Analysis
-
max time kernel
158s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 00:52
Static task
static1
Behavioral task
behavioral1
Sample
bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7.exe
Resource
win10v2004-20230915-en
General
-
Target
bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7.exe
-
Size
3.9MB
-
MD5
5e220e5193a8ec923e12259448c97196
-
SHA1
2577e22dd9586ca2a4f05d497cef0fb17c60448e
-
SHA256
bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7
-
SHA512
7dc9d423cb852b92507a7fdd3d53dfbded1490ee2af87145a7b146e3f7d04393b31d9b33ef1cc5cb452834ac15fcbf7062fea7c2dad7a4330888a482a68277d0
-
SSDEEP
49152:TAGDfc6JBC/Un6a3vavLq0kssa3nsAFQYSxfNvZCyET2u6g7G4M8nbTH5F:TAGDQU6RvLq0jFlFTS1+DH7GObV
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
kukish
77.91.124.55:19071
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
amadey
3.83
http://5.42.65.80/8bmeVwqx/index.php
-
install_dir
207aa4515d
-
install_file
oneetx.exe
-
strings_key
3e634dd0840c68ae2ced83c2be7bf0d4
Extracted
redline
pixelscloud
85.209.176.171:80
Extracted
redline
@ytlogsbot
185.216.70.238:37515
Extracted
redline
breha
77.91.124.55:19071
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/2596-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2596-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2596-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2596-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral2/memory/5000-39-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral2/files/0x0007000000023218-138.dat healer behavioral2/files/0x0007000000023218-137.dat healer behavioral2/memory/3572-140-0x00000000006A0000-0x00000000006AA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 6205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6205.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 14 IoCs
resource yara_rule behavioral2/files/0x0006000000023216-127.dat family_redline behavioral2/files/0x0006000000023216-128.dat family_redline behavioral2/memory/1280-129-0x0000000000C00000-0x0000000000C3E000-memory.dmp family_redline behavioral2/files/0x0007000000023221-168.dat family_redline behavioral2/files/0x0007000000023223-177.dat family_redline behavioral2/files/0x0007000000023223-180.dat family_redline behavioral2/memory/3780-188-0x0000000000240000-0x000000000025E000-memory.dmp family_redline behavioral2/files/0x0007000000023221-187.dat family_redline behavioral2/memory/4236-186-0x0000000000500000-0x000000000055A000-memory.dmp family_redline behavioral2/memory/2824-196-0x0000000000540000-0x000000000059A000-memory.dmp family_redline behavioral2/memory/4748-246-0x0000000000AA0000-0x0000000000BF8000-memory.dmp family_redline behavioral2/memory/5212-247-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral2/memory/4748-267-0x0000000000AA0000-0x0000000000BF8000-memory.dmp family_redline behavioral2/memory/5376-521-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023221-168.dat family_sectoprat behavioral2/memory/3780-188-0x0000000000240000-0x000000000025E000-memory.dmp family_sectoprat behavioral2/files/0x0007000000023221-187.dat family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 61 1692 cmd.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation 63AC.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 29 IoCs
pid Process 3204 v0266016.exe 4544 v0282234.exe 4796 v7076248.exe 2296 v5818421.exe 804 a6448333.exe 3372 b0202742.exe 4824 c9920628.exe 2212 d7320109.exe 5016 4D6F.exe 3844 Gz4JJ0DP.exe 1692 5521.exe 3388 HH9GX1tc.exe 1572 GG9aF8fg.exe 2556 GX8qp5be.exe 1428 1Lq12ue6.exe 1280 2ii197Mr.exe 804 6177.exe 3572 6205.exe 4048 63AC.exe 4824 msedge.exe 2824 696A.exe 2228 explothe.exe 3780 6AA4.exe 4236 6C4B.exe 2388 oneetx.exe 4748 7525.exe 4532 7E4E.exe 5268 oneetx.exe 5260 explothe.exe -
Loads dropped DLL 3 IoCs
pid Process 2824 696A.exe 2824 696A.exe 5980 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 6205.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0266016.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0282234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v7076248.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Gz4JJ0DP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup7 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP007.TMP\\\"" GX8qp5be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v5818421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" 4D6F.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" HH9GX1tc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup6 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP006.TMP\\\"" GG9aF8fg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 2556 set thread context of 2192 2556 bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7.exe 96 PID 804 set thread context of 5000 804 a6448333.exe 103 PID 3372 set thread context of 2596 3372 b0202742.exe 109 PID 4824 set thread context of 2824 4824 c9920628.exe 114 PID 4748 set thread context of 5212 4748 7525.exe 165 PID 804 set thread context of 5376 804 6177.exe 187 PID 4532 set thread context of 3452 4532 7E4E.exe 190 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4128 2596 WerFault.exe 109 4816 2824 WerFault.exe 135 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4952 schtasks.exe 3880 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2824 AppLaunch.exe 2824 AppLaunch.exe 5000 AppLaunch.exe 5000 AppLaunch.exe 5000 AppLaunch.exe 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3156 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2824 AppLaunch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5000 AppLaunch.exe Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeDebugPrivilege 3572 6205.exe Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeDebugPrivilege 3780 6AA4.exe Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4824 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3156 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2192 2556 bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7.exe 96 PID 2556 wrote to memory of 2192 2556 bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7.exe 96 PID 2556 wrote to memory of 2192 2556 bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7.exe 96 PID 2556 wrote to memory of 2192 2556 bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7.exe 96 PID 2556 wrote to memory of 2192 2556 bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7.exe 96 PID 2556 wrote to memory of 2192 2556 bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7.exe 96 PID 2556 wrote to memory of 2192 2556 bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7.exe 96 PID 2556 wrote to memory of 2192 2556 bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7.exe 96 PID 2556 wrote to memory of 2192 2556 bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7.exe 96 PID 2556 wrote to memory of 2192 2556 bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7.exe 96 PID 2192 wrote to memory of 3204 2192 AppLaunch.exe 97 PID 2192 wrote to memory of 3204 2192 AppLaunch.exe 97 PID 2192 wrote to memory of 3204 2192 AppLaunch.exe 97 PID 3204 wrote to memory of 4544 3204 v0266016.exe 98 PID 3204 wrote to memory of 4544 3204 v0266016.exe 98 PID 3204 wrote to memory of 4544 3204 v0266016.exe 98 PID 4544 wrote to memory of 4796 4544 v0282234.exe 99 PID 4544 wrote to memory of 4796 4544 v0282234.exe 99 PID 4544 wrote to memory of 4796 4544 v0282234.exe 99 PID 4796 wrote to memory of 2296 4796 v7076248.exe 100 PID 4796 wrote to memory of 2296 4796 v7076248.exe 100 PID 4796 wrote to memory of 2296 4796 v7076248.exe 100 PID 2296 wrote to memory of 804 2296 v5818421.exe 101 PID 2296 wrote to memory of 804 2296 v5818421.exe 101 PID 2296 wrote to memory of 804 2296 v5818421.exe 101 PID 804 wrote to memory of 5000 804 a6448333.exe 103 PID 804 wrote to memory of 5000 804 a6448333.exe 103 PID 804 wrote to memory of 5000 804 a6448333.exe 103 PID 804 wrote to memory of 5000 804 a6448333.exe 103 PID 804 wrote to memory of 5000 804 a6448333.exe 103 PID 804 wrote to memory of 5000 804 a6448333.exe 103 PID 804 wrote to memory of 5000 804 a6448333.exe 103 PID 804 wrote to memory of 5000 804 a6448333.exe 103 PID 2296 wrote to memory of 3372 2296 v5818421.exe 105 PID 2296 wrote to memory of 3372 2296 v5818421.exe 105 PID 2296 wrote to memory of 3372 2296 v5818421.exe 105 PID 3372 wrote to memory of 2628 3372 b0202742.exe 107 PID 3372 wrote to memory of 2628 3372 b0202742.exe 107 PID 3372 wrote to memory of 2628 3372 b0202742.exe 107 PID 3372 wrote to memory of 4100 3372 b0202742.exe 108 PID 3372 wrote to memory of 4100 3372 b0202742.exe 108 PID 3372 wrote to memory of 4100 3372 b0202742.exe 108 PID 3372 wrote to memory of 2596 3372 b0202742.exe 109 PID 3372 wrote to memory of 2596 3372 b0202742.exe 109 PID 3372 wrote to memory of 2596 3372 b0202742.exe 109 PID 3372 wrote to memory of 2596 3372 b0202742.exe 109 PID 3372 wrote to memory of 2596 3372 b0202742.exe 109 PID 3372 wrote to memory of 2596 3372 b0202742.exe 109 PID 3372 wrote to memory of 2596 3372 b0202742.exe 109 PID 3372 wrote to memory of 2596 3372 b0202742.exe 109 PID 3372 wrote to memory of 2596 3372 b0202742.exe 109 PID 3372 wrote to memory of 2596 3372 b0202742.exe 109 PID 4796 wrote to memory of 4824 4796 v7076248.exe 110 PID 4796 wrote to memory of 4824 4796 v7076248.exe 110 PID 4796 wrote to memory of 4824 4796 v7076248.exe 110 PID 4824 wrote to memory of 2824 4824 c9920628.exe 114 PID 4824 wrote to memory of 2824 4824 c9920628.exe 114 PID 4824 wrote to memory of 2824 4824 c9920628.exe 114 PID 4824 wrote to memory of 2824 4824 c9920628.exe 114 PID 4824 wrote to memory of 2824 4824 c9920628.exe 114 PID 4824 wrote to memory of 2824 4824 c9920628.exe 114 PID 4544 wrote to memory of 2212 4544 v0282234.exe 115 PID 4544 wrote to memory of 2212 4544 v0282234.exe 115 PID 4544 wrote to memory of 2212 4544 v0282234.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7.exe"C:\Users\Admin\AppData\Local\Temp\bc8b654d27f9ec6bf9d7475e9125f9ed9e5ef419d290d9ac92a68b1c67efe3f7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0266016.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0266016.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0282234.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0282234.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7076248.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7076248.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5818421.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5818421.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6448333.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6448333.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0202742.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0202742.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:2628
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:4100
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:2596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 5409⤵
- Program crash
PID:4128
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9920628.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9920628.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d7320109.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d7320109.exe5⤵
- Executes dropped EXE
PID:2212
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2596 -ip 25961⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\4D6F.exeC:\Users\Admin\AppData\Local\Temp\4D6F.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Gz4JJ0DP.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Gz4JJ0DP.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\HH9GX1tc.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\HH9GX1tc.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\GG9aF8fg.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\GG9aF8fg.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\GX8qp5be.exeC:\Users\Admin\AppData\Local\Temp\IXP006.TMP\GX8qp5be.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\1Lq12ue6.exeC:\Users\Admin\AppData\Local\Temp\IXP007.TMP\1Lq12ue6.exe6⤵
- Executes dropped EXE
PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\2ii197Mr.exeC:\Users\Admin\AppData\Local\Temp\IXP007.TMP\2ii197Mr.exe6⤵
- Executes dropped EXE
PID:1280
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5521.exeC:\Users\Admin\AppData\Local\Temp\5521.exe1⤵
- Executes dropped EXE
PID:1692
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5E88.bat" "1⤵PID:2156
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffdbc846f8,0x7fffdbc84708,0x7fffdbc847183⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,9370957922889214477,15605957912795134330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:33⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,9370957922889214477,15605957912795134330,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:23⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,9370957922889214477,15605957912795134330,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:83⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,9370957922889214477,15605957912795134330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:13⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,9370957922889214477,15605957912795134330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:13⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,9370957922889214477,15605957912795134330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:13⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,9370957922889214477,15605957912795134330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:13⤵PID:5448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,9370957922889214477,15605957912795134330,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:13⤵PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,9370957922889214477,15605957912795134330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:13⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,9370957922889214477,15605957912795134330,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:13⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,9370957922889214477,15605957912795134330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:13⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,9370957922889214477,15605957912795134330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:83⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,9370957922889214477,15605957912795134330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:83⤵PID:5808
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵PID:2392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffdbc846f8,0x7fffdbc84708,0x7fffdbc847183⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,9813019879704966046,18142827323824950050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:33⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,9813019879704966046,18142827323824950050,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:23⤵PID:2992
-
-
-
C:\Users\Admin\AppData\Local\Temp\6177.exeC:\Users\Admin\AppData\Local\Temp\6177.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:5204
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:5396
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:5420
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:5376
-
-
C:\Users\Admin\AppData\Local\Temp\6205.exeC:\Users\Admin\AppData\Local\Temp\6205.exe1⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
C:\Users\Admin\AppData\Local\Temp\63AC.exeC:\Users\Admin\AppData\Local\Temp\63AC.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2228 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F3⤵
- Creates scheduled task(s)
PID:3880
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵PID:2276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5604
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"4⤵PID:5704
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E4⤵PID:5576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2216
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:5996
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:4884
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:5980
-
-
-
C:\Users\Admin\AppData\Local\Temp\667B.exeC:\Users\Admin\AppData\Local\Temp\667B.exe1⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:4952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit3⤵
- Blocklisted process makes network request
PID:1692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5696
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:5860
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:6032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"4⤵PID:6076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1216
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E4⤵PID:5368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\696A.exeC:\Users\Admin\AppData\Local\Temp\696A.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 7842⤵
- Program crash
PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\6AA4.exeC:\Users\Admin\AppData\Local\Temp\6AA4.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
C:\Users\Admin\AppData\Local\Temp\6C4B.exeC:\Users\Admin\AppData\Local\Temp\6C4B.exe1⤵
- Executes dropped EXE
PID:4236
-
C:\Users\Admin\AppData\Local\Temp\7525.exeC:\Users\Admin\AppData\Local\Temp\7525.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:5212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2824 -ip 28241⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\7E4E.exeC:\Users\Admin\AppData\Local\Temp\7E4E.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4532 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"2⤵PID:3452
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5584
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:5268
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:5260
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Scripting
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
152B
MD51222f8c867acd00b1fc43a44dacce158
SHA1586ba251caf62b5012a03db9ba3a70890fc5af01
SHA2561e451cb9ffe74fbd34091a1b8d0ab2158497c19047b3416d89e55f498aae264a
SHA512ef3f2fc1cedfc28fb530c710219b8e9eb833a2f344b91d3ffb2d82d7bbedbc223f4b60a38bea35b72eb706e4880ffcbb9256a9768f39bae95c5544be0f503916
-
Filesize
152B
MD51222f8c867acd00b1fc43a44dacce158
SHA1586ba251caf62b5012a03db9ba3a70890fc5af01
SHA2561e451cb9ffe74fbd34091a1b8d0ab2158497c19047b3416d89e55f498aae264a
SHA512ef3f2fc1cedfc28fb530c710219b8e9eb833a2f344b91d3ffb2d82d7bbedbc223f4b60a38bea35b72eb706e4880ffcbb9256a9768f39bae95c5544be0f503916
-
Filesize
152B
MD51222f8c867acd00b1fc43a44dacce158
SHA1586ba251caf62b5012a03db9ba3a70890fc5af01
SHA2561e451cb9ffe74fbd34091a1b8d0ab2158497c19047b3416d89e55f498aae264a
SHA512ef3f2fc1cedfc28fb530c710219b8e9eb833a2f344b91d3ffb2d82d7bbedbc223f4b60a38bea35b72eb706e4880ffcbb9256a9768f39bae95c5544be0f503916
-
Filesize
152B
MD51222f8c867acd00b1fc43a44dacce158
SHA1586ba251caf62b5012a03db9ba3a70890fc5af01
SHA2561e451cb9ffe74fbd34091a1b8d0ab2158497c19047b3416d89e55f498aae264a
SHA512ef3f2fc1cedfc28fb530c710219b8e9eb833a2f344b91d3ffb2d82d7bbedbc223f4b60a38bea35b72eb706e4880ffcbb9256a9768f39bae95c5544be0f503916
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\28fe5af4-568f-47ae-a4f6-e8c18f260cc6.tmp
Filesize24KB
MD515ad31a14e9a92d2937174141e80c28d
SHA1b09e8d44c07123754008ba2f9ff4b8d4e332d4e5
SHA256bf983e704839ef295b4c957f1adeee146aaf58f2dbf5b1e2d4b709cec65eccde
SHA512ec744a79ccbfca52357d4f0212e7afd26bc93efd566dd5d861bf0671069ba5cb7e84069e0ea091c73dee57e9de9bb412fb68852281ae9bd84c11a871f5362296
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD586f2993c745fb04448ec5fd7f5594728
SHA19c15cc629d567a3c706ce865e1bf62bdad45b18e
SHA256d6cc0d5e46f08afe555ef8bfd0d5ae5cc7e695a1208713ed3f362416b8789354
SHA512e97789e21197d51e478e107e2cd70217cc0ab771ceba8f7c4e8d12c1e787b21ba912e868e89d9a1180795ba40acdfb861fdafe6310d55e6b2ba15695b96d8886
-
Filesize
1KB
MD57ee98ceef44196e8f32686d878a2e63d
SHA124ceac576c5184293ede1bda11965bd504828dcf
SHA256eb14693631bc607b73fbbb78bf7b4fd970a5e49a83ff3911dd8bf36d725c5e76
SHA51217e250288ffdce57ac1c94faf66cfb429ad6ef54f5144784ff2361f64832bb41455767b93cea438c6153d3dc02af6ca7ab30c3aaf86cdd1cc5bcc34312150299
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5ae50a28f6062351fa0ebca4dafae9dab
SHA1de8f7d1af8febc9ae4e96bf7dfef4156e9051446
SHA2569a8867bb5e2e38928af196dceeefa3e8f07e736aed2f32f553e1632222f729a8
SHA51239e748088315017ab81f1b622f91d5ba7e52547a205382a1d7e733dcd3f304aecec68a17892909238e758e7839d0d59f5f9d544342c0e54aaea831efbc33d2f5
-
Filesize
6KB
MD5bdac264d369519bb5c95d91eea606376
SHA134603a1f3c4adbc3a18b0da3f9634a6e952089b1
SHA256b2ab24c63a4ad8ddf583df485f6c403d3db7495d05ed51ed7ca48330926b1f38
SHA51292af82c40dd41bfed72738c4f98e912fbb63059ae0b7f70140fcb2ba64286f8cf619fb99d79a435398d3ba963a608006052b71502f49c0d0402ddaf3ead01cf8
-
Filesize
6KB
MD5105a8d097a80d57c3b2cb6ae48015468
SHA19328f3f7159f888143d657d8918b91cdeb1455aa
SHA256407c53aaf6a9a278de2446b4242fd17a13c09029945ea24860b1ac4ec3967d6c
SHA512d53a04b30db8e91dbc61a03b610eca493f467816951d23b50439198a68e79461667ec3825d5a7153c14cccc106cf3852966075d634ca85504ffa6dc9570b0567
-
Filesize
872B
MD5de68d55ed10d70ad493c9b97a49e4c09
SHA117dd8960c730c56b1b7cd074cc0507724703492f
SHA256efdd912a900bcc41ae461162d919b61dd68fa59de08b5a499e7a006ef8506e13
SHA5128d3d6d7aa01cda7ffa56c11a120749f98c1e8dfaaf9f7d061a0d604371dc01a8f3966e5a739e074c9f7d94e9c7d09fcc05db678b5641a026e94859857ce78c17
-
Filesize
872B
MD55fb0f671a1f7c5c10081758564468f39
SHA1e470d4f8e625c4ac996b0a22e6b5e2761886ecb9
SHA2568bf28c1278256abcb07ba3c019fe7a4226f0a9ec28cad3937a3280977ee239db
SHA512495d744bd6b55c61624a4574a90647ad95e5216420bc486cd9766f36cd38c3dc4355e012befaee4edc56eabf98fa81868243c260f6bfa0b4069eee1983a920f7
-
Filesize
870B
MD5c65a1b797b909f573389856a7996ce44
SHA1c0e6e2ff0589727feb54b813b52b3f465180fca4
SHA256d0a3c9ef34d670c9a6c892fda8ae990222e360d679b0aa9771f5b152addf0616
SHA5123b1f530322a471f8d50998773e1684599bbb16099733d0ed47ae4e1ca03f23f9ff5d02d6d8ecf52b165d30fc45e7b5c15aad8a2287fa56670a54094b4f678e47
-
Filesize
371B
MD5efbdb68487625324097cb10de21ef37c
SHA18ccd3997d7e1ac500e65cee7d8f46bd10aa4cebc
SHA25672dc0517c9f8596a8a61811edcec7cbc48ebfe296fbd50528f514a2c55889630
SHA512a0de2b88b1c41b9957ef63e84b8d2820da3b0dae77bc8609c446a2b0c14ec5e7e0e55f39976873aba8c1d640977de859393c5442a9b265982a4098ef7bfe13c5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
2KB
MD553cdf6ed08144e41dbe88fded6eb007f
SHA11b17362dfaa1a96bfc4c39fc2dea5efd1f41d3a7
SHA256ec7fa8d82dbb8eeff1bf28efaa9b5909e1b92161efde204fdd97bb857a05fd84
SHA51271ac30791ab1dcba8bc64abb820f1a350fc20381554d869beff48fb3381c55ef568e603b98f90e0a13cb17d76e7fb25ef42d96d4e5ccbf6555a5f123b70ae488
-
Filesize
10KB
MD589bd684cd1db58fe71d14e4bda6ae547
SHA147d5fab1b541a950b6e16ac5b729726e7b9a6558
SHA25647f9003b0173dc8435443ef2ebb8471609758633782092b2ee2bbe88f97359ad
SHA512813e7f5d51eb7d30b64703bbd7c05e9c12ee3503fa2e31c26f257217d87a4df65b63285d0f3c01b5ea87a48bf47f241d79b5c0f6f64a7bd60c28ec75ba75cb1d
-
Filesize
10KB
MD539e2101f03fd43fed598ad6d3961b058
SHA1f59516005275d84897ebbd2716f84cca8f9d2276
SHA256c766beb852629a6f31011175eccaaef031215572b9914e16e496532558517fa2
SHA512ce45c874019346940987f29c90a718902cea3b908fb963ae47ad73809a6ff836246b6354e3671679b3af7602069b0fc2f2d486e1b2190e35d3cd370259e70460
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
1.2MB
MD5514e32de2695ac5519b6a54eddbe8afc
SHA11542dd8ae04c514e696b502e69e1309bff30ccac
SHA256d6e10b1d714fc2d0a6983c1fe231d041b7806fac4f467733029c66b020ce629a
SHA512e6f303f0c286c04d18c6f6cc3c84e88f193240f1072ee9d0b25f301e8a2a364e42faa7c3c3271b19f31d98df375dda0082d72b15db30c753fd67f6562d04c203
-
Filesize
1.2MB
MD5514e32de2695ac5519b6a54eddbe8afc
SHA11542dd8ae04c514e696b502e69e1309bff30ccac
SHA256d6e10b1d714fc2d0a6983c1fe231d041b7806fac4f467733029c66b020ce629a
SHA512e6f303f0c286c04d18c6f6cc3c84e88f193240f1072ee9d0b25f301e8a2a364e42faa7c3c3271b19f31d98df375dda0082d72b15db30c753fd67f6562d04c203
-
Filesize
186KB
MD53a24a41f3044d90555f6cdea0f2533f8
SHA125a1913e9e41dd13039d023a5f63a050256c72ca
SHA2565e900b7d563b6dc3f5c5db7386ae7ea83ec512b1a72a1cac6d16d17110a90253
SHA5128d12aca702a3f81329fe0dad30b28269fd9933b5493e8d978080fbee9b66a1727b76b6230d910a9cda1ca68141b55ef7b63fd3f7de077eb453da7d8b44f5b837
-
Filesize
186KB
MD53a24a41f3044d90555f6cdea0f2533f8
SHA125a1913e9e41dd13039d023a5f63a050256c72ca
SHA2565e900b7d563b6dc3f5c5db7386ae7ea83ec512b1a72a1cac6d16d17110a90253
SHA5128d12aca702a3f81329fe0dad30b28269fd9933b5493e8d978080fbee9b66a1727b76b6230d910a9cda1ca68141b55ef7b63fd3f7de077eb453da7d8b44f5b837
-
Filesize
79B
MD5403991c4d18ac84521ba17f264fa79f2
SHA1850cc068de0963854b0fe8f485d951072474fd45
SHA256ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576
-
Filesize
1.2MB
MD5267ef1a960bfb0bb33928ec219dc1cea
SHA1fc28acaa6e4e4af3ad7fc8c2a851e84419a2eebf
SHA256b462fedfb5904509e82387e2591bdb1ddfe6d12b6a28a189c6403a860050965e
SHA512ba09e6c6b71426e09214c1c6773114d0a46edd133d711f81960390f940a81a695550971b30c1d292109873b524db94b596ecaebfaf379e6c6bcfd4089379e38f
-
Filesize
1.2MB
MD5267ef1a960bfb0bb33928ec219dc1cea
SHA1fc28acaa6e4e4af3ad7fc8c2a851e84419a2eebf
SHA256b462fedfb5904509e82387e2591bdb1ddfe6d12b6a28a189c6403a860050965e
SHA512ba09e6c6b71426e09214c1c6773114d0a46edd133d711f81960390f940a81a695550971b30c1d292109873b524db94b596ecaebfaf379e6c6bcfd4089379e38f
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
430KB
MD57eecd42ad359759986f6f0f79862bf16
SHA12b60f8e46f456af709207b805de1f90f5e3b5fc4
SHA25630499d8288a38c428dd0f99390955f1ae753210c382d58b86f29030fbdb04625
SHA512e05cba6e7b07db297d666ad908a5a7c749d2a62b511973be62cc0a812763fcdecc3c4bd2933c905831245a9d3ce64767cbf59136c5b26bee635b367c06e52597
-
Filesize
430KB
MD57eecd42ad359759986f6f0f79862bf16
SHA12b60f8e46f456af709207b805de1f90f5e3b5fc4
SHA25630499d8288a38c428dd0f99390955f1ae753210c382d58b86f29030fbdb04625
SHA512e05cba6e7b07db297d666ad908a5a7c749d2a62b511973be62cc0a812763fcdecc3c4bd2933c905831245a9d3ce64767cbf59136c5b26bee635b367c06e52597
-
Filesize
430KB
MD57eecd42ad359759986f6f0f79862bf16
SHA12b60f8e46f456af709207b805de1f90f5e3b5fc4
SHA25630499d8288a38c428dd0f99390955f1ae753210c382d58b86f29030fbdb04625
SHA512e05cba6e7b07db297d666ad908a5a7c749d2a62b511973be62cc0a812763fcdecc3c4bd2933c905831245a9d3ce64767cbf59136c5b26bee635b367c06e52597
-
Filesize
430KB
MD57eecd42ad359759986f6f0f79862bf16
SHA12b60f8e46f456af709207b805de1f90f5e3b5fc4
SHA25630499d8288a38c428dd0f99390955f1ae753210c382d58b86f29030fbdb04625
SHA512e05cba6e7b07db297d666ad908a5a7c749d2a62b511973be62cc0a812763fcdecc3c4bd2933c905831245a9d3ce64767cbf59136c5b26bee635b367c06e52597
-
Filesize
95KB
MD51199c88022b133b321ed8e9c5f4e6739
SHA18e5668edc9b4e1f15c936e68b59c84e165c9cb07
SHA256e6bd7a442e04eba451aa1f63819533b086c5a60fd9fa7506fa838515184e1836
SHA5127aa8c3ed3a2985bb8a62557fd347d1c90790cd3f5e3b0b70c221b28cb17a0c163b8b1bac45bc014148e08105232e9abef33408a4d648ddc5362795e5669e3697
-
Filesize
95KB
MD51199c88022b133b321ed8e9c5f4e6739
SHA18e5668edc9b4e1f15c936e68b59c84e165c9cb07
SHA256e6bd7a442e04eba451aa1f63819533b086c5a60fd9fa7506fa838515184e1836
SHA5127aa8c3ed3a2985bb8a62557fd347d1c90790cd3f5e3b0b70c221b28cb17a0c163b8b1bac45bc014148e08105232e9abef33408a4d648ddc5362795e5669e3697
-
Filesize
341KB
MD520e21e63bb7a95492aec18de6aa85ab9
SHA16cbf2079a42d86bf155c06c7ad5360c539c02b15
SHA25696a9eeeaa9aace1dd6eb0ba2789bb155b64f7c45dc9bcd34b8cd34a1f33e7d17
SHA51273eb9426827ba05a432d66d750b5988e4bb9c58b34de779163a61727c3df8d272ef455d5f27684f0054bb3af725106f1fadbae3afa3f1f6de655b8d947a82b33
-
Filesize
341KB
MD520e21e63bb7a95492aec18de6aa85ab9
SHA16cbf2079a42d86bf155c06c7ad5360c539c02b15
SHA25696a9eeeaa9aace1dd6eb0ba2789bb155b64f7c45dc9bcd34b8cd34a1f33e7d17
SHA51273eb9426827ba05a432d66d750b5988e4bb9c58b34de779163a61727c3df8d272ef455d5f27684f0054bb3af725106f1fadbae3afa3f1f6de655b8d947a82b33
-
Filesize
1.0MB
MD5fec7a2829f2fd7467159c25d701a29fe
SHA10b077b6731d441010ecd1280ad38dd5771ad530a
SHA25614e97c0264a6d8855374a38686d04ff6fd3fdcb7b8b7e9cbf83f1587bdd8e4f4
SHA5126ea2563959094f07e96ece1d5513806cb760f81970bb9e3aa3dd92825ea68f4aa3acad075ac1a2470bf458b7db08483f97f3eaa37fbd683d752ac51b7551276f
-
Filesize
1.0MB
MD5fec7a2829f2fd7467159c25d701a29fe
SHA10b077b6731d441010ecd1280ad38dd5771ad530a
SHA25614e97c0264a6d8855374a38686d04ff6fd3fdcb7b8b7e9cbf83f1587bdd8e4f4
SHA5126ea2563959094f07e96ece1d5513806cb760f81970bb9e3aa3dd92825ea68f4aa3acad075ac1a2470bf458b7db08483f97f3eaa37fbd683d752ac51b7551276f
-
Filesize
4.2MB
MD5cf959af6b601cd04c91de4924df6e70b
SHA1f05fdab932b897988e2199614c93a90b9ab14028
SHA25645126c30d6487eec1fc4938f98cc73ea44ef7164411efec797174a9cae29c189
SHA51290677cae45df50dbf9c4c719d704b4a71d91b565d8cdda825dfc744ae7c8dcdc6feb6d7c479187ec17eb3e759999cae4e95d870bb31860f0f07dee93fde2a63c
-
Filesize
1.4MB
MD5ccd0fbb4913db0d3838b127c98fb1ea3
SHA1b8e658d4d27168d891cea5b263219274798ff874
SHA256500d2fac3896c600a3248754d077200b6fcb68ef7f95ad17742bb305fb879ea2
SHA51245c3b068b4afc1331f2d7322e06b6e373ba64c498de0b4b0134536512b6b98a5850bd7a814e43111557ee2c6df921290238c7b8aa7415f3c0072432b182d88a6
-
Filesize
1.4MB
MD5ccd0fbb4913db0d3838b127c98fb1ea3
SHA1b8e658d4d27168d891cea5b263219274798ff874
SHA256500d2fac3896c600a3248754d077200b6fcb68ef7f95ad17742bb305fb879ea2
SHA51245c3b068b4afc1331f2d7322e06b6e373ba64c498de0b4b0134536512b6b98a5850bd7a814e43111557ee2c6df921290238c7b8aa7415f3c0072432b182d88a6
-
Filesize
1.2MB
MD5ddfb2151c3317d654b5a22d6daebad89
SHA159df7705c5619ed81d9145114c38149096f2f113
SHA256938629f85249f09e6095a8465fdbd1b3facbb59021c0602d7509edc85ee73f87
SHA51273239277c4116190d59d2064e92ea1cc31d2a38964e7794add97c362e3ede1413f69862570c8a56f035b77128f853f4aad9fbb0f2e59c6b0330d43c9721fa10d
-
Filesize
1.2MB
MD5ddfb2151c3317d654b5a22d6daebad89
SHA159df7705c5619ed81d9145114c38149096f2f113
SHA256938629f85249f09e6095a8465fdbd1b3facbb59021c0602d7509edc85ee73f87
SHA51273239277c4116190d59d2064e92ea1cc31d2a38964e7794add97c362e3ede1413f69862570c8a56f035b77128f853f4aad9fbb0f2e59c6b0330d43c9721fa10d
-
Filesize
174KB
MD55982e6e61e7e8517743795234f597729
SHA13120e0cd341f2f644c396a893be78ca6977aafc3
SHA2565110c4f5bc564e336c2071da6895a90005e3a9b4c2fecaef873a842da16c759e
SHA5124004e357070487c7aaa01a2b2c8ceebec7eced31d1ba51a705a154ff098ff3757ed9d0f54a324c736d4e0253d87922aae4513d6c5fad5c34f4aaa893bd11aa5a
-
Filesize
174KB
MD55982e6e61e7e8517743795234f597729
SHA13120e0cd341f2f644c396a893be78ca6977aafc3
SHA2565110c4f5bc564e336c2071da6895a90005e3a9b4c2fecaef873a842da16c759e
SHA5124004e357070487c7aaa01a2b2c8ceebec7eced31d1ba51a705a154ff098ff3757ed9d0f54a324c736d4e0253d87922aae4513d6c5fad5c34f4aaa893bd11aa5a
-
Filesize
1.1MB
MD5805063ac78de460653ed26a869a6b402
SHA1f6a050516409c338ab89e1053b69a5e6d3f07626
SHA25615526dbd8061eff4a7c89b69128c03ee70af88b53fb4139924eee6c9e3f4a91d
SHA5124ff9786d13d55e1de1e5047f1044a5ffb6380eefc097242ed781109c7cd8a8ad26245ccbe261c36b0f72c59b64969c7ab178776480b2dcf8569460bac4180f1f
-
Filesize
1.1MB
MD5805063ac78de460653ed26a869a6b402
SHA1f6a050516409c338ab89e1053b69a5e6d3f07626
SHA25615526dbd8061eff4a7c89b69128c03ee70af88b53fb4139924eee6c9e3f4a91d
SHA5124ff9786d13d55e1de1e5047f1044a5ffb6380eefc097242ed781109c7cd8a8ad26245ccbe261c36b0f72c59b64969c7ab178776480b2dcf8569460bac4180f1f
-
Filesize
1.1MB
MD5f7d31a3a2f59954c11ed9a7972ea6779
SHA1bfe6583fd23008c6f8b647b1fbf41f39fb2c3867
SHA256fb88c7733caea334432f8874db4b7181c8cb4fb6cdca93e4acdcf5c76f311e6c
SHA51263884b13cfce3232bce69dfdf115eb4c9e3ef97b8075484fc93cd96f0c9176dd39721797887903a1b061ddc7b65fecc60ed11a941317c955a2a92c1c329c9d35
-
Filesize
1.1MB
MD5f7d31a3a2f59954c11ed9a7972ea6779
SHA1bfe6583fd23008c6f8b647b1fbf41f39fb2c3867
SHA256fb88c7733caea334432f8874db4b7181c8cb4fb6cdca93e4acdcf5c76f311e6c
SHA51263884b13cfce3232bce69dfdf115eb4c9e3ef97b8075484fc93cd96f0c9176dd39721797887903a1b061ddc7b65fecc60ed11a941317c955a2a92c1c329c9d35
-
Filesize
1.6MB
MD5549d7d003df5372cc0b8f87caec0e911
SHA1fb04a8bdd464ac5b8a4e8bf12d475398d6801a9b
SHA2564c538dd5a79f04022fcb40ba81a0342d7b8c7c08aa3c31d45849af38635426c0
SHA512af0eb33597f72bea220c0122fce2de9d1619bbb7ad8d7e389f18fffdb31d9cf89d7ecc39b40a8eae0237626f1d877278d50d57fcfb46226c90efcf89a9a57aee
-
Filesize
1.6MB
MD5549d7d003df5372cc0b8f87caec0e911
SHA1fb04a8bdd464ac5b8a4e8bf12d475398d6801a9b
SHA2564c538dd5a79f04022fcb40ba81a0342d7b8c7c08aa3c31d45849af38635426c0
SHA512af0eb33597f72bea220c0122fce2de9d1619bbb7ad8d7e389f18fffdb31d9cf89d7ecc39b40a8eae0237626f1d877278d50d57fcfb46226c90efcf89a9a57aee
-
Filesize
626KB
MD52e53a2df33d266465969b124f5d03908
SHA18c649392ff1ba4261dfc4c46e19b1750eb20fa7c
SHA2566611692f68ce54e6e83539d4d5ba0b8eb79cd544b44f36055e13139114a5fb6a
SHA512226b30c5f3c62b1c61b5a51e1b99d61c8a884ce0e7738e26030aa3eeb67aacc031516bd016ba093864679f345edbb651314b11aac8bda016304a671762112083
-
Filesize
626KB
MD52e53a2df33d266465969b124f5d03908
SHA18c649392ff1ba4261dfc4c46e19b1750eb20fa7c
SHA2566611692f68ce54e6e83539d4d5ba0b8eb79cd544b44f36055e13139114a5fb6a
SHA512226b30c5f3c62b1c61b5a51e1b99d61c8a884ce0e7738e26030aa3eeb67aacc031516bd016ba093864679f345edbb651314b11aac8bda016304a671762112083
-
Filesize
958KB
MD5dcff2b9516af894d2db2b581cfaff393
SHA1a9c2a25894c1b5fc3ff9fe2ab99ca80667fadbb2
SHA2568924fcddb644579aa64f06b6f073b68634da046fdcb33e205056c11a9238b376
SHA51260c7dabbda4d329a81e00388696678344c0ba2a4c48edcf525286989cf5cde5f1a930b55476cbbe7ba0296febc0e1598e528f9abccf97dbe75ecb9af0a0c813d
-
Filesize
958KB
MD5dcff2b9516af894d2db2b581cfaff393
SHA1a9c2a25894c1b5fc3ff9fe2ab99ca80667fadbb2
SHA2568924fcddb644579aa64f06b6f073b68634da046fdcb33e205056c11a9238b376
SHA51260c7dabbda4d329a81e00388696678344c0ba2a4c48edcf525286989cf5cde5f1a930b55476cbbe7ba0296febc0e1598e528f9abccf97dbe75ecb9af0a0c813d
-
Filesize
1.6MB
MD59cdc9354763b79855ff40826e8e52fc7
SHA1d60ede245c7ccf6081f6a1197795b401218d5ba5
SHA256e0a146888858bfdda248e74c11b13be2028a2f1364b12d212f472fdf4cc3c4a2
SHA51248b5a60658c53e59ef326720c5e9e68f85027fa24390ca8d5ad6a0ad149d013e594ba01be807e73ad106309e0c10333b1b30d110bdd46e57d889fac91ee6d59c
-
Filesize
1.6MB
MD59cdc9354763b79855ff40826e8e52fc7
SHA1d60ede245c7ccf6081f6a1197795b401218d5ba5
SHA256e0a146888858bfdda248e74c11b13be2028a2f1364b12d212f472fdf4cc3c4a2
SHA51248b5a60658c53e59ef326720c5e9e68f85027fa24390ca8d5ad6a0ad149d013e594ba01be807e73ad106309e0c10333b1b30d110bdd46e57d889fac91ee6d59c
-
Filesize
1.8MB
MD5c3da82208d01a218c06a79bbecd7c9a3
SHA17bf749446eb989acc9929c057a144b28ec8f590c
SHA25688908fa0fdbba2a879ec3b289f2e78437ec701f7b7f260dd4885afa1c606950e
SHA5121673cb2c949429dc9625e5b568afcf7ba89d4cdde2c7e064e1a0b6e76078b2537de41807017c7b0cb37dfec5fc5c6ef91bf5cad2e9bfbb0ab35d314fd4debf52
-
Filesize
1.8MB
MD5c3da82208d01a218c06a79bbecd7c9a3
SHA17bf749446eb989acc9929c057a144b28ec8f590c
SHA25688908fa0fdbba2a879ec3b289f2e78437ec701f7b7f260dd4885afa1c606950e
SHA5121673cb2c949429dc9625e5b568afcf7ba89d4cdde2c7e064e1a0b6e76078b2537de41807017c7b0cb37dfec5fc5c6ef91bf5cad2e9bfbb0ab35d314fd4debf52
-
Filesize
524KB
MD574a931dcded3700c8c9ba5881d42ae4b
SHA11bc75f25e41486bc1a1eefd32402064343d70f63
SHA25638f22356d6a9732fd61fe057cbb9629c878a6323d4aa946b878aa32501589f9e
SHA512a0e5733130a35e66f889472641f71d3cf6ee536daaea47516a13078fadb73fbe85bff8374d218cea82c8bb5e1d110a5aa61df9f5478f7ad7107adc24162d24cb
-
Filesize
524KB
MD574a931dcded3700c8c9ba5881d42ae4b
SHA11bc75f25e41486bc1a1eefd32402064343d70f63
SHA25638f22356d6a9732fd61fe057cbb9629c878a6323d4aa946b878aa32501589f9e
SHA512a0e5733130a35e66f889472641f71d3cf6ee536daaea47516a13078fadb73fbe85bff8374d218cea82c8bb5e1d110a5aa61df9f5478f7ad7107adc24162d24cb
-
Filesize
324KB
MD599214da4f1eda1a69ea8dcfafa0c0341
SHA1047e1a56473dec64db1ff00cbe4d3f81c664c3cd
SHA256f918a852b93fa616d39888079fcc42313877681dce3136a62b3dba606e982b3b
SHA512893abd9f2d641fa11c84efe4e81a876b409ca08404851e32ae42e099490c155312dc3bde04dd129a1d6d11dacdb8a10ec72e1a39282632021cba7a429494d1bd
-
Filesize
324KB
MD599214da4f1eda1a69ea8dcfafa0c0341
SHA1047e1a56473dec64db1ff00cbe4d3f81c664c3cd
SHA256f918a852b93fa616d39888079fcc42313877681dce3136a62b3dba606e982b3b
SHA512893abd9f2d641fa11c84efe4e81a876b409ca08404851e32ae42e099490c155312dc3bde04dd129a1d6d11dacdb8a10ec72e1a39282632021cba7a429494d1bd
-
Filesize
186KB
MD53a24a41f3044d90555f6cdea0f2533f8
SHA125a1913e9e41dd13039d023a5f63a050256c72ca
SHA2565e900b7d563b6dc3f5c5db7386ae7ea83ec512b1a72a1cac6d16d17110a90253
SHA5128d12aca702a3f81329fe0dad30b28269fd9933b5493e8d978080fbee9b66a1727b76b6230d910a9cda1ca68141b55ef7b63fd3f7de077eb453da7d8b44f5b837
-
Filesize
186KB
MD53a24a41f3044d90555f6cdea0f2533f8
SHA125a1913e9e41dd13039d023a5f63a050256c72ca
SHA2565e900b7d563b6dc3f5c5db7386ae7ea83ec512b1a72a1cac6d16d17110a90253
SHA5128d12aca702a3f81329fe0dad30b28269fd9933b5493e8d978080fbee9b66a1727b76b6230d910a9cda1ca68141b55ef7b63fd3f7de077eb453da7d8b44f5b837
-
Filesize
186KB
MD53a24a41f3044d90555f6cdea0f2533f8
SHA125a1913e9e41dd13039d023a5f63a050256c72ca
SHA2565e900b7d563b6dc3f5c5db7386ae7ea83ec512b1a72a1cac6d16d17110a90253
SHA5128d12aca702a3f81329fe0dad30b28269fd9933b5493e8d978080fbee9b66a1727b76b6230d910a9cda1ca68141b55ef7b63fd3f7de077eb453da7d8b44f5b837
-
Filesize
222KB
MD5089cfb1cb17cb2999c1bb529d9a6a9cc
SHA1042a2cde04a6958caa108c47e68eb2802d5be623
SHA2567146f5f101e43bf57667ee75cc3afeab3c9d6c12e7b2a0b4ac8a6cd9318d23ca
SHA5121c5c954a8f04738304bba8ff44c102686d5e8ae6a71eb928f93a73610288f430991e1eda4febbe53611451b788bcdc23a19c4174cb5f08e1c45b957041146047
-
Filesize
222KB
MD5089cfb1cb17cb2999c1bb529d9a6a9cc
SHA1042a2cde04a6958caa108c47e68eb2802d5be623
SHA2567146f5f101e43bf57667ee75cc3afeab3c9d6c12e7b2a0b4ac8a6cd9318d23ca
SHA5121c5c954a8f04738304bba8ff44c102686d5e8ae6a71eb928f93a73610288f430991e1eda4febbe53611451b788bcdc23a19c4174cb5f08e1c45b957041146047
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD502f8652ecec423d1ebd72ff3863579fe
SHA1d9772bd7f3978dc302b44216d2e3a2d62e0b0544
SHA25637c53e07bac027475dbc6122b2e105a431effa21c8e554f5c44e8652c8fa84b9
SHA512c319907b9f0e8606e783a7f782c0d4241c3aedf5b783961c77f72feee94709c080569979ac5c005bc35aba65e9a4f1e37d658f4baac44b114b4c5234900c47a9
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9