy5nJ9bV.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Qf6uQ8Mx.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Qf6uQ8Mx.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bO9zE8So.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bO9zE8So.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1UO63Hw6.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1UO63Hw6.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 5408⤵
- Program crash
PID:5208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 1927⤵
- Program crash
PID:5200 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2pP877hY.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2pP877hY.exe6⤵
- Executes dropped EXE
PID:5500
-
C:\Users\Admin\AppData\Local\Temp\1096.exeC:\Users\Admin\AppData\Local\Temp\1096.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 2162⤵
- Program crash
PID:2668
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\11EF.bat" "1⤵PID:2804
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login2⤵PID:5456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe939346f8,0x7ffe93934708,0x7ffe939347183⤵PID:5488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵PID:5328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4556 -ip 45561⤵PID:560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2776 -ip 27761⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5000 -ip 50001⤵PID:5168
-
C:\Users\Admin\AppData\Local\Temp\150D.exeC:\Users\Admin\AppData\Local\Temp\150D.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5252 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:5404
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:5420
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:5412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5252 -s 4282⤵
- Program crash
PID:5532
-
C:\Users\Admin\AppData\Local\Temp\15F8.exeC:\Users\Admin\AppData\Local\Temp\15F8.exe1⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:5336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 5252 -ip 52521⤵PID:5444
-
C:\Users\Admin\AppData\Local\Temp\185A.exeC:\Users\Admin\AppData\Local\Temp\185A.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:5520 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5832 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F3⤵
- DcRat
- Creates scheduled task(s)
PID:5160 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵PID:5320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5648
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"4⤵PID:5748
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E4⤵PID:5280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5944
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:5996
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:5168
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:5432
-
C:\Users\Admin\AppData\Local\Temp\1BF5.exeC:\Users\Admin\AppData\Local\Temp\1BF5.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:5732 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5240 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F3⤵
- DcRat
- Creates scheduled task(s)
PID:5200 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit3⤵PID:5516
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:5408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5256
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:6008
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"4⤵PID:3644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5940
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E4⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\21F2.exeC:\Users\Admin\AppData\Local\Temp\21F2.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe939346f8,0x7ffe93934708,0x7ffe939347181⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:228
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:3764
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:2984
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:2568
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
Filesize
152B
MD56351be8b63227413881e5dfb033459cc
SHA1f24489be1e693dc22d6aac7edd692833c623d502
SHA256e24cda01850900bdb3a4ae5f590a76565664d7689026c146eb96bcd197dac88b
SHA51266e249488a2f9aa020834f3deca7e4662574dcab0cbb684f21f295f46d71b11f9494b075288189d9df29e4f3414d4b86c27bf8823005d400a5946d7b477f0aef
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1008B
MD541f886e1cf9190d7a5ef56c79406d729
SHA1c55425a2f655b0f2a55cf1433e5feee03ff2069e
SHA256efac7873d85db2a80cbbc984e0581d71c3216282f2ddbc85491a0127e147ad4f
SHA512fead0b8400fc67681057f1691fef5c7f73690f9e8f67ed42698b96fa48414504ebf5951b52a080bd07dfb4b098dac1fffe95194132fd842ad83fe67b615303cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5d1e827d306026e07bbd3a11000cc2790
SHA1ead90ef7017c48c7a2e7bd6d706970b7f3cd1210
SHA256693a46d9978aaaadc2da0ba8d2e192211e8750e395c05763430ac201ab5a1352
SHA512738bea19d3d4c69c70ef08ca797c503bd5b689149ff7e068ff100ead94b08526ad39f12948a70103119bddb3e88f1f0c781daf391e2dce46f246e1a559bbb9c8
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5628259a72fc8ed9fa8d5a034024d00cd
SHA1f0b06816cd9af6b16aaa1952bd24e1cf131e8a32
SHA25653225fcb33297bb0a96786c377d5300c58fbdf39ae32da79237e315a91ce18d0
SHA512a1843fb7e25f18f36626f4168d531a816689afcdf90de89865519a768e32f5be0605910cee2fcbfce3698bb11f902e464839f098a80b80a1a71bf332a00681b3
-
Filesize
6KB
MD562f8ced7f319c3706aa9cb92ef051409
SHA100a2523b15b1dec4ad13427efdb48650e09791b7
SHA2568c14c6acbe5caa3ee86c5bce7e108445e6df08630a6e07e73bf3f8b21d47dc6e
SHA512400cff14c4016d14c541bf12f5f210f2b59a54abd5196b0459b70b7d13c8c77ae52b354fd7c614d4258aeca888b7bff3cbac47a6afac22813c18b9dae4745496
-
Filesize
6KB
MD523c6219311975298340f1a99fdcbd896
SHA15f1d35f0a11794c53e7c5e434ac7e4d1df35b025
SHA256f83370badea634de7e713506a5ccfb7bad4ec40c370525e4dedca4ec70dbdc0e
SHA512b63af897a164b7868441c00ebfd60fcf173b6f0ad63da864c200d0d2cb80b6b6547f16e23367c1e1e2447a8672752973aac57081be629152932f97b04256e6cd
-
Filesize
5KB
MD56ba84f53871078c48abe6d4ed04bd799
SHA15a8f2f13d8ae37f56033f60aeca5d777649ef5e3
SHA25680ec9fbb7a9432fcbd40065345b9cabf6235b951ee52e082b46f9bf50f2709a4
SHA512cecd79bd27c29481d4e9f21c94fa8dd76977fd79acb4b8c91712306cd276a0784427b84aeec6e93e77a2be0efabefd5d31859ada138140ef92aac07f71ea353f
-
Filesize
24KB
MD5699e3636ed7444d9b47772e4446ccfc1
SHA1db0459ca6ceeea2e87e0023a6b7ee06aeed6fded
SHA2569205233792628ecf0d174de470b2986abf3adfed702330dc54c4a76c9477949a
SHA512d5d4c08b6aec0f3e3506e725decc1bdf0b2e2fb50703c36d568c1ea3c3ab70720f5aec9d49ad824505731eb64db399768037c9f1be655779ed77331a7bab1d51
-
Filesize
872B
MD5bfb14806e7df65f0fa369f2fbcef2a49
SHA1c89e0490305765da454473946c387b2407a4e9f0
SHA25612cba001a39cd2c72434b3c988a3a4e89b3053fe1c668ca8b6123daae6f1ef41
SHA51202ce85953f05a5a63f34ec0d7675321b0388303f2769cf873c6846af1de931a6e80247e7e8296f0cea7a60df0eba8a0c8719d3b62a5658c401447ff4a4f5ea5d
-
Filesize
872B
MD5fb7a57c7ba16db0c4e25ec4e31f8e717
SHA143d040a2bbce90fab4c13c869c39cb3c52c6372f
SHA25690bc557a371cd0926578e2eee77aa2e8eb03ca516a9fc5dd733c9afc14d8491b
SHA5122164d72ab0e60427150a197b7e82e89dbe7e79a770c93316c7fc36c821126c1aa6bea5b83200a500362b846d161260179de08db6715635508fa5d691795a08dd
-
Filesize
872B
MD5220c1990776fd10be0eac6cf6815807f
SHA1496c88bbe7f0bc753f4264dc162b5a2ddd9926ba
SHA2567c96b5f65064f7de3c4a6f0bbefe9678e0bbf9627b49c508f3548330599758d9
SHA5124b70ac79b7c09c5656fb93b5a6af387a8241ce236b351e4ec26d14c533338d0c21f3419393719bcab2d6a0493f7c45cfa871792f178eab63aacc16bde21b9646
-
Filesize
872B
MD5eac53e598415ce2d215195400f61449d
SHA12bd076aacee1fad1d3d5eb03b7b1e121d6e06efc
SHA2563abf6a90b66b4203c200679f8fdb9c971effba15ac3443715ac64263ae3a1d20
SHA51226f47f610b6fd95d3063f383ee5b4a47be5eb6a98a5947f3eb099f7a276efd7e927e573a8f1f1bf4feb37e201c70d891b132d65f69c47991c2a904fbfb499c22
-
Filesize
872B
MD5b928ae0aa6a3c70077813890426e7da2
SHA1a328667723a5c13f7bab8b26f01a759b2c306498
SHA256428b37dcc81b8f2727465ec8ab23219ecf04173c0ac65f899f8a4b5b8bff4b72
SHA51216cc23230b5b822642047c4011e6d918e26e123162b3749af674d93b4109bb1c84a8eb91715c18526759ad6d67cb41ac1cba9c081e0e8ef933c2887fedc1349e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD518faeaae07debbd1189535805627d137
SHA186f73fe3fa7b866bb125e55017cef6b958129201
SHA256eae2af5632fa901e5ae0a46996ddb32e77d3f893a93f6652283fda54bc9d7831
SHA51228f1f197dab05ebae9e3cfff9b33fc8cb780f2d91bfa422984453a20a861b4f70fdc8cf2fa755cefae3a578b6d290e8911a899b2220ab9a2f2f1093709f4bb51
-
Filesize
2KB
MD5b65aaf793bccd1764cec6047cbb1a98e
SHA14779118b368f2c5c817d1576422886bbb83f30e3
SHA2564fa6b761c297a95e64881e46957a8b5d888ef63a275c8effa4aa611fcce43793
SHA5129f9cadba0b9cd4d48b4037781891d86311b4b92e0a7862af728822d0861ff96c3e25c4c00a377e056e44901c071384c635d5811c4775590f1e7abd8b41fef46a
-
Filesize
2KB
MD5b65aaf793bccd1764cec6047cbb1a98e
SHA14779118b368f2c5c817d1576422886bbb83f30e3
SHA2564fa6b761c297a95e64881e46957a8b5d888ef63a275c8effa4aa611fcce43793
SHA5129f9cadba0b9cd4d48b4037781891d86311b4b92e0a7862af728822d0861ff96c3e25c4c00a377e056e44901c071384c635d5811c4775590f1e7abd8b41fef46a
-
Filesize
423KB
MD5f579c285566a5b0c7c29384ea385dac7
SHA1fd240df14b7888b8670f1c8944a70908ea0ad161
SHA256a6f44c44c53577e453f9315919c99dba45bcb2651f4999cce04d24f42b848276
SHA5124c46f597b093ad6f5c0b97e25008f20613802035e94a85e6ac90b1f3638528975a98550015070f42fa4bc8571950b45cb285d0351362786ed597f3d0ab6bbef1
-
Filesize
423KB
MD5f579c285566a5b0c7c29384ea385dac7
SHA1fd240df14b7888b8670f1c8944a70908ea0ad161
SHA256a6f44c44c53577e453f9315919c99dba45bcb2651f4999cce04d24f42b848276
SHA5124c46f597b093ad6f5c0b97e25008f20613802035e94a85e6ac90b1f3638528975a98550015070f42fa4bc8571950b45cb285d0351362786ed597f3d0ab6bbef1
-
Filesize
79B
MD5403991c4d18ac84521ba17f264fa79f2
SHA1850cc068de0963854b0fe8f485d951072474fd45
SHA256ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576
-
Filesize
462KB
MD5dee9568d290cb88c690bcdb70768eaf2
SHA11276e903c5ece60d3dd7f8bc76c2884144d90bb8
SHA2563140b1a8bc09b4494d22746101b137673e48e74f4ea9e6f2d02958ced6422815
SHA5125f20a92ec3c086f033fab417313d54f2935329bd53873dbef43df9b88b7da978d930970a0fba17eda7ad75155f3233dd1cbe2b4d1aa820694d594802f83e29ce
-
Filesize
462KB
MD5dee9568d290cb88c690bcdb70768eaf2
SHA11276e903c5ece60d3dd7f8bc76c2884144d90bb8
SHA2563140b1a8bc09b4494d22746101b137673e48e74f4ea9e6f2d02958ced6422815
SHA5125f20a92ec3c086f033fab417313d54f2935329bd53873dbef43df9b88b7da978d930970a0fba17eda7ad75155f3233dd1cbe2b4d1aa820694d594802f83e29ce
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
90B
MD55a115a88ca30a9f57fdbb545490c2043
SHA167e90f37fc4c1ada2745052c612818588a5595f4
SHA25652c4113e7f308faa933ae6e8ff5d1b955ba62d1edac0eb7c972caa26e1ae4e2d
SHA51217c399dad7b7343d5b16156e4d83de78ff5755d12add358bd2987ed4216dd13d24cfec9ecdb92d9d6723bb1d20d8874c0bad969dbec69eed95beb7a2817eb4fe
-
Filesize
1.2MB
MD532e72bd0467b31633b159d349d3d38eb
SHA12057109550211fedd14a433d3e782c1d8570c0d8
SHA256e0ed16ba9979a011fd400268b981492c157ce621c72dddc2997ac003741fc5b8
SHA512959bc92f0c8b8d5c69b2ba268559809d41cc159ab8dec2b55f1f3a7640fc153ad429ac05874666533caea61fe5de9b4d0829f2d51f45b7f36f70e21085c080b5
-
Filesize
1.2MB
MD532e72bd0467b31633b159d349d3d38eb
SHA12057109550211fedd14a433d3e782c1d8570c0d8
SHA256e0ed16ba9979a011fd400268b981492c157ce621c72dddc2997ac003741fc5b8
SHA512959bc92f0c8b8d5c69b2ba268559809d41cc159ab8dec2b55f1f3a7640fc153ad429ac05874666533caea61fe5de9b4d0829f2d51f45b7f36f70e21085c080b5
-
Filesize
100KB
MD571247e41d01242104f66836558f01e18
SHA1450506391ac78a607bcb40fe9620fc5918edd369
SHA256fdbc7ced6d5911d4dc5e00410b593873358edc32fc30ee30322eaf1b31dc7bf9
SHA5123f97aba3482269f761214d6e21c0ea5da5b9c8eb29998d11759e55fa1e2ef89b5cd43b936b798151711445dc9ed645080620b1302d6a73ade2fd3a653744f5f8
-
Filesize
100KB
MD571247e41d01242104f66836558f01e18
SHA1450506391ac78a607bcb40fe9620fc5918edd369
SHA256fdbc7ced6d5911d4dc5e00410b593873358edc32fc30ee30322eaf1b31dc7bf9
SHA5123f97aba3482269f761214d6e21c0ea5da5b9c8eb29998d11759e55fa1e2ef89b5cd43b936b798151711445dc9ed645080620b1302d6a73ade2fd3a653744f5f8
-
Filesize
991KB
MD597471b488a0a5c189b158aa11c0a2404
SHA1f1f365ae8ed4da13e7be850c07451bb0f7dbefcf
SHA256acdc703260910b19316d478d896015d3e988afa612b4dcae3d9cfda86e7a8da6
SHA512e60b39b76f56beb587dd99fd119e8067d6f49b1432efb2dae2624e19056263a188f3639cf380f9cc0a615fb4620064118c11d68d53d5255b7ab7c4cb36f282f3
-
Filesize
991KB
MD597471b488a0a5c189b158aa11c0a2404
SHA1f1f365ae8ed4da13e7be850c07451bb0f7dbefcf
SHA256acdc703260910b19316d478d896015d3e988afa612b4dcae3d9cfda86e7a8da6
SHA512e60b39b76f56beb587dd99fd119e8067d6f49b1432efb2dae2624e19056263a188f3639cf380f9cc0a615fb4620064118c11d68d53d5255b7ab7c4cb36f282f3
-
Filesize
1.1MB
MD5d5ca5084fa745d777459673b01eb1c57
SHA1652155cf3fbcd9da5f2fd1761f3866f621742757
SHA256b029a879e1ec84d31645ada560aacecf8c75f27917bfb39d1293bb12991f3774
SHA51252cb4abab951f8ba72aa2ac4447b7bf229427855f2212e1775ad2950cde02511443560b29dc2f63e630c317c8e261127ad58316969a3f2313793684565a2711d
-
Filesize
1.1MB
MD5d5ca5084fa745d777459673b01eb1c57
SHA1652155cf3fbcd9da5f2fd1761f3866f621742757
SHA256b029a879e1ec84d31645ada560aacecf8c75f27917bfb39d1293bb12991f3774
SHA51252cb4abab951f8ba72aa2ac4447b7bf229427855f2212e1775ad2950cde02511443560b29dc2f63e630c317c8e261127ad58316969a3f2313793684565a2711d
-
Filesize
459KB
MD5a38ce3e2dc246d8e40f95186737c588f
SHA187eb3f865fdd506f345d1d586f4d8c4d490f669a
SHA256c42efcd5f53c75f36a6ed5c8f8be82359b848285ffb0fc5acc12fbd625c7028e
SHA5129b6dec7f0eaae988f522ec927e0082dd03ead7605387c52d6184ee899154c85e9f180622b7ca32377a9e9a0b1972e24131e0a47e2b27797c55736b25261d27c9
-
Filesize
459KB
MD5a38ce3e2dc246d8e40f95186737c588f
SHA187eb3f865fdd506f345d1d586f4d8c4d490f669a
SHA256c42efcd5f53c75f36a6ed5c8f8be82359b848285ffb0fc5acc12fbd625c7028e
SHA5129b6dec7f0eaae988f522ec927e0082dd03ead7605387c52d6184ee899154c85e9f180622b7ca32377a9e9a0b1972e24131e0a47e2b27797c55736b25261d27c9
-
Filesize
696KB
MD5f6a32e42dfd4b0a5a45c89090e018a2f
SHA1a1076e1ac13b887629c0fdcc1de2dab9ffb5eab4
SHA256c68213dd919a184346cb4375d2ce83117dd66339fe245fb24d262eacb0ec6a07
SHA512c26ac29d348e30f92afe190083e2622489de5ef3cd0611c010dccbbd7b1aea1617fbdb3a1af0b17a0e7c961b6677ce80ce4517b3c5c80b72a6f46a9584438eaf
-
Filesize
696KB
MD5f6a32e42dfd4b0a5a45c89090e018a2f
SHA1a1076e1ac13b887629c0fdcc1de2dab9ffb5eab4
SHA256c68213dd919a184346cb4375d2ce83117dd66339fe245fb24d262eacb0ec6a07
SHA512c26ac29d348e30f92afe190083e2622489de5ef3cd0611c010dccbbd7b1aea1617fbdb3a1af0b17a0e7c961b6677ce80ce4517b3c5c80b72a6f46a9584438eaf
-
Filesize
268KB
MD5f09b788bfb242f8edcb4b4ab2bd0275a
SHA171b2273479460cbda9d08073d0b116935d2c6813
SHA256f291d8694f3198b824474d57a18792218a5d622f2f59370efe6679563db87521
SHA512709bdc1a303159b27f7e7fa793d1c78f3d6223b5a3ba2c03cbea36eafc1bd0e2edc1bd19e61f7ed5ca53a1ab5018d7c171fc9c3c4ff67b02b4087a07cfd5dda6
-
Filesize
268KB
MD5f09b788bfb242f8edcb4b4ab2bd0275a
SHA171b2273479460cbda9d08073d0b116935d2c6813
SHA256f291d8694f3198b824474d57a18792218a5d622f2f59370efe6679563db87521
SHA512709bdc1a303159b27f7e7fa793d1c78f3d6223b5a3ba2c03cbea36eafc1bd0e2edc1bd19e61f7ed5ca53a1ab5018d7c171fc9c3c4ff67b02b4087a07cfd5dda6
-
Filesize
936KB
MD5f49ef8a1fa8865248019f227e3dd7eb1
SHA14b951be36909204ceca6749727ed632a74c3d3a5
SHA2567893afe172a224f7ef470b8185adb8c555a283446a437cfe1ae8a271f2226441
SHA5128ef5ef404c53585b3f844f358b298db71c611560010fbac131bb8a2476d9c02467043fa7c17333dec67d5ad8722073273207ee1bd5f26dce5b1da81277db6a8d
-
Filesize
936KB
MD5f49ef8a1fa8865248019f227e3dd7eb1
SHA14b951be36909204ceca6749727ed632a74c3d3a5
SHA2567893afe172a224f7ef470b8185adb8c555a283446a437cfe1ae8a271f2226441
SHA5128ef5ef404c53585b3f844f358b298db71c611560010fbac131bb8a2476d9c02467043fa7c17333dec67d5ad8722073273207ee1bd5f26dce5b1da81277db6a8d
-
Filesize
452KB
MD5a472dc143144303f0670ee6fe9cc76ea
SHA164ad462e2668d7981d5acd9b6fd216e1cbfbca93
SHA256b35a7ec3bba78dcbb088561e5ba1dac49099fbd9fcfa4d9ca855a39676aae2be
SHA512a515a00a54cd7743c2196c641a18fef2034dc09f2306560a641780c21ed8c86d2a89fbb91a8958e489dfe39182bb948476a4ca94fcc0cd3d8d80cd76f084ffd4
-
Filesize
452KB
MD5a472dc143144303f0670ee6fe9cc76ea
SHA164ad462e2668d7981d5acd9b6fd216e1cbfbca93
SHA256b35a7ec3bba78dcbb088561e5ba1dac49099fbd9fcfa4d9ca855a39676aae2be
SHA512a515a00a54cd7743c2196c641a18fef2034dc09f2306560a641780c21ed8c86d2a89fbb91a8958e489dfe39182bb948476a4ca94fcc0cd3d8d80cd76f084ffd4
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
640KB
MD591cc31c369ccaf5c545f064187362f0c
SHA112da9bb1a5c1e6ece3c4a321dba4c787f81d7371
SHA256458db92c7169e410be59dd0818a745e43b843cacac261b097eed5ce571984b84
SHA512394c0575fca0edc663100ad900ba41022373b3db8577541fa79764c79cd06c5ec748dd0697b48999a8d900edb937ecb4f093a498d3665534003c837c0d55b5c7
-
Filesize
640KB
MD591cc31c369ccaf5c545f064187362f0c
SHA112da9bb1a5c1e6ece3c4a321dba4c787f81d7371
SHA256458db92c7169e410be59dd0818a745e43b843cacac261b097eed5ce571984b84
SHA512394c0575fca0edc663100ad900ba41022373b3db8577541fa79764c79cd06c5ec748dd0697b48999a8d900edb937ecb4f093a498d3665534003c837c0d55b5c7
-
Filesize
444KB
MD572bbb9f545a81525704ab71754ca8b28
SHA10ab2e185855e5e8423239a7b9f04ab4462d19ee7
SHA256be3f0d39451315cbf1aabbdfa525f3c774fc5c4fb77d0c2a06799fa6adcf2622
SHA512ce677b244e4a353d8f8a2ee680a419dce6d96707b05c8e70dfa54e715e89fb6e3297452f3a16dde12ecee89fd097bc33918e6b33499200aac88dd12d640c2a55
-
Filesize
444KB
MD572bbb9f545a81525704ab71754ca8b28
SHA10ab2e185855e5e8423239a7b9f04ab4462d19ee7
SHA256be3f0d39451315cbf1aabbdfa525f3c774fc5c4fb77d0c2a06799fa6adcf2622
SHA512ce677b244e4a353d8f8a2ee680a419dce6d96707b05c8e70dfa54e715e89fb6e3297452f3a16dde12ecee89fd097bc33918e6b33499200aac88dd12d640c2a55
-
Filesize
423KB
MD5507b1cfa7fc83a3cbfad606a146211a7
SHA12896ca312641eac3271e7231294931df73f0c570
SHA2567c8dff925227f3dd49e768992180a47a738f7b64a3ede8bf6bcd599fcc295692
SHA5120210141d6aab8e1b2222ce6138a0aaa63a1683961d70f2be6ed1246d643a8b870e318602b65e2ff67d8f51919ebbb2236e2dd11b14b62da07a31cfb113a208dd
-
Filesize
423KB
MD5507b1cfa7fc83a3cbfad606a146211a7
SHA12896ca312641eac3271e7231294931df73f0c570
SHA2567c8dff925227f3dd49e768992180a47a738f7b64a3ede8bf6bcd599fcc295692
SHA5120210141d6aab8e1b2222ce6138a0aaa63a1683961d70f2be6ed1246d643a8b870e318602b65e2ff67d8f51919ebbb2236e2dd11b14b62da07a31cfb113a208dd
-
Filesize
221KB
MD5c6204b64317814c2277a8183848460b2
SHA1d5eaf63206d83835b9a7aabe1793b076e1aab033
SHA256a957c92b5616c6d42c82b3c741133384ac08fe8bed6dd6ae5f09b6368ea9971c
SHA5125f3c6fd60a1163de6df19c0035b43e9b47b6da8646393b5bc6148dcc8cb7b54e9ceb2b2ee8bc317989d6e2e19c441c753106a6fc008e4e0100904e394163f849
-
Filesize
221KB
MD5c6204b64317814c2277a8183848460b2
SHA1d5eaf63206d83835b9a7aabe1793b076e1aab033
SHA256a957c92b5616c6d42c82b3c741133384ac08fe8bed6dd6ae5f09b6368ea9971c
SHA5125f3c6fd60a1163de6df19c0035b43e9b47b6da8646393b5bc6148dcc8cb7b54e9ceb2b2ee8bc317989d6e2e19c441c753106a6fc008e4e0100904e394163f849
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e