Analysis
-
max time kernel
42s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2023 15:20
Static task
static1
Behavioral task
behavioral1
Sample
ef15df11275b22add26a92e3446af8ccc036a5fbfd46041cb494ee08ba7d6913.exe
Resource
win10v2004-20231023-en
General
-
Target
ef15df11275b22add26a92e3446af8ccc036a5fbfd46041cb494ee08ba7d6913.exe
-
Size
1.4MB
-
MD5
ccc495943afae50ef828965311e42614
-
SHA1
65cee5394249a3e03e2e918e413db83d40768c39
-
SHA256
ef15df11275b22add26a92e3446af8ccc036a5fbfd46041cb494ee08ba7d6913
-
SHA512
d5266419631aae748cc48d651993b3ff01ab402b1198d13b6e9569ef92f32772e4983783713fe84a132900023fe845e37dda821a4a90b137475235c97e61868b
-
SSDEEP
12288:U7YW7rymqw5IUHgkA6uZmiP9X6a9DhvhyJm9O:U796w5Iw8R6a9DhvhOms
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
plost
77.91.124.86:19084
Extracted
redline
kedru
77.91.124.86:19084
Extracted
redline
pixelnew2.0
194.49.94.11:80
Extracted
redline
@ytlogsbot
194.169.175.235:42691
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
redline
LiveTraffic
195.10.205.17:8122
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Glupteba payload 10 IoCs
resource yara_rule behavioral1/memory/3088-646-0x0000000002D90000-0x000000000367B000-memory.dmp family_glupteba behavioral1/memory/3088-693-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3088-743-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3088-793-0x0000000002D90000-0x000000000367B000-memory.dmp family_glupteba behavioral1/memory/3088-804-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3088-806-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3088-871-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3088-974-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3088-1025-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/6772-1123-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 14 IoCs
resource yara_rule behavioral1/files/0x0007000000022d02-41.dat family_redline behavioral1/files/0x0007000000022d02-43.dat family_redline behavioral1/memory/4220-50-0x00000000007D0000-0x000000000080C000-memory.dmp family_redline behavioral1/files/0x0006000000022d08-127.dat family_redline behavioral1/files/0x0006000000022d08-140.dat family_redline behavioral1/memory/5468-143-0x00000000005E0000-0x000000000061C000-memory.dmp family_redline behavioral1/files/0x0008000000022d1e-157.dat family_redline behavioral1/files/0x0008000000022d1e-169.dat family_redline behavioral1/memory/6040-170-0x0000000000A60000-0x0000000000A7E000-memory.dmp family_redline behavioral1/memory/5916-171-0x0000000000550000-0x00000000005AA000-memory.dmp family_redline behavioral1/memory/5916-194-0x0000000000400000-0x0000000000472000-memory.dmp family_redline behavioral1/memory/2244-440-0x00000000001C0000-0x00000000001FE000-memory.dmp family_redline behavioral1/memory/2244-510-0x0000000000400000-0x0000000000454000-memory.dmp family_redline behavioral1/memory/5744-1084-0x0000000001310000-0x000000000134C000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000022d1e-157.dat family_sectoprat behavioral1/files/0x0008000000022d1e-169.dat family_sectoprat behavioral1/memory/6040-170-0x0000000000A60000-0x0000000000A7E000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 6668 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation 82DB.exe -
Executes dropped EXE 12 IoCs
pid Process 3580 53C8.exe 1240 55DD.exe 1600 SG1AZ3fX.exe 1400 Oi0Yv5Yb.exe 4220 5830.exe 2060 do9hx6rC.exe 2012 1ll50dA6.exe 5468 2UZ845Ej.exe 5424 82DB.exe 5916 881C.exe 6040 8A30.exe 5276 8E09.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 53C8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" SG1AZ3fX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Oi0Yv5Yb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" do9hx6rC.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4984 set thread context of 1612 4984 ef15df11275b22add26a92e3446af8ccc036a5fbfd46041cb494ee08ba7d6913.exe 89 PID 2012 set thread context of 488 2012 1ll50dA6.exe 117 -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3284 sc.exe 4552 sc.exe 2772 sc.exe 5428 sc.exe 6288 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4076 4984 WerFault.exe 85 2960 488 WerFault.exe 117 4188 2012 WerFault.exe 110 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6332 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1612 AppLaunch.exe 1612 AppLaunch.exe 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1612 AppLaunch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4984 wrote to memory of 1612 4984 ef15df11275b22add26a92e3446af8ccc036a5fbfd46041cb494ee08ba7d6913.exe 89 PID 4984 wrote to memory of 1612 4984 ef15df11275b22add26a92e3446af8ccc036a5fbfd46041cb494ee08ba7d6913.exe 89 PID 4984 wrote to memory of 1612 4984 ef15df11275b22add26a92e3446af8ccc036a5fbfd46041cb494ee08ba7d6913.exe 89 PID 4984 wrote to memory of 1612 4984 ef15df11275b22add26a92e3446af8ccc036a5fbfd46041cb494ee08ba7d6913.exe 89 PID 4984 wrote to memory of 1612 4984 ef15df11275b22add26a92e3446af8ccc036a5fbfd46041cb494ee08ba7d6913.exe 89 PID 4984 wrote to memory of 1612 4984 ef15df11275b22add26a92e3446af8ccc036a5fbfd46041cb494ee08ba7d6913.exe 89 PID 3156 wrote to memory of 3580 3156 Process not Found 102 PID 3156 wrote to memory of 3580 3156 Process not Found 102 PID 3156 wrote to memory of 3580 3156 Process not Found 102 PID 3156 wrote to memory of 3112 3156 Process not Found 104 PID 3156 wrote to memory of 3112 3156 Process not Found 104 PID 3156 wrote to memory of 1240 3156 Process not Found 105 PID 3156 wrote to memory of 1240 3156 Process not Found 105 PID 3156 wrote to memory of 1240 3156 Process not Found 105 PID 3580 wrote to memory of 1600 3580 53C8.exe 106 PID 3580 wrote to memory of 1600 3580 53C8.exe 106 PID 3580 wrote to memory of 1600 3580 53C8.exe 106 PID 1600 wrote to memory of 1400 1600 SG1AZ3fX.exe 107 PID 1600 wrote to memory of 1400 1600 SG1AZ3fX.exe 107 PID 1600 wrote to memory of 1400 1600 SG1AZ3fX.exe 107 PID 3156 wrote to memory of 4220 3156 Process not Found 108 PID 3156 wrote to memory of 4220 3156 Process not Found 108 PID 3156 wrote to memory of 4220 3156 Process not Found 108 PID 1400 wrote to memory of 2060 1400 Oi0Yv5Yb.exe 109 PID 1400 wrote to memory of 2060 1400 Oi0Yv5Yb.exe 109 PID 1400 wrote to memory of 2060 1400 Oi0Yv5Yb.exe 109 PID 2060 wrote to memory of 2012 2060 do9hx6rC.exe 110 PID 2060 wrote to memory of 2012 2060 do9hx6rC.exe 110 PID 2060 wrote to memory of 2012 2060 do9hx6rC.exe 110 PID 3112 wrote to memory of 4296 3112 cmd.exe 112 PID 3112 wrote to memory of 4296 3112 cmd.exe 112 PID 2012 wrote to memory of 348 2012 1ll50dA6.exe 114 PID 2012 wrote to memory of 348 2012 1ll50dA6.exe 114 PID 2012 wrote to memory of 348 2012 1ll50dA6.exe 114 PID 4296 wrote to memory of 3956 4296 msedge.exe 115 PID 4296 wrote to memory of 3956 4296 msedge.exe 115 PID 2012 wrote to memory of 488 2012 1ll50dA6.exe 117 PID 2012 wrote to memory of 488 2012 1ll50dA6.exe 117 PID 2012 wrote to memory of 488 2012 1ll50dA6.exe 117 PID 3112 wrote to memory of 4340 3112 cmd.exe 118 PID 3112 wrote to memory of 4340 3112 cmd.exe 118 PID 4340 wrote to memory of 3464 4340 msedge.exe 119 PID 4340 wrote to memory of 3464 4340 msedge.exe 119 PID 2012 wrote to memory of 488 2012 1ll50dA6.exe 117 PID 2012 wrote to memory of 488 2012 1ll50dA6.exe 117 PID 2012 wrote to memory of 488 2012 1ll50dA6.exe 117 PID 2012 wrote to memory of 488 2012 1ll50dA6.exe 117 PID 2012 wrote to memory of 488 2012 1ll50dA6.exe 117 PID 2012 wrote to memory of 488 2012 1ll50dA6.exe 117 PID 2012 wrote to memory of 488 2012 1ll50dA6.exe 117 PID 3112 wrote to memory of 2388 3112 cmd.exe 126 PID 3112 wrote to memory of 2388 3112 cmd.exe 126 PID 4296 wrote to memory of 4860 4296 msedge.exe 121 PID 4296 wrote to memory of 4860 4296 msedge.exe 121 PID 4296 wrote to memory of 4860 4296 msedge.exe 121 PID 4296 wrote to memory of 4860 4296 msedge.exe 121 PID 4296 wrote to memory of 4860 4296 msedge.exe 121 PID 4296 wrote to memory of 4860 4296 msedge.exe 121 PID 4296 wrote to memory of 4860 4296 msedge.exe 121 PID 4296 wrote to memory of 4860 4296 msedge.exe 121 PID 4296 wrote to memory of 4860 4296 msedge.exe 121 PID 4296 wrote to memory of 4860 4296 msedge.exe 121 PID 4296 wrote to memory of 4860 4296 msedge.exe 121 PID 4296 wrote to memory of 4860 4296 msedge.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef15df11275b22add26a92e3446af8ccc036a5fbfd46041cb494ee08ba7d6913.exe"C:\Users\Admin\AppData\Local\Temp\ef15df11275b22add26a92e3446af8ccc036a5fbfd46041cb494ee08ba7d6913.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 1562⤵
- Program crash
PID:4076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4984 -ip 49841⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\53C8.exeC:\Users\Admin\AppData\Local\Temp\53C8.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SG1AZ3fX.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SG1AZ3fX.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Oi0Yv5Yb.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Oi0Yv5Yb.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\do9hx6rC.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\do9hx6rC.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1ll50dA6.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1ll50dA6.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 5407⤵
- Program crash
PID:2960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 6166⤵
- Program crash
PID:4188
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2UZ845Ej.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2UZ845Ej.exe5⤵
- Executes dropped EXE
PID:5468
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\54B4.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xbc,0x128,0x7ffa086146f8,0x7ffa08614708,0x7ffa086147183⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,5129988273438840491,3877859125732162764,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:23⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2256,5129988273438840491,3877859125732162764,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:33⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2256,5129988273438840491,3877859125732162764,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:83⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,5129988273438840491,3877859125732162764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:13⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,5129988273438840491,3877859125732162764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:13⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,5129988273438840491,3877859125732162764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:13⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,5129988273438840491,3877859125732162764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:13⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,5129988273438840491,3877859125732162764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:13⤵PID:5524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,5129988273438840491,3877859125732162764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:13⤵PID:5804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,5129988273438840491,3877859125732162764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:13⤵PID:6116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,5129988273438840491,3877859125732162764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:13⤵PID:5960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,5129988273438840491,3877859125732162764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:13⤵PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,5129988273438840491,3877859125732162764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6368 /prefetch:13⤵PID:6632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,5129988273438840491,3877859125732162764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6824 /prefetch:13⤵PID:5540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,5129988273438840491,3877859125732162764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6480 /prefetch:13⤵PID:6192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2256,5129988273438840491,3877859125732162764,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6428 /prefetch:83⤵PID:6540
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa086146f8,0x7ffa08614708,0x7ffa086147183⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1448,7680022284222177463,4623234571079847457,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 /prefetch:33⤵PID:4272
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://store.steampowered.com/login/2⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://twitter.com/i/flow/login2⤵PID:5336
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffa086146f8,0x7ffa08614708,0x7ffa086147183⤵PID:5352
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcommunity.com/openid/loginform/2⤵PID:5532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffa086146f8,0x7ffa08614708,0x7ffa086147183⤵PID:5612
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.epicgames.com/id/login2⤵PID:5968
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa086146f8,0x7ffa08614708,0x7ffa086147183⤵PID:5992
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.paypal.com/signin2⤵PID:5476
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffa086146f8,0x7ffa08614708,0x7ffa086147183⤵PID:5564
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/2⤵PID:6964
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa086146f8,0x7ffa08614708,0x7ffa086147183⤵PID:7064
-
-
-
C:\Users\Admin\AppData\Local\Temp\55DD.exeC:\Users\Admin\AppData\Local\Temp\55DD.exe1⤵
- Executes dropped EXE
PID:1240
-
C:\Users\Admin\AppData\Local\Temp\5830.exeC:\Users\Admin\AppData\Local\Temp\5830.exe1⤵
- Executes dropped EXE
PID:4220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 488 -ip 4881⤵PID:564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2012 -ip 20121⤵PID:1868
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffa086146f8,0x7ffa08614708,0x7ffa086147181⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\82DB.exeC:\Users\Admin\AppData\Local\Temp\82DB.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:5424 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"2⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe3⤵PID:6168
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵PID:5860
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵PID:5620
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos4.exe"C:\Users\Admin\AppData\Local\Temp\kos4.exe"2⤵PID:6460
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵PID:3088
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:1180
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵PID:6772
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2560
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:6092
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:6668
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:6944
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:6836
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵PID:400
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4064
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"2⤵PID:6580
-
-
C:\Users\Admin\AppData\Local\Temp\881C.exeC:\Users\Admin\AppData\Local\Temp\881C.exe1⤵
- Executes dropped EXE
PID:5916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:2216
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa086146f8,0x7ffa08614708,0x7ffa086147183⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,14528507732256598044,10732861766951702381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:33⤵PID:3648
-
-
-
C:\Users\Admin\AppData\Local\Temp\8A30.exeC:\Users\Admin\AppData\Local\Temp\8A30.exe1⤵
- Executes dropped EXE
PID:6040
-
C:\Users\Admin\AppData\Local\Temp\8E09.exeC:\Users\Admin\AppData\Local\Temp\8E09.exe1⤵
- Executes dropped EXE
PID:5276 -
C:\Users\Admin\AppData\Local\Temp\e8b5234212\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\e8b5234212\Utsysc.exe"2⤵PID:6912
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\e8b5234212\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:6332
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "Utsysc.exe" /P "Admin:N"&&CACLS "Utsysc.exe" /P "Admin:R" /E&&echo Y|CACLS "..\e8b5234212" /P "Admin:N"&&CACLS "..\e8b5234212" /P "Admin:R" /E&&Exit3⤵PID:5148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "Utsysc.exe" /P "Admin:N"4⤵PID:6640
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "Utsysc.exe" /P "Admin:R" /E4⤵PID:6364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4424
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\e8b5234212" /P "Admin:N"4⤵PID:5652
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\e8b5234212" /P "Admin:R" /E4⤵PID:5292
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000033001\1.exe"C:\Users\Admin\AppData\Local\Temp\1000033001\1.exe"3⤵PID:2244
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=1.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.04⤵PID:6620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa086146f8,0x7ffa08614708,0x7ffa086147185⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4064431897874842751,639184541954819877,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:25⤵PID:6504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,4064431897874842751,639184541954819877,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:35⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,4064431897874842751,639184541954819877,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:85⤵PID:6864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4064431897874842751,639184541954819877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:15⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4064431897874842751,639184541954819877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:15⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4064431897874842751,639184541954819877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:15⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4064431897874842751,639184541954819877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:15⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4064431897874842751,639184541954819877,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:15⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4064431897874842751,639184541954819877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:15⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4064431897874842751,639184541954819877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:15⤵PID:7008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4064431897874842751,639184541954819877,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:15⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4064431897874842751,639184541954819877,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:15⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4064431897874842751,639184541954819877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:15⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4064431897874842751,639184541954819877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6216 /prefetch:15⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4064431897874842751,639184541954819877,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6496 /prefetch:85⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4064431897874842751,639184541954819877,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6496 /prefetch:85⤵PID:216
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=1.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.04⤵PID:6508
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa086146f8,0x7ffa08614708,0x7ffa086147185⤵PID:6612
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\aca439ae61e801\cred64.dll, Main3⤵PID:4968
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\aca439ae61e801\cred64.dll, Main4⤵PID:5664
-
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:2800
-
-
C:\Windows\system32\tar.exetar.exe -cf "C:\Users\Admin\AppData\Local\Temp\125601242331_Desktop.tar" "C:\Users\Admin\AppData\Local\Temp\_Files_\*.*"5⤵PID:2788
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\aca439ae61e801\clip64.dll, Main3⤵PID:5660
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6296
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x504 0x33c1⤵PID:864
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵PID:2816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6380
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc1⤵PID:4888
-
C:\Windows\System32\sc.exesc stop UsoSvc2⤵
- Launches sc.exe
PID:3284
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:4552
-
-
C:\Windows\System32\sc.exesc stop wuauserv2⤵
- Launches sc.exe
PID:2772
-
-
C:\Windows\System32\sc.exesc stop bits2⤵
- Launches sc.exe
PID:5428
-
-
C:\Windows\System32\sc.exesc stop dosvc2⤵
- Launches sc.exe
PID:6288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }1⤵PID:6092
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 01⤵PID:4576
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 02⤵PID:2248
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 02⤵PID:5124
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 02⤵PID:7004
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 02⤵PID:956
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"1⤵PID:7124
-
C:\Users\Admin\AppData\Local\Temp\8F7D.exeC:\Users\Admin\AppData\Local\Temp\8F7D.exe1⤵PID:6084
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵PID:5744
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:6920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa086146f8,0x7ffa08614708,0x7ffa086147184⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,1716366301865413619,11935771925876305240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:34⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,1716366301865413619,11935771925876305240,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:24⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,1716366301865413619,11935771925876305240,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:84⤵PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1716366301865413619,11935771925876305240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:14⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1716366301865413619,11935771925876305240,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:14⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1716366301865413619,11935771925876305240,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:14⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1716366301865413619,11935771925876305240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:14⤵PID:6860
-
-
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵PID:5148
-
C:\Users\Admin\AppData\Local\Temp\94BD.exeC:\Users\Admin\AppData\Local\Temp\94BD.exe1⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\e8b5234212\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\e8b5234212\Utsysc.exe1⤵PID:1160
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵PID:6688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4036
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc1⤵PID:5900
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD590ec9871050c45e8fdaa8d68afad5bce
SHA1f3ee24ad68b4f4d6fce4d254b2e76390ed5f5f86
SHA256a1c8bfcf13bcb3fdb6af8ed60f4b95e5a76911ff8054eda239c646bb3c4b8356
SHA5120762087146ee7b8f1176f22c3c352349575e2672302ffdf2035a764caeec6558f6602b8c6236e1e482a58cb39f3bf184afeaa0e841d80f648ae9a830aa746561
-
Filesize
152B
MD58c2cbc0e5dcd7e73917dc1371d0847ef
SHA1539a7b0a716e61b9ab3be8f15afa257899e9d0d9
SHA256726d34e32942467f43341e8bace0f7b0d565c44557dd588827153dd034db9485
SHA512c713daf687689fb8dbfc6776334df9b795c920386cece57303c08819529cdf8a0aff97437fb16f2684794da931969fa1bc81e439d0701868f154bf0bc8bb1c1c
-
Filesize
152B
MD5f4787679d96bf7263d9a34ce31dea7e4
SHA1ebbade52b0a07d888ae0221ad89081902e6e7f1b
SHA256bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87
SHA512de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307
-
Filesize
152B
MD5f4787679d96bf7263d9a34ce31dea7e4
SHA1ebbade52b0a07d888ae0221ad89081902e6e7f1b
SHA256bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87
SHA512de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307
-
Filesize
152B
MD5f4787679d96bf7263d9a34ce31dea7e4
SHA1ebbade52b0a07d888ae0221ad89081902e6e7f1b
SHA256bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87
SHA512de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307
-
Filesize
152B
MD5f4787679d96bf7263d9a34ce31dea7e4
SHA1ebbade52b0a07d888ae0221ad89081902e6e7f1b
SHA256bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87
SHA512de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307
-
Filesize
152B
MD5f4787679d96bf7263d9a34ce31dea7e4
SHA1ebbade52b0a07d888ae0221ad89081902e6e7f1b
SHA256bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87
SHA512de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307
-
Filesize
152B
MD525189300c19c8d07d07f0ec5b9ac8df0
SHA18c38360db6ac069df9f203b225348ac699f020b7
SHA25680664f48abed2305dc6c625d5faabd9c6cfb91a495b3978799e29f6c686a85f6
SHA5128ba104d264ba9f10b6c60a2a51e0fb6ded1555acca091d16899f49da1635d4372ff5c8813dc02abb0732dce6c0d529708938abd54e2fcf24cd04fb9f7301f862
-
Filesize
152B
MD5f4787679d96bf7263d9a34ce31dea7e4
SHA1ebbade52b0a07d888ae0221ad89081902e6e7f1b
SHA256bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87
SHA512de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307
-
Filesize
152B
MD5f4787679d96bf7263d9a34ce31dea7e4
SHA1ebbade52b0a07d888ae0221ad89081902e6e7f1b
SHA256bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87
SHA512de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307
-
Filesize
152B
MD5cd57206d74e68e1f70796d0fda0bf24a
SHA1dbdcb840eae95928031d3e99994d2cdf651ec85b
SHA2568af9526122c3e5f3d3840c5442672e5c2240c09ed4b01d7252e931c770fbe196
SHA5121d2b643233f4ec20715020c18fb795eb2648125462e0bfe557c991a0e0048d71c85570e37f45a20c38bc88f1f4141c6e24b1da904af08eb3ec8d21305ad5583c
-
Filesize
152B
MD5f4787679d96bf7263d9a34ce31dea7e4
SHA1ebbade52b0a07d888ae0221ad89081902e6e7f1b
SHA256bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87
SHA512de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307
-
Filesize
152B
MD5f4787679d96bf7263d9a34ce31dea7e4
SHA1ebbade52b0a07d888ae0221ad89081902e6e7f1b
SHA256bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87
SHA512de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307
-
Filesize
152B
MD5f4787679d96bf7263d9a34ce31dea7e4
SHA1ebbade52b0a07d888ae0221ad89081902e6e7f1b
SHA256bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87
SHA512de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307
-
Filesize
152B
MD5f4787679d96bf7263d9a34ce31dea7e4
SHA1ebbade52b0a07d888ae0221ad89081902e6e7f1b
SHA256bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87
SHA512de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\64fc0093-be34-4b0f-80fb-47ae400875c2.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6d99567d-f5a8-42b7-be5f-9e4946e76040.tmp
Filesize111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize744B
MD52fc8c46b606d10c74ed7c521fc129fe7
SHA12a4207d26ba0858064fb756f79665859063c494d
SHA256efe2afbcf96dab142176a61d9ff22a01ca2da34a4f6ac88df6a7fabd1701e480
SHA512f6398c03540e309376bdbc041926155493ffbb8f76efc8d231120f85c70c9401cd3a53b9fba2f25955cfb66203c09427d0aba989f18f0ada7b7a315a0176deb0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe59f37e.TMP
Filesize576B
MD505559fa79b83767a2799bcc92fb09469
SHA15eb1198ed3b6f919d17787d891112755552c7d6e
SHA256ea770ed29c0f31d3626db0b05e09216e0da017fcd2b27eb9584326bc597c5f6b
SHA51281cda3c4be3a31902c466de56463c414745dd76426b45e1c8d31b67e753184516b48d84f1c08e87512810cd861f9d8ef69a0df8b346040b2ddf17653df723c98
-
Filesize
8KB
MD575746b072a37cf959ac996d19c1e9fa8
SHA11dfb816724a214da0089109221d728169f33784b
SHA256ed836268e954dd28a99bc27198d7c044c2029bc6e06e275ec5d51043bdb09eda
SHA512e5e3b37b5c08bbcbc66789faa7bc4d417c7fc153db92b4ac94484a98bd9c325faa65b7b40a9f66b0789cde3f44c5b7c26d7e694c5d4acb823c306c45630925fd
-
Filesize
5KB
MD5ea2c76116f819904aee867bc3789859f
SHA1eecc343a025dd5016a97229c95f6408f930a048d
SHA256fb860ebbefa3993560afbf6f96a772a00d1a11a74c1bd90207eef2c707d6864e
SHA512a6f58de3649d47d96833804c6ab21ed36dcaf6dc488da54f120140bd5e83dcbe5cbdfd91982b516140c4c7867a8ff72d64d8389710cacc4acdad2a51eb9c60b7
-
Filesize
6KB
MD505f7f33a2c0aca756f7c82dbf14f40a6
SHA1bdffdc2427a4863490266cfba9ec72361123ed4e
SHA256a351792b9ee43fddf872309e3d98e8423ede229b1e4e19b2012afb9f35948cab
SHA5124c180193131cdc1790a10def0360db0f85314111456fba7c6a111b2da7d6c82ab831686f72fc1f2517e771b668476122503890be32c0bcce4a747a947f71046a
-
Filesize
7KB
MD5d0771508d2193d50042e2227f1b7f601
SHA16a9ecc202889e3e1a141fa06094549b401c12441
SHA256c6c717097b8495dc91f4e3450d05442a53abf07473bbcde2b165b9175ad9e00b
SHA5120faba3c5d90873c55ccaea5d40e36278638a38baa550fc119efe1db18a34c78b3a3c84f2a5494843083206bffa34e0098943044505f5e7a2157d4c8d6a35f325
-
Filesize
8KB
MD5ceb62b6cea6d0645d55b19b63c2a3d01
SHA1041f1d85927a6f3931617ca6c3d0f88bb4a93646
SHA256ddb67b3ea2a13471c76ba9bdd6e069778274db675900891d7bac40432c6ca200
SHA512dcb76a5398a29933f17bdcad28f4aa473f879e098787268ef2e007042006ed19bee768b76298411b0d09ad120460f300838b339b276b4f7e9d81378216cbbaf9
-
Filesize
7KB
MD5a798cdd89446e4dd6478158fc6816d41
SHA1e4efb9bcd6be85bb72a35c11f72ced8dfbd266fa
SHA256baccd22c008fa2d3b9ac5e7cdcd846362d487bff05f3e29a8e0b21e7b8e2097c
SHA512fc20df21b0e6c722bc7a5ea6a5bb8190eee1425d3aa19c0f2c00092c2b84a150a5cf860b7a4d6dff8674294dd00e6af457ae2faa6b5e9a27c9485f84da017814
-
Filesize
24KB
MD53a748249c8b0e04e77ad0d6723e564ff
SHA15c4cc0e5453c13ffc91f259ccb36acfb3d3fa729
SHA256f98f5543c33c0b85b191bb85718ee7845982275130da1f09e904d220f1c6ceed
SHA51253254db3efd9c075e4f24a915e0963563ce4df26d4771925199a605cd111ae5025a65f778b4d4ed8a9b3e83b558066cd314f37b84115d4d24c58207760174af2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD5d92a51cf3a66c321ed17d2987c10e6d0
SHA1f449f953ff2ad2ec4b5ae721d8ca871e42330fc3
SHA2567e7bcf6925fa23f5f606dfd5be4a8987c0ba8b7f93bd6466758e04b142aaa437
SHA5128b22675b5a4aa272a7879550a76a20762c38bb85d04a9c904b179116eb827f7e2564dd3dc51040a8cc9e201e7629bea87c94c3c3dc1fcd702dfd3299eee403ea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD5b0efaf1c8e197a6fe89865988a472000
SHA1b4721d34374bd66b953f666e21826b82d661a8cf
SHA256fff0db55e07ddcff0cf63b1dbdc2fa92ff0c4da13fdec485720198dc8c24ddc1
SHA5129ca5c2c2bfb882e535186a81d7e4070f55b08aec4bb1dc9034ba9780afcf25a83ae513f3140e4a3917ed89b146f724f10e99adba615ab9a15da7355b3d6aef25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD5165c236a00f6f77ba6360e566411a75e
SHA1ebb22d1d0aa2dd1be4a03db3b2a3376e3a4c30e0
SHA256615a52211f8463d38594691cbc84caaf67af9a9c7cf4176bfcf383a06ab20329
SHA5122e49adfa4a1c76f2a75f7ee2ba3418945f297c4a8c10b21c4f46b1deaedb2e0677431c3a68aa9314c8aadfe5539ec825df5e7f818b45beae53864cc60830fb77
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD546c7899295169e0cf50422aae01358f5
SHA1ad8133fea74b5055e6315f7532c14fee789c7a0d
SHA25672e0baf2d88b38d632766c373d283781e7a91ec47e494a36e4225e3c1a2cc35e
SHA512660a1c2572bb38db3305dfbcb85684834f576399f957622fe1f8de7db9e63a06b66fd6d720992106bc8247bca4b380bd0ec1720e5e01d5558847b737b2b06896
-
Filesize
1KB
MD58e240438fe8045a38cec10effefb293f
SHA10ab3e396f6457a1195ff2427c74844bad501d6a4
SHA2564273f4989a53f252d32089f5d8c0c2cf4eb07eb903ec08b90af3c60753bdc4c9
SHA512cfb57875513e5322abbaae3c84b8e637e6b96e7d271db37829c0d8a44b9cfd680d4d88a15429404a3843eb1948079e9ba2356c8574e19d9f8b120a69d9f9468f
-
Filesize
1KB
MD53c5eb044c3a1dcc9fa39a89644e5b57d
SHA1fa167c6792b1ef7ff8c87fe6fb3ed606dc54bccf
SHA256ff84688cb485793a87140847da44de11d09b22774ad7c941a91332f30cfd0dd0
SHA512bbae9ab0de1574ff0720b514bdbd264b86dd907837b99eacb9727fcaed9727980661400906eb7ae2b676639de396d1e003aa32dd516f72e9e23098ce3aa16965
-
Filesize
203B
MD5f9fcfc9d860daf3bb2322fadaffee674
SHA140628a6f2770dc33e98e0314423c5c325dceba5a
SHA2562031b7438a7083aa689cd11ab13274593b7c6beae46ba6034fbcb6d910297605
SHA512db4260b099a36be4c80b4b1d6f3fe7bb2dc0fd367bea510677174b48c31010c301a4541787db8dc97d00bb88abda89ed97fdbed8197f82a851ad676be42170cb
-
Filesize
1KB
MD5f7895d6562246970bf96f02aaba32bfd
SHA1e1f68ecaf06d7f21a1704fd2fa11a1588030798b
SHA256f438a015752e2c50d3e27fff8e55b9a2199af42a8af285fb1f81f71100927ecc
SHA512aa7a098e17f38ea47ae66a0f55a08960418a4f320da3e3f07e257a22b05e44327636e0fe1756fb27787a620157c4b7e5f1594eda9648bb14609a2282f8f178db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD546eb1912e08e08198489a2368f059a98
SHA1566a358b37fe846dba010337f34189eae569faf5
SHA2564fa13e145f326051e52939d3c9e7ef4d7af02750ded924c5f2e58c25d61a50a2
SHA512850c598143c884f9814d3d3c9426dc32844e51ac9b0ddc2ef9a4cc2e29be215d9def8f23752e0d94770d7d8be4a572ce567de074f436a6a642c54aaca9144d29
-
Filesize
10KB
MD56288f44dc465e0173f3bc63b986f17ac
SHA1089a35c30e1ee65b7cbbe0058cf68bb0fdb8ad9e
SHA256b64e2d0fa55d85da72651fa808f5091d964264eadb2a36411f5625e8545d5e0c
SHA5121d1472a437e004f3d234d6b34f3b67b53ae2c45a2b241a5bf8dbbdd9fe6e7b2e6e93d2b0f01ab8a9198961a9057b40720940d15889cbacaa8aaf5d0a996ecdbd
-
Filesize
2KB
MD590ec9871050c45e8fdaa8d68afad5bce
SHA1f3ee24ad68b4f4d6fce4d254b2e76390ed5f5f86
SHA256a1c8bfcf13bcb3fdb6af8ed60f4b95e5a76911ff8054eda239c646bb3c4b8356
SHA5120762087146ee7b8f1176f22c3c352349575e2672302ffdf2035a764caeec6558f6602b8c6236e1e482a58cb39f3bf184afeaa0e841d80f648ae9a830aa746561
-
Filesize
327KB
MD5c5db660859f86f259ab5aaccaa66d2e8
SHA16748af6e93bb83fb258b70d303ea0e66f15ffb93
SHA2563e9ae7a699e0b95829bf779ee7ae64876ac2108bf5efc516d60c92bfd2420bdd
SHA512daf97b946cb395447152002e69e87774df92d93b65297ba0b15f36283a281465c55fdc1ce6797765c82f7b739e0f40063bddb588ea45ccb88d9ba531335d0ab6
-
Filesize
327KB
MD5c5db660859f86f259ab5aaccaa66d2e8
SHA16748af6e93bb83fb258b70d303ea0e66f15ffb93
SHA2563e9ae7a699e0b95829bf779ee7ae64876ac2108bf5efc516d60c92bfd2420bdd
SHA512daf97b946cb395447152002e69e87774df92d93b65297ba0b15f36283a281465c55fdc1ce6797765c82f7b739e0f40063bddb588ea45ccb88d9ba531335d0ab6
-
Filesize
36KB
MD56c6963f43d470e5a63334aeb721263d4
SHA1d8cfe2a77e619a3ae2d8f74464fd4ed74d6c2017
SHA2561d3928eb40e1217bef062dea5aed06b6f05f2d7340cab6999a6d2b6cfd81cc77
SHA5126854f2864ec4c937425e2dc9720ba22f7b269e3d1b889aeaf052ca946b4a65ed16954d0b95d8b3b996b92f6e998fdd4492769968097c668632cde752bbd30d95
-
Filesize
4.1MB
MD50377dfbfa3dd6709118f35d1d0c33b71
SHA1194dcc880ec2a9d7cadd51c27858ef2c3a2f087a
SHA256b825586482565a13e4b4c004cf87f9e9d5980ba4446ec5f8d0c8acd5720bf632
SHA512c1376f728d94c86b7785f00bf73982d2d6867d9d6988c58a1f0b13afd4fb249db75f6fd096a05339e12ea1949a3e1d86a0469bad121b816a08fcc794fb3c5c9f
-
Filesize
4.1MB
MD50377dfbfa3dd6709118f35d1d0c33b71
SHA1194dcc880ec2a9d7cadd51c27858ef2c3a2f087a
SHA256b825586482565a13e4b4c004cf87f9e9d5980ba4446ec5f8d0c8acd5720bf632
SHA512c1376f728d94c86b7785f00bf73982d2d6867d9d6988c58a1f0b13afd4fb249db75f6fd096a05339e12ea1949a3e1d86a0469bad121b816a08fcc794fb3c5c9f
-
Filesize
4.1MB
MD50377dfbfa3dd6709118f35d1d0c33b71
SHA1194dcc880ec2a9d7cadd51c27858ef2c3a2f087a
SHA256b825586482565a13e4b4c004cf87f9e9d5980ba4446ec5f8d0c8acd5720bf632
SHA512c1376f728d94c86b7785f00bf73982d2d6867d9d6988c58a1f0b13afd4fb249db75f6fd096a05339e12ea1949a3e1d86a0469bad121b816a08fcc794fb3c5c9f
-
Filesize
1.4MB
MD5d8c541f5add190e0299f431cfe5c5fa8
SHA113592e4aab929a2c411774f05dada55906ec0cb1
SHA256f8f4d70c4580b4b4f01d22aeaa5ad5f036d0e882bf9faffd6d137e32e5f44d8b
SHA5127c614f79b6a838ae57b3e8b7af920a3ecbee9773bfa7ce0769ccb5b16438347a0a7ba78655b678f87b1895fccdf69fff4f14acda412d52b6f133565d557663ae
-
Filesize
1.4MB
MD5d8c541f5add190e0299f431cfe5c5fa8
SHA113592e4aab929a2c411774f05dada55906ec0cb1
SHA256f8f4d70c4580b4b4f01d22aeaa5ad5f036d0e882bf9faffd6d137e32e5f44d8b
SHA5127c614f79b6a838ae57b3e8b7af920a3ecbee9773bfa7ce0769ccb5b16438347a0a7ba78655b678f87b1895fccdf69fff4f14acda412d52b6f133565d557663ae
-
Filesize
342B
MD5e79bae3b03e1bff746f952a0366e73ba
SHA15f547786c869ce7abc049869182283fa09f38b1d
SHA256900e53f17f7c9a2753107b69c30869343612c1be7281115f3f78d17404af5f63
SHA512c67a9a5a366be8383ad5b746c54697c71dbda712397029bc8346b7c52dd71a7d41be3d35159de35c44a3b8755d9ce94acda08d12ff105263559adb6a6d0baf50
-
Filesize
180KB
MD5286aba392f51f92a8ed50499f25a03df
SHA1ee11fb0150309ec2923ce3ab2faa4e118c960d46
SHA256ecf04cf957e7653f20ef2d0d73b63040620a6e36a53605ab2242cbef40f7fb22
SHA51284e1535026a4fce44bb662a21221ca295a9f894b0bd2a03e1e5720f6c9734d849f7fe5f997c14badc520ddd0b5bd507f49556a432b6ccd8e4c73d34a0a17421c
-
Filesize
180KB
MD5286aba392f51f92a8ed50499f25a03df
SHA1ee11fb0150309ec2923ce3ab2faa4e118c960d46
SHA256ecf04cf957e7653f20ef2d0d73b63040620a6e36a53605ab2242cbef40f7fb22
SHA51284e1535026a4fce44bb662a21221ca295a9f894b0bd2a03e1e5720f6c9734d849f7fe5f997c14badc520ddd0b5bd507f49556a432b6ccd8e4c73d34a0a17421c
-
Filesize
219KB
MD51aba285cb98a366dc4be21585eecd62a
SHA1c6f97ddd38231287ca6a9bb3cf3b5eefb0bf9b9b
SHA256ffa9f51e3c68fedcd1d07567206d777456ae6dd12b9540c11ad45c36adfa32a8
SHA5129fa385f257b974ab16b5b52af89fb3867b49a5ddcf02a11449b1557293ef870a9c31e3da33fad5898b568356266ffac5b3d80881bd981d354311cbcd7a75b439
-
Filesize
219KB
MD51aba285cb98a366dc4be21585eecd62a
SHA1c6f97ddd38231287ca6a9bb3cf3b5eefb0bf9b9b
SHA256ffa9f51e3c68fedcd1d07567206d777456ae6dd12b9540c11ad45c36adfa32a8
SHA5129fa385f257b974ab16b5b52af89fb3867b49a5ddcf02a11449b1557293ef870a9c31e3da33fad5898b568356266ffac5b3d80881bd981d354311cbcd7a75b439
-
Filesize
12.6MB
MD5699c65fed2ca6370f86d5da5f70ee9c2
SHA1f27c46e0e5bf076326392f0f4e1976f8ecd6db35
SHA256f24d47bd9cc9daa71c869a1d06551801395ba2bbbff0c33a102e79d32c0a630d
SHA51287c847e190fbac40ccc8a21c16ab120a74c71b1d157137935c8305725715f14b76b823e098b1d44b6b94b040183c2a76f9a6bfe0788ce19eee7866c2936e9692
-
Filesize
12.6MB
MD5699c65fed2ca6370f86d5da5f70ee9c2
SHA1f27c46e0e5bf076326392f0f4e1976f8ecd6db35
SHA256f24d47bd9cc9daa71c869a1d06551801395ba2bbbff0c33a102e79d32c0a630d
SHA51287c847e190fbac40ccc8a21c16ab120a74c71b1d157137935c8305725715f14b76b823e098b1d44b6b94b040183c2a76f9a6bfe0788ce19eee7866c2936e9692
-
Filesize
448KB
MD5f326ad827a13c3d66b532542b8fcd1b5
SHA18e64c5a83bb8fa293ceee555d94fc635eb865ad7
SHA256000d0ede3217d82fa0951d17a5ac9debfe3dea991709ad0c098dece6df6a08f2
SHA51205b90f475f3e567775aef775cad4526489b947d8814e7aff629195e73b17e6e4e09e18dd41ce554810ba01d3ab5041150e37fbfd2955e434c9dec0312ebe7d6d
-
Filesize
448KB
MD5f326ad827a13c3d66b532542b8fcd1b5
SHA18e64c5a83bb8fa293ceee555d94fc635eb865ad7
SHA256000d0ede3217d82fa0951d17a5ac9debfe3dea991709ad0c098dece6df6a08f2
SHA51205b90f475f3e567775aef775cad4526489b947d8814e7aff629195e73b17e6e4e09e18dd41ce554810ba01d3ab5041150e37fbfd2955e434c9dec0312ebe7d6d
-
Filesize
95KB
MD50592c6d7674c77b053080c5b6e79fdcb
SHA1693339ede19093e2b4593fda93be0b140be69141
SHA256fe19cdb149ecd8fd116f048852dcc10e46a3521351102685ce25c61a7d962a14
SHA51237f2ff110b0702229b888280c8c2dff7885e6b1e583ccc47c36e74f44adfa491f70d6d6ab95d79149437d6fd9400448f1046eee3676ea98dffe99bc28e4783cb
-
Filesize
95KB
MD50592c6d7674c77b053080c5b6e79fdcb
SHA1693339ede19093e2b4593fda93be0b140be69141
SHA256fe19cdb149ecd8fd116f048852dcc10e46a3521351102685ce25c61a7d962a14
SHA51237f2ff110b0702229b888280c8c2dff7885e6b1e583ccc47c36e74f44adfa491f70d6d6ab95d79149437d6fd9400448f1046eee3676ea98dffe99bc28e4783cb
-
Filesize
306KB
MD55d0310efbb0ea7ead8624b0335b21b7b
SHA188f26343350d7b156e462d6d5c50697ed9d3911c
SHA256a43f3cf974c02ae797b15d908b0ce1253781e9523a3a5831c199cb4d5dcbda4a
SHA512ac88ba67e5a88ff99521d7f30c75dffadbb92ef3517eb804713896006f3dc57294742fcf666db5510bd7f43f89d4d11c62b817e31dfd94c2343eced1576be7a7
-
Filesize
306KB
MD55d0310efbb0ea7ead8624b0335b21b7b
SHA188f26343350d7b156e462d6d5c50697ed9d3911c
SHA256a43f3cf974c02ae797b15d908b0ce1253781e9523a3a5831c199cb4d5dcbda4a
SHA512ac88ba67e5a88ff99521d7f30c75dffadbb92ef3517eb804713896006f3dc57294742fcf666db5510bd7f43f89d4d11c62b817e31dfd94c2343eced1576be7a7
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
1.2MB
MD5d798332919f71fcfa5246e0fc5ed0d7c
SHA17a871de37e5c0bfb9364af85c14d6ae9b6453265
SHA256f3a2e8526a249c91622461726699df11ac5e45a6790003d22c872bb3bccf7262
SHA5127906076c5d3c8988b148648d6fde67d566fdcd24019eabae6dc2d5f5f6a14931e09207bacee34a9e26eaff5f3952dfe7d77f520ab54a3c80bb892472b30ef30e
-
Filesize
1.2MB
MD5d798332919f71fcfa5246e0fc5ed0d7c
SHA17a871de37e5c0bfb9364af85c14d6ae9b6453265
SHA256f3a2e8526a249c91622461726699df11ac5e45a6790003d22c872bb3bccf7262
SHA5127906076c5d3c8988b148648d6fde67d566fdcd24019eabae6dc2d5f5f6a14931e09207bacee34a9e26eaff5f3952dfe7d77f520ab54a3c80bb892472b30ef30e
-
Filesize
807KB
MD52bd5501164f7b94d4383a75d4e8340f4
SHA10f8c0922497fa5bb14b8af2b7bc3e4358eb26e02
SHA25649591458dd80274bcdad5a29ee9645ab25f2646de3263c9da46ec8b4a5665528
SHA512dc6b43594b483e9945d9306b7f0b723a71a4e929496beca42c3003e9623cc37b9429edad76632fda4f4eb0a28e11768888c3ae279bbb1cf09c2fe526aca4781a
-
Filesize
807KB
MD52bd5501164f7b94d4383a75d4e8340f4
SHA10f8c0922497fa5bb14b8af2b7bc3e4358eb26e02
SHA25649591458dd80274bcdad5a29ee9645ab25f2646de3263c9da46ec8b4a5665528
SHA512dc6b43594b483e9945d9306b7f0b723a71a4e929496beca42c3003e9623cc37b9429edad76632fda4f4eb0a28e11768888c3ae279bbb1cf09c2fe526aca4781a
-
Filesize
611KB
MD53a5955b5369ece0abf894e37af35375b
SHA1fc0790f57ac2db8ad166717abad8ce208a30ad33
SHA25656ba507aabfb53afad7a3cfa443b91e3a86f97f0fa7d1585d0f01b25d6fd3265
SHA5128ad81f5aea4087db8136d23783714de20b9296a588070d39184912cd3767b3f0d7cc0caf05697edf2ba066a1618de20921d3b852f57c01fb48f4fdf277982a16
-
Filesize
611KB
MD53a5955b5369ece0abf894e37af35375b
SHA1fc0790f57ac2db8ad166717abad8ce208a30ad33
SHA25656ba507aabfb53afad7a3cfa443b91e3a86f97f0fa7d1585d0f01b25d6fd3265
SHA5128ad81f5aea4087db8136d23783714de20b9296a588070d39184912cd3767b3f0d7cc0caf05697edf2ba066a1618de20921d3b852f57c01fb48f4fdf277982a16
-
Filesize
1.6MB
MD5a2c8f445f487189e97034ce4a9c9124d
SHA13a8e7a0327df85f1f50cc87b570aabffdf6161c1
SHA2569ac90a841ad6967bbe05c62bc3b37cc12b92c42f942b6c9a270f9fe60da2bc06
SHA512b83cf78d277d12aa7918066fa150716a5f26759f757e82f2058717e58529838eff6a29369d6a6947b3ed18576d5f426b90c75a3f5c0cf4fb4b2928dd8a73d82d
-
Filesize
1.6MB
MD5a2c8f445f487189e97034ce4a9c9124d
SHA13a8e7a0327df85f1f50cc87b570aabffdf6161c1
SHA2569ac90a841ad6967bbe05c62bc3b37cc12b92c42f942b6c9a270f9fe60da2bc06
SHA512b83cf78d277d12aa7918066fa150716a5f26759f757e82f2058717e58529838eff6a29369d6a6947b3ed18576d5f426b90c75a3f5c0cf4fb4b2928dd8a73d82d
-
Filesize
219KB
MD562068cb2a14f2e47d3d5ea61d1c2ff10
SHA1c1793375254cbc45312ea8aa785697dd89ec0d09
SHA256990bdbadaa03081d39f038230379e0294c907512102b6e5a9264cbc06da6ccd6
SHA5127c52641d3938fbd8aad7a26fab6c5068a3d5a2ce4df464f9e32dfe717698e7a9f6d064da633a975259781f4f2bcfa8e19371240fe55cdec762e10281b601fd1a
-
Filesize
219KB
MD562068cb2a14f2e47d3d5ea61d1c2ff10
SHA1c1793375254cbc45312ea8aa785697dd89ec0d09
SHA256990bdbadaa03081d39f038230379e0294c907512102b6e5a9264cbc06da6ccd6
SHA5127c52641d3938fbd8aad7a26fab6c5068a3d5a2ce4df464f9e32dfe717698e7a9f6d064da633a975259781f4f2bcfa8e19371240fe55cdec762e10281b601fd1a
-
Filesize
2.5MB
MD5032a919dff4e6ba21c24d11a423b112c
SHA1cbaa859c0afa6b4c0d2a288728e653e324e80e90
SHA25612654cd367670f7f16dfd08210e2d704b777fcdd54a76a0c6e9925f588161553
SHA5120c9edc1ef763cdcd3a5821644c23bb833b4b7080a9715fa58bd91f4b5a4ab98548c3c195835ed547264d22359dc4f341e758d5588d1d2ede1ef6bebd5df0785c
-
Filesize
2.5MB
MD5032a919dff4e6ba21c24d11a423b112c
SHA1cbaa859c0afa6b4c0d2a288728e653e324e80e90
SHA25612654cd367670f7f16dfd08210e2d704b777fcdd54a76a0c6e9925f588161553
SHA5120c9edc1ef763cdcd3a5821644c23bb833b4b7080a9715fa58bd91f4b5a4ab98548c3c195835ed547264d22359dc4f341e758d5588d1d2ede1ef6bebd5df0785c
-
Filesize
2.5MB
MD5032a919dff4e6ba21c24d11a423b112c
SHA1cbaa859c0afa6b4c0d2a288728e653e324e80e90
SHA25612654cd367670f7f16dfd08210e2d704b777fcdd54a76a0c6e9925f588161553
SHA5120c9edc1ef763cdcd3a5821644c23bb833b4b7080a9715fa58bd91f4b5a4ab98548c3c195835ed547264d22359dc4f341e758d5588d1d2ede1ef6bebd5df0785c
-
Filesize
6B
MD50dd544ca4ccb44f6ed5cf12555859eb7
SHA1f702775542adefab834a1f25d8456bec8b7abfd9
SHA2567b412527489f5ffedebed690b6ec7252d5b2f4cb75b7e71e3d6eab6e9d0fe98a
SHA5121cf4e6e9e1d19db819331140aaefefe80d81332ef9eebe8bfe04676e3893acc891b67bb9fd0843d6bfb349e4f683dfb8890c82535d97bf408b78306a6102dfd0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
306KB
MD55d0310efbb0ea7ead8624b0335b21b7b
SHA188f26343350d7b156e462d6d5c50697ed9d3911c
SHA256a43f3cf974c02ae797b15d908b0ce1253781e9523a3a5831c199cb4d5dcbda4a
SHA512ac88ba67e5a88ff99521d7f30c75dffadbb92ef3517eb804713896006f3dc57294742fcf666db5510bd7f43f89d4d11c62b817e31dfd94c2343eced1576be7a7
-
Filesize
306KB
MD55d0310efbb0ea7ead8624b0335b21b7b
SHA188f26343350d7b156e462d6d5c50697ed9d3911c
SHA256a43f3cf974c02ae797b15d908b0ce1253781e9523a3a5831c199cb4d5dcbda4a
SHA512ac88ba67e5a88ff99521d7f30c75dffadbb92ef3517eb804713896006f3dc57294742fcf666db5510bd7f43f89d4d11c62b817e31dfd94c2343eced1576be7a7
-
Filesize
306KB
MD55d0310efbb0ea7ead8624b0335b21b7b
SHA188f26343350d7b156e462d6d5c50697ed9d3911c
SHA256a43f3cf974c02ae797b15d908b0ce1253781e9523a3a5831c199cb4d5dcbda4a
SHA512ac88ba67e5a88ff99521d7f30c75dffadbb92ef3517eb804713896006f3dc57294742fcf666db5510bd7f43f89d4d11c62b817e31dfd94c2343eced1576be7a7
-
Filesize
8KB
MD501707599b37b1216e43e84ae1f0d8c03
SHA1521fe10ac55a1f89eba7b8e82e49407b02b0dcb2
SHA256cc0dbc1d31ccd9488695b690bd7e7aa4a90ba4b2a5d23ef48b296465f5aa44dd
SHA5129f9ff29a12d26a7d42656e0faf970c908f1ef428b14e5a5fe7acd06371b96b16eb984e8fbee4e2b906c6db7fb39c9d4a221e79fc3d5e9ca9b59e377875bc5642
-
Filesize
8KB
MD501707599b37b1216e43e84ae1f0d8c03
SHA1521fe10ac55a1f89eba7b8e82e49407b02b0dcb2
SHA256cc0dbc1d31ccd9488695b690bd7e7aa4a90ba4b2a5d23ef48b296465f5aa44dd
SHA5129f9ff29a12d26a7d42656e0faf970c908f1ef428b14e5a5fe7acd06371b96b16eb984e8fbee4e2b906c6db7fb39c9d4a221e79fc3d5e9ca9b59e377875bc5642
-
Filesize
8KB
MD501707599b37b1216e43e84ae1f0d8c03
SHA1521fe10ac55a1f89eba7b8e82e49407b02b0dcb2
SHA256cc0dbc1d31ccd9488695b690bd7e7aa4a90ba4b2a5d23ef48b296465f5aa44dd
SHA5129f9ff29a12d26a7d42656e0faf970c908f1ef428b14e5a5fe7acd06371b96b16eb984e8fbee4e2b906c6db7fb39c9d4a221e79fc3d5e9ca9b59e377875bc5642
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD544d2ab225d5338fedd68e8983242a869
SHA198860eaac2087b0564e2d3e0bf0d1f25e21e0eeb
SHA256217c293b309195f479ca76bf78898a98685ba2854639dfd1293950232a6c6695
SHA512611eb322a163200b4718f0b48c7a50a5e245af35f0c539f500ad9b517c4400c06dd64a3df30310223a6328eeb38862be7556346ec14a460e33b5c923153ac4a7
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD53dec383890091998607fd33dc3afcdab
SHA1e5d32dfc5479450465f96ef13b2a17429d122dea
SHA25669210d0ed60eff14a7ecc22f2f1d0d9b9adbc5fc5a65a0077b3aa4c5dd5fb8a0
SHA512e73bdd713329562b45df71661fca17281d6aba79ca443bb125c58d71bdd66a2d373fe7a52a372948487421ac31d9387166d57939bdce9675aef06cf2d7f75b48
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
250KB
MD5020ad283a781f7ff82b32ca785d890e4
SHA16c0dfa83de61c67bddef5d35ddefac9eacf60dc3
SHA2569532da8b4316e7ece17b4c4a4b7284f5438c91bf0c4ff9c73aabeabd10436629
SHA512b9d485a90cc61719b6303ee9b7f0ae60cf4768a06bf3407ad61a1f521999f25886c1730d990b913d7a045c84c06331d00cf081712ddd8438167d9d004798bb95
-
Filesize
250KB
MD5020ad283a781f7ff82b32ca785d890e4
SHA16c0dfa83de61c67bddef5d35ddefac9eacf60dc3
SHA2569532da8b4316e7ece17b4c4a4b7284f5438c91bf0c4ff9c73aabeabd10436629
SHA512b9d485a90cc61719b6303ee9b7f0ae60cf4768a06bf3407ad61a1f521999f25886c1730d990b913d7a045c84c06331d00cf081712ddd8438167d9d004798bb95
-
Filesize
250KB
MD5020ad283a781f7ff82b32ca785d890e4
SHA16c0dfa83de61c67bddef5d35ddefac9eacf60dc3
SHA2569532da8b4316e7ece17b4c4a4b7284f5438c91bf0c4ff9c73aabeabd10436629
SHA512b9d485a90cc61719b6303ee9b7f0ae60cf4768a06bf3407ad61a1f521999f25886c1730d990b913d7a045c84c06331d00cf081712ddd8438167d9d004798bb95
-
Filesize
102KB
MD58da053f9830880089891b615436ae761
SHA147d5ed85d9522a08d5df606a8d3c45cb7ddd01f4
SHA256d5482b48563a2f1774b473862fbd2a1e5033b4c262eee107ef64588e47e1c374
SHA51269d49817607eced2a16a640eaac5d124aa10f9eeee49c30777c0bc18c9001cd6537c5b675f3a8b40d07e76ec2a0a96e16d1273bfebdce1bf20f80fbd68721b39
-
Filesize
1.2MB
MD50111e5a2a49918b9c34cbfbf6380f3f3
SHA181fc519232c0286f5319b35078ac3bb381311bd4
SHA2564643d18bb8be79c2e3178bc3978d201c596ab70a347e8cf1e8fdbe3028d69d7c
SHA512a2aac32a2c5146dd7287d245bfa9424287bfd12a40825f4da7d18204837242c99d4406428f2361e13c2e4f4d68c385de12e98243cf48bf4c6c5a82273c4467a5
-
Filesize
1.2MB
MD50111e5a2a49918b9c34cbfbf6380f3f3
SHA181fc519232c0286f5319b35078ac3bb381311bd4
SHA2564643d18bb8be79c2e3178bc3978d201c596ab70a347e8cf1e8fdbe3028d69d7c
SHA512a2aac32a2c5146dd7287d245bfa9424287bfd12a40825f4da7d18204837242c99d4406428f2361e13c2e4f4d68c385de12e98243cf48bf4c6c5a82273c4467a5