Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 21:19
Behavioral task
behavioral1
Sample
NEAS.492a610ff404253edf048ec6622c0b70.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.492a610ff404253edf048ec6622c0b70.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.492a610ff404253edf048ec6622c0b70.exe
-
Size
256KB
-
MD5
492a610ff404253edf048ec6622c0b70
-
SHA1
f2eec307ecc2187578838a869c8eae2448bfc26f
-
SHA256
7bedda163e9a557124f864fd68dfe86f32cf666140d208bb1c989c7d86ab1d0b
-
SHA512
a8674ccb2b9c977b0f1ac889487ab7f6b8d4815aa7970ffe805a590b8886ac9457d1fe1d83001fe3e7fb4e5d7833be2e862ba7eff78a65beafebc290ec8b8c5a
-
SSDEEP
6144:vhbZ5hMTNFf8LAurlEzAX7oAwfSZ4sXVzQI:ZtXMzqrllX7XwyEI
Malware Config
Signatures
-
Executes dropped EXE 26 IoCs
pid Process 3152 neas.492a610ff404253edf048ec6622c0b70_3202.exe 4144 neas.492a610ff404253edf048ec6622c0b70_3202a.exe 4100 neas.492a610ff404253edf048ec6622c0b70_3202b.exe 4884 neas.492a610ff404253edf048ec6622c0b70_3202c.exe 2352 neas.492a610ff404253edf048ec6622c0b70_3202d.exe 4448 neas.492a610ff404253edf048ec6622c0b70_3202e.exe 2908 neas.492a610ff404253edf048ec6622c0b70_3202f.exe 2036 neas.492a610ff404253edf048ec6622c0b70_3202g.exe 5012 neas.492a610ff404253edf048ec6622c0b70_3202h.exe 728 neas.492a610ff404253edf048ec6622c0b70_3202i.exe 3788 neas.492a610ff404253edf048ec6622c0b70_3202j.exe 3684 neas.492a610ff404253edf048ec6622c0b70_3202k.exe 4832 neas.492a610ff404253edf048ec6622c0b70_3202l.exe 3568 neas.492a610ff404253edf048ec6622c0b70_3202m.exe 736 neas.492a610ff404253edf048ec6622c0b70_3202n.exe 3948 neas.492a610ff404253edf048ec6622c0b70_3202o.exe 3728 neas.492a610ff404253edf048ec6622c0b70_3202p.exe 1176 neas.492a610ff404253edf048ec6622c0b70_3202q.exe 4796 neas.492a610ff404253edf048ec6622c0b70_3202r.exe 5076 neas.492a610ff404253edf048ec6622c0b70_3202s.exe 2104 neas.492a610ff404253edf048ec6622c0b70_3202t.exe 4572 neas.492a610ff404253edf048ec6622c0b70_3202u.exe 1364 neas.492a610ff404253edf048ec6622c0b70_3202v.exe 2136 neas.492a610ff404253edf048ec6622c0b70_3202w.exe 1304 neas.492a610ff404253edf048ec6622c0b70_3202x.exe 456 neas.492a610ff404253edf048ec6622c0b70_3202y.exe -
resource yara_rule behavioral2/memory/1552-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0007000000022df2-5.dat upx behavioral2/files/0x0007000000022df2-8.dat upx behavioral2/files/0x0007000000022df2-7.dat upx behavioral2/memory/1552-15-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022df4-18.dat upx behavioral2/memory/3152-9-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022df4-17.dat upx behavioral2/files/0x0006000000022df5-26.dat upx behavioral2/memory/4144-25-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022df5-27.dat upx behavioral2/files/0x0006000000022df6-36.dat upx behavioral2/memory/4100-35-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022df6-34.dat upx behavioral2/files/0x0006000000022df7-43.dat upx behavioral2/memory/2352-53-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/4884-51-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/2352-50-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022df7-44.dat upx behavioral2/files/0x0006000000022df8-55.dat upx behavioral2/files/0x0006000000022df9-63.dat upx behavioral2/files/0x0007000000022df0-73.dat upx behavioral2/memory/2036-75-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0007000000022df0-76.dat upx behavioral2/memory/2908-74-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/2908-71-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/4448-65-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022df9-64.dat upx behavioral2/memory/4448-56-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022df8-54.dat upx behavioral2/files/0x0006000000022dfa-83.dat upx behavioral2/files/0x0006000000022dfa-85.dat upx behavioral2/files/0x0006000000022dfb-93.dat upx behavioral2/memory/5012-91-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022dfb-94.dat upx behavioral2/memory/2036-84-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022dfc-101.dat upx behavioral2/memory/728-103-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/3152-104-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/3788-105-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022dfc-102.dat upx behavioral2/files/0x0006000000022dfd-113.dat upx behavioral2/memory/3788-114-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022dfd-112.dat upx behavioral2/files/0x0006000000022dff-121.dat upx behavioral2/files/0x0006000000022dff-122.dat upx behavioral2/memory/3684-129-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022e01-141.dat upx behavioral2/memory/3568-143-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022e01-142.dat upx behavioral2/files/0x0006000000022e02-151.dat upx behavioral2/files/0x0006000000022e02-150.dat upx behavioral2/memory/3568-139-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022e00-133.dat upx behavioral2/memory/4832-132-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022e00-131.dat upx behavioral2/memory/4832-123-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/3948-155-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/736-159-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022e03-160.dat upx behavioral2/files/0x0006000000022e03-161.dat upx behavioral2/files/0x0006000000022e06-169.dat upx behavioral2/memory/3728-168-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/1176-170-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202c.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202e.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202p.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202o.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202d.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202g.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202k.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202j.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202x.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202w.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202f.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202m.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202l.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202q.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202p.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202u.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202t.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202a.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202h.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202g.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202j.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202n.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202t.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202w.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202v.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202y.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202l.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202k.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202o.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202n.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202r.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202q.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202.exe\"" NEAS.492a610ff404253edf048ec6622c0b70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202b.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202i.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202h.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202s.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202r.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\neas.492a610ff404253edf048ec6622c0b70_3202v.exe\"" neas.492a610ff404253edf048ec6622c0b70_3202u.exe -
Modifies registry class 54 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202p.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202t.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202a.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202e.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202u.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202y.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} NEAS.492a610ff404253edf048ec6622c0b70.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202i.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202v.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202n.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202u.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202h.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202x.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202l.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202w.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202e.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202k.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202m.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202n.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202s.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202h.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202k.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202l.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202r.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202g.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202j.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202q.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202x.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202y.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 NEAS.492a610ff404253edf048ec6622c0b70.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202p.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202r.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202w.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202v.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202c.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202j.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202o.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202q.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202t.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202d.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202o.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202s.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202g.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} neas.492a610ff404253edf048ec6622c0b70_3202a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202i.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 99caa6d80a48fc06 neas.492a610ff404253edf048ec6622c0b70_3202m.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1552 wrote to memory of 3152 1552 NEAS.492a610ff404253edf048ec6622c0b70.exe 87 PID 1552 wrote to memory of 3152 1552 NEAS.492a610ff404253edf048ec6622c0b70.exe 87 PID 1552 wrote to memory of 3152 1552 NEAS.492a610ff404253edf048ec6622c0b70.exe 87 PID 3152 wrote to memory of 4144 3152 neas.492a610ff404253edf048ec6622c0b70_3202.exe 88 PID 3152 wrote to memory of 4144 3152 neas.492a610ff404253edf048ec6622c0b70_3202.exe 88 PID 3152 wrote to memory of 4144 3152 neas.492a610ff404253edf048ec6622c0b70_3202.exe 88 PID 4144 wrote to memory of 4100 4144 neas.492a610ff404253edf048ec6622c0b70_3202a.exe 89 PID 4144 wrote to memory of 4100 4144 neas.492a610ff404253edf048ec6622c0b70_3202a.exe 89 PID 4144 wrote to memory of 4100 4144 neas.492a610ff404253edf048ec6622c0b70_3202a.exe 89 PID 4100 wrote to memory of 4884 4100 neas.492a610ff404253edf048ec6622c0b70_3202b.exe 90 PID 4100 wrote to memory of 4884 4100 neas.492a610ff404253edf048ec6622c0b70_3202b.exe 90 PID 4100 wrote to memory of 4884 4100 neas.492a610ff404253edf048ec6622c0b70_3202b.exe 90 PID 4884 wrote to memory of 2352 4884 neas.492a610ff404253edf048ec6622c0b70_3202c.exe 91 PID 4884 wrote to memory of 2352 4884 neas.492a610ff404253edf048ec6622c0b70_3202c.exe 91 PID 4884 wrote to memory of 2352 4884 neas.492a610ff404253edf048ec6622c0b70_3202c.exe 91 PID 2352 wrote to memory of 4448 2352 neas.492a610ff404253edf048ec6622c0b70_3202d.exe 92 PID 2352 wrote to memory of 4448 2352 neas.492a610ff404253edf048ec6622c0b70_3202d.exe 92 PID 2352 wrote to memory of 4448 2352 neas.492a610ff404253edf048ec6622c0b70_3202d.exe 92 PID 4448 wrote to memory of 2908 4448 neas.492a610ff404253edf048ec6622c0b70_3202e.exe 95 PID 4448 wrote to memory of 2908 4448 neas.492a610ff404253edf048ec6622c0b70_3202e.exe 95 PID 4448 wrote to memory of 2908 4448 neas.492a610ff404253edf048ec6622c0b70_3202e.exe 95 PID 2908 wrote to memory of 2036 2908 neas.492a610ff404253edf048ec6622c0b70_3202f.exe 93 PID 2908 wrote to memory of 2036 2908 neas.492a610ff404253edf048ec6622c0b70_3202f.exe 93 PID 2908 wrote to memory of 2036 2908 neas.492a610ff404253edf048ec6622c0b70_3202f.exe 93 PID 2036 wrote to memory of 5012 2036 neas.492a610ff404253edf048ec6622c0b70_3202g.exe 96 PID 2036 wrote to memory of 5012 2036 neas.492a610ff404253edf048ec6622c0b70_3202g.exe 96 PID 2036 wrote to memory of 5012 2036 neas.492a610ff404253edf048ec6622c0b70_3202g.exe 96 PID 5012 wrote to memory of 728 5012 neas.492a610ff404253edf048ec6622c0b70_3202h.exe 97 PID 5012 wrote to memory of 728 5012 neas.492a610ff404253edf048ec6622c0b70_3202h.exe 97 PID 5012 wrote to memory of 728 5012 neas.492a610ff404253edf048ec6622c0b70_3202h.exe 97 PID 728 wrote to memory of 3788 728 neas.492a610ff404253edf048ec6622c0b70_3202i.exe 98 PID 728 wrote to memory of 3788 728 neas.492a610ff404253edf048ec6622c0b70_3202i.exe 98 PID 728 wrote to memory of 3788 728 neas.492a610ff404253edf048ec6622c0b70_3202i.exe 98 PID 3788 wrote to memory of 3684 3788 neas.492a610ff404253edf048ec6622c0b70_3202j.exe 99 PID 3788 wrote to memory of 3684 3788 neas.492a610ff404253edf048ec6622c0b70_3202j.exe 99 PID 3788 wrote to memory of 3684 3788 neas.492a610ff404253edf048ec6622c0b70_3202j.exe 99 PID 3684 wrote to memory of 4832 3684 neas.492a610ff404253edf048ec6622c0b70_3202k.exe 100 PID 3684 wrote to memory of 4832 3684 neas.492a610ff404253edf048ec6622c0b70_3202k.exe 100 PID 3684 wrote to memory of 4832 3684 neas.492a610ff404253edf048ec6622c0b70_3202k.exe 100 PID 4832 wrote to memory of 3568 4832 neas.492a610ff404253edf048ec6622c0b70_3202l.exe 101 PID 4832 wrote to memory of 3568 4832 neas.492a610ff404253edf048ec6622c0b70_3202l.exe 101 PID 4832 wrote to memory of 3568 4832 neas.492a610ff404253edf048ec6622c0b70_3202l.exe 101 PID 3568 wrote to memory of 736 3568 neas.492a610ff404253edf048ec6622c0b70_3202m.exe 102 PID 3568 wrote to memory of 736 3568 neas.492a610ff404253edf048ec6622c0b70_3202m.exe 102 PID 3568 wrote to memory of 736 3568 neas.492a610ff404253edf048ec6622c0b70_3202m.exe 102 PID 736 wrote to memory of 3948 736 neas.492a610ff404253edf048ec6622c0b70_3202n.exe 103 PID 736 wrote to memory of 3948 736 neas.492a610ff404253edf048ec6622c0b70_3202n.exe 103 PID 736 wrote to memory of 3948 736 neas.492a610ff404253edf048ec6622c0b70_3202n.exe 103 PID 3948 wrote to memory of 3728 3948 neas.492a610ff404253edf048ec6622c0b70_3202o.exe 104 PID 3948 wrote to memory of 3728 3948 neas.492a610ff404253edf048ec6622c0b70_3202o.exe 104 PID 3948 wrote to memory of 3728 3948 neas.492a610ff404253edf048ec6622c0b70_3202o.exe 104 PID 3728 wrote to memory of 1176 3728 neas.492a610ff404253edf048ec6622c0b70_3202p.exe 105 PID 3728 wrote to memory of 1176 3728 neas.492a610ff404253edf048ec6622c0b70_3202p.exe 105 PID 3728 wrote to memory of 1176 3728 neas.492a610ff404253edf048ec6622c0b70_3202p.exe 105 PID 1176 wrote to memory of 4796 1176 neas.492a610ff404253edf048ec6622c0b70_3202q.exe 106 PID 1176 wrote to memory of 4796 1176 neas.492a610ff404253edf048ec6622c0b70_3202q.exe 106 PID 1176 wrote to memory of 4796 1176 neas.492a610ff404253edf048ec6622c0b70_3202q.exe 106 PID 4796 wrote to memory of 5076 4796 neas.492a610ff404253edf048ec6622c0b70_3202r.exe 107 PID 4796 wrote to memory of 5076 4796 neas.492a610ff404253edf048ec6622c0b70_3202r.exe 107 PID 4796 wrote to memory of 5076 4796 neas.492a610ff404253edf048ec6622c0b70_3202r.exe 107 PID 5076 wrote to memory of 2104 5076 neas.492a610ff404253edf048ec6622c0b70_3202s.exe 108 PID 5076 wrote to memory of 2104 5076 neas.492a610ff404253edf048ec6622c0b70_3202s.exe 108 PID 5076 wrote to memory of 2104 5076 neas.492a610ff404253edf048ec6622c0b70_3202s.exe 108 PID 2104 wrote to memory of 4572 2104 neas.492a610ff404253edf048ec6622c0b70_3202t.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.492a610ff404253edf048ec6622c0b70.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.492a610ff404253edf048ec6622c0b70.exe"1⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1552 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3152 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202a.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202a.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4144 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202b.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202b.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4100 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202c.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202c.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4884 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202d.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202d.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202e.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202e.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4448 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202f.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202f.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2908
-
-
-
-
-
-
-
-
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202g.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202g.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2036 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202h.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202h.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5012 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202i.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202i.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:728 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202j.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202j.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3788 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202k.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202k.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3684 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202l.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202l.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4832 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202m.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202m.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3568 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202n.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202n.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:736 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202o.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202o.exe9⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3948 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202p.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202p.exe10⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3728 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202q.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202q.exe11⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1176 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202r.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202r.exe12⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4796 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202s.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202s.exe13⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5076 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202t.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202t.exe14⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2104 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202u.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202u.exe15⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:4572 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202v.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202v.exe16⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:1364 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202w.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202w.exe17⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:2136 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202x.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202x.exe18⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:1304 -
\??\c:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202y.exec:\users\admin\appdata\local\temp\neas.492a610ff404253edf048ec6622c0b70_3202y.exe19⤵
- Executes dropped EXE
- Modifies registry class
PID:456
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5ed7b341861dc782c0bfe07447f132984
SHA15dcc403687f147f5014f8035fcd41082f16778a5
SHA25694146766fe425487d1227a201d9b2983d67db44a75c0bd8d36a8835d48aa8a78
SHA5125a2f7c4b12ced1c7cb566688512625b48865d30eb621a63c072694b7610cc88f2c52b71ae28169028f1c0d16c8e57d49781d949a51d2dffee86439203f4bc1d3
-
Filesize
256KB
MD5ed7b341861dc782c0bfe07447f132984
SHA15dcc403687f147f5014f8035fcd41082f16778a5
SHA25694146766fe425487d1227a201d9b2983d67db44a75c0bd8d36a8835d48aa8a78
SHA5125a2f7c4b12ced1c7cb566688512625b48865d30eb621a63c072694b7610cc88f2c52b71ae28169028f1c0d16c8e57d49781d949a51d2dffee86439203f4bc1d3
-
Filesize
256KB
MD5ed7b341861dc782c0bfe07447f132984
SHA15dcc403687f147f5014f8035fcd41082f16778a5
SHA25694146766fe425487d1227a201d9b2983d67db44a75c0bd8d36a8835d48aa8a78
SHA5125a2f7c4b12ced1c7cb566688512625b48865d30eb621a63c072694b7610cc88f2c52b71ae28169028f1c0d16c8e57d49781d949a51d2dffee86439203f4bc1d3
-
Filesize
256KB
MD5ed7b341861dc782c0bfe07447f132984
SHA15dcc403687f147f5014f8035fcd41082f16778a5
SHA25694146766fe425487d1227a201d9b2983d67db44a75c0bd8d36a8835d48aa8a78
SHA5125a2f7c4b12ced1c7cb566688512625b48865d30eb621a63c072694b7610cc88f2c52b71ae28169028f1c0d16c8e57d49781d949a51d2dffee86439203f4bc1d3
-
Filesize
256KB
MD5ed7b341861dc782c0bfe07447f132984
SHA15dcc403687f147f5014f8035fcd41082f16778a5
SHA25694146766fe425487d1227a201d9b2983d67db44a75c0bd8d36a8835d48aa8a78
SHA5125a2f7c4b12ced1c7cb566688512625b48865d30eb621a63c072694b7610cc88f2c52b71ae28169028f1c0d16c8e57d49781d949a51d2dffee86439203f4bc1d3
-
Filesize
256KB
MD5ed7b341861dc782c0bfe07447f132984
SHA15dcc403687f147f5014f8035fcd41082f16778a5
SHA25694146766fe425487d1227a201d9b2983d67db44a75c0bd8d36a8835d48aa8a78
SHA5125a2f7c4b12ced1c7cb566688512625b48865d30eb621a63c072694b7610cc88f2c52b71ae28169028f1c0d16c8e57d49781d949a51d2dffee86439203f4bc1d3
-
Filesize
256KB
MD5ed7b341861dc782c0bfe07447f132984
SHA15dcc403687f147f5014f8035fcd41082f16778a5
SHA25694146766fe425487d1227a201d9b2983d67db44a75c0bd8d36a8835d48aa8a78
SHA5125a2f7c4b12ced1c7cb566688512625b48865d30eb621a63c072694b7610cc88f2c52b71ae28169028f1c0d16c8e57d49781d949a51d2dffee86439203f4bc1d3
-
Filesize
256KB
MD5ed7b341861dc782c0bfe07447f132984
SHA15dcc403687f147f5014f8035fcd41082f16778a5
SHA25694146766fe425487d1227a201d9b2983d67db44a75c0bd8d36a8835d48aa8a78
SHA5125a2f7c4b12ced1c7cb566688512625b48865d30eb621a63c072694b7610cc88f2c52b71ae28169028f1c0d16c8e57d49781d949a51d2dffee86439203f4bc1d3
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD5ed7b341861dc782c0bfe07447f132984
SHA15dcc403687f147f5014f8035fcd41082f16778a5
SHA25694146766fe425487d1227a201d9b2983d67db44a75c0bd8d36a8835d48aa8a78
SHA5125a2f7c4b12ced1c7cb566688512625b48865d30eb621a63c072694b7610cc88f2c52b71ae28169028f1c0d16c8e57d49781d949a51d2dffee86439203f4bc1d3
-
Filesize
256KB
MD5ed7b341861dc782c0bfe07447f132984
SHA15dcc403687f147f5014f8035fcd41082f16778a5
SHA25694146766fe425487d1227a201d9b2983d67db44a75c0bd8d36a8835d48aa8a78
SHA5125a2f7c4b12ced1c7cb566688512625b48865d30eb621a63c072694b7610cc88f2c52b71ae28169028f1c0d16c8e57d49781d949a51d2dffee86439203f4bc1d3
-
Filesize
256KB
MD5ed7b341861dc782c0bfe07447f132984
SHA15dcc403687f147f5014f8035fcd41082f16778a5
SHA25694146766fe425487d1227a201d9b2983d67db44a75c0bd8d36a8835d48aa8a78
SHA5125a2f7c4b12ced1c7cb566688512625b48865d30eb621a63c072694b7610cc88f2c52b71ae28169028f1c0d16c8e57d49781d949a51d2dffee86439203f4bc1d3
-
Filesize
256KB
MD5ed7b341861dc782c0bfe07447f132984
SHA15dcc403687f147f5014f8035fcd41082f16778a5
SHA25694146766fe425487d1227a201d9b2983d67db44a75c0bd8d36a8835d48aa8a78
SHA5125a2f7c4b12ced1c7cb566688512625b48865d30eb621a63c072694b7610cc88f2c52b71ae28169028f1c0d16c8e57d49781d949a51d2dffee86439203f4bc1d3
-
Filesize
256KB
MD5ed7b341861dc782c0bfe07447f132984
SHA15dcc403687f147f5014f8035fcd41082f16778a5
SHA25694146766fe425487d1227a201d9b2983d67db44a75c0bd8d36a8835d48aa8a78
SHA5125a2f7c4b12ced1c7cb566688512625b48865d30eb621a63c072694b7610cc88f2c52b71ae28169028f1c0d16c8e57d49781d949a51d2dffee86439203f4bc1d3
-
Filesize
256KB
MD5ed7b341861dc782c0bfe07447f132984
SHA15dcc403687f147f5014f8035fcd41082f16778a5
SHA25694146766fe425487d1227a201d9b2983d67db44a75c0bd8d36a8835d48aa8a78
SHA5125a2f7c4b12ced1c7cb566688512625b48865d30eb621a63c072694b7610cc88f2c52b71ae28169028f1c0d16c8e57d49781d949a51d2dffee86439203f4bc1d3
-
Filesize
256KB
MD5ed7b341861dc782c0bfe07447f132984
SHA15dcc403687f147f5014f8035fcd41082f16778a5
SHA25694146766fe425487d1227a201d9b2983d67db44a75c0bd8d36a8835d48aa8a78
SHA5125a2f7c4b12ced1c7cb566688512625b48865d30eb621a63c072694b7610cc88f2c52b71ae28169028f1c0d16c8e57d49781d949a51d2dffee86439203f4bc1d3
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD52195d537337882e734b43778f02734ba
SHA1a1a46f021b488a90520e764e22379440951f69e2
SHA256de39a60b098e0cf7869261effe2d36cd194bb109557bc3630d2b31fea9b887c2
SHA512a44efa37374fa7fbf0abe146842a5a1fa8f1e7afaa60f430b5aa3d1cb40e1139960e1fd839d2905396bfe5170d5fa064659944a2df46389ac70a74156e649cbe
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814
-
Filesize
256KB
MD55e858f0d62d0126a7ef23b7d194fb277
SHA189890c4a60db27b55d636043da0250bef5fb902a
SHA256e6e13117689020af660c13338411a6504e93b6e0fa01a0843ec1054230d88856
SHA51267cb3164bed6275f783c0b35e59547f89243c8f67b1f783cba63b16bf8866ad8468084176c06394bf1f6c6ae3885d9a4e8b8ecd4ddeaafccbb279f4303e13814