Resubmissions
27/01/2024, 07:29
240127-jbpk2ahdbl 311/11/2023, 05:47
231111-ghd2rsbh5y 1011/11/2023, 05:36
231111-gank8scg37 10Analysis
-
max time kernel
188s -
max time network
205s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
11/11/2023, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
6d4e02cd38ccdc03c963e5b6673fd6dade63e0c74942cec56a7545d5b53f1f50.exe
Resource
win10-20231023-en
General
-
Target
6d4e02cd38ccdc03c963e5b6673fd6dade63e0c74942cec56a7545d5b53f1f50.exe
-
Size
552KB
-
MD5
45e4a4b8d22f075c02e75fa2a05229b0
-
SHA1
c2f756556568e923b5a5668ec0b7c53d41e07505
-
SHA256
6d4e02cd38ccdc03c963e5b6673fd6dade63e0c74942cec56a7545d5b53f1f50
-
SHA512
c2d0ded8528568ddade17752ae4acde3410db0f85cc130392f5ebfe38180bd411abb48c288b5e4b57f1fe6390579d07d65c97798ba93c2362de77b49e56c561a
-
SSDEEP
12288:SMrhy90T0NA0H7Gae/4IC50pCCHGN0PLvYMXiYQbDL6dQrdFCs:jyiiaaewIsgCQGIgYDrQpos
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
pixelnew2.0
194.49.94.11:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/files/0x000700000001ad4d-1020.dat family_redline -
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000700000001ad4d-1020.dat family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000\Control Panel\International\Geo\Nation 1qg22cK3.exe -
Executes dropped EXE 4 IoCs
pid Process 3572 1qg22cK3.exe 2764 3xx04ZB.exe 3064 7AD3.exe 8 BAEB.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6d4e02cd38ccdc03c963e5b6673fd6dade63e0c74942cec56a7545d5b53f1f50.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000800000001ac46-6.dat autoit_exe behavioral1/files/0x000800000001ac46-5.dat autoit_exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3xx04ZB.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3xx04ZB.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3xx04ZB.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-087602 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 01000000570d784cbf924e26915e6f2428e78f434f895524e3ee7ee71cdac3cd68c4212b7f0132c444567300ff3389a4c4616614980f19edd278d8b33684 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\steamcommunity.com\NumberOfSu = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 6386cd306114da01 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\epicgames.com\NumberOfSubdoma = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = cec4e7306114da01 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\steampowered.com\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\epicgames.com\NumberOfSubd = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 189bf4476114da01 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.epicgames.com\ = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\steampowered.com\NumberOfSubd = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\steampowered.com\NumberOfSubd = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = da0acc376114da01 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\steamcommunity.com MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 06cd3e3d6114da01 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total MicrosoftEdgeCP.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2764 3xx04ZB.exe 2764 3xx04ZB.exe 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found -
Suspicious behavior: MapViewOfSection 22 IoCs
pid Process 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2764 3xx04ZB.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeDebugPrivilege 3124 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3124 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3124 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3124 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 3204 Process not Found Token: SeCreatePagefilePrivilege 3204 Process not Found Token: SeShutdownPrivilege 3204 Process not Found Token: SeCreatePagefilePrivilege 3204 Process not Found Token: SeShutdownPrivilege 3204 Process not Found Token: SeCreatePagefilePrivilege 3204 Process not Found Token: SeShutdownPrivilege 3204 Process not Found Token: SeCreatePagefilePrivilege 3204 Process not Found Token: SeShutdownPrivilege 3204 Process not Found Token: SeCreatePagefilePrivilege 3204 Process not Found Token: SeShutdownPrivilege 3204 Process not Found Token: SeCreatePagefilePrivilege 3204 Process not Found Token: SeShutdownPrivilege 3204 Process not Found Token: SeCreatePagefilePrivilege 3204 Process not Found Token: SeShutdownPrivilege 3204 Process not Found Token: SeCreatePagefilePrivilege 3204 Process not Found Token: SeShutdownPrivilege 3204 Process not Found Token: SeCreatePagefilePrivilege 3204 Process not Found Token: SeShutdownPrivilege 3204 Process not Found Token: SeCreatePagefilePrivilege 3204 Process not Found Token: SeShutdownPrivilege 3204 Process not Found Token: SeCreatePagefilePrivilege 3204 Process not Found Token: SeShutdownPrivilege 3204 Process not Found Token: SeCreatePagefilePrivilege 3204 Process not Found Token: SeShutdownPrivilege 3204 Process not Found Token: SeCreatePagefilePrivilege 3204 Process not Found -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe 3572 1qg22cK3.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1448 MicrosoftEdge.exe 2152 MicrosoftEdgeCP.exe 3124 MicrosoftEdgeCP.exe 2152 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2620 wrote to memory of 3572 2620 6d4e02cd38ccdc03c963e5b6673fd6dade63e0c74942cec56a7545d5b53f1f50.exe 71 PID 2620 wrote to memory of 3572 2620 6d4e02cd38ccdc03c963e5b6673fd6dade63e0c74942cec56a7545d5b53f1f50.exe 71 PID 2620 wrote to memory of 3572 2620 6d4e02cd38ccdc03c963e5b6673fd6dade63e0c74942cec56a7545d5b53f1f50.exe 71 PID 2620 wrote to memory of 2764 2620 6d4e02cd38ccdc03c963e5b6673fd6dade63e0c74942cec56a7545d5b53f1f50.exe 81 PID 2620 wrote to memory of 2764 2620 6d4e02cd38ccdc03c963e5b6673fd6dade63e0c74942cec56a7545d5b53f1f50.exe 81 PID 2620 wrote to memory of 2764 2620 6d4e02cd38ccdc03c963e5b6673fd6dade63e0c74942cec56a7545d5b53f1f50.exe 81 PID 2152 wrote to memory of 676 2152 MicrosoftEdgeCP.exe 77 PID 2152 wrote to memory of 676 2152 MicrosoftEdgeCP.exe 77 PID 2152 wrote to memory of 4120 2152 MicrosoftEdgeCP.exe 80 PID 2152 wrote to memory of 676 2152 MicrosoftEdgeCP.exe 77 PID 2152 wrote to memory of 4120 2152 MicrosoftEdgeCP.exe 80 PID 2152 wrote to memory of 676 2152 MicrosoftEdgeCP.exe 77 PID 2152 wrote to memory of 4120 2152 MicrosoftEdgeCP.exe 80 PID 2152 wrote to memory of 676 2152 MicrosoftEdgeCP.exe 77 PID 2152 wrote to memory of 4120 2152 MicrosoftEdgeCP.exe 80 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79 PID 2152 wrote to memory of 676 2152 MicrosoftEdgeCP.exe 77 PID 2152 wrote to memory of 4120 2152 MicrosoftEdgeCP.exe 80 PID 2152 wrote to memory of 676 2152 MicrosoftEdgeCP.exe 77 PID 2152 wrote to memory of 4120 2152 MicrosoftEdgeCP.exe 80 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79 PID 2152 wrote to memory of 676 2152 MicrosoftEdgeCP.exe 77 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79 PID 2152 wrote to memory of 676 2152 MicrosoftEdgeCP.exe 77 PID 2152 wrote to memory of 676 2152 MicrosoftEdgeCP.exe 77 PID 2152 wrote to memory of 676 2152 MicrosoftEdgeCP.exe 77 PID 2152 wrote to memory of 676 2152 MicrosoftEdgeCP.exe 77 PID 2152 wrote to memory of 5680 2152 MicrosoftEdgeCP.exe 88 PID 2152 wrote to memory of 5680 2152 MicrosoftEdgeCP.exe 88 PID 2152 wrote to memory of 5680 2152 MicrosoftEdgeCP.exe 88 PID 2152 wrote to memory of 5680 2152 MicrosoftEdgeCP.exe 88 PID 2152 wrote to memory of 5680 2152 MicrosoftEdgeCP.exe 88 PID 2152 wrote to memory of 5680 2152 MicrosoftEdgeCP.exe 88 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79 PID 2152 wrote to memory of 3024 2152 MicrosoftEdgeCP.exe 83 PID 2152 wrote to memory of 3024 2152 MicrosoftEdgeCP.exe 83 PID 2152 wrote to memory of 3024 2152 MicrosoftEdgeCP.exe 83 PID 2152 wrote to memory of 676 2152 MicrosoftEdgeCP.exe 77 PID 2152 wrote to memory of 676 2152 MicrosoftEdgeCP.exe 77 PID 2152 wrote to memory of 3748 2152 MicrosoftEdgeCP.exe 82 PID 2152 wrote to memory of 676 2152 MicrosoftEdgeCP.exe 77 PID 2152 wrote to memory of 676 2152 MicrosoftEdgeCP.exe 77 PID 2152 wrote to memory of 3748 2152 MicrosoftEdgeCP.exe 82 PID 2152 wrote to memory of 3748 2152 MicrosoftEdgeCP.exe 82 PID 2152 wrote to memory of 3748 2152 MicrosoftEdgeCP.exe 82 PID 2152 wrote to memory of 3748 2152 MicrosoftEdgeCP.exe 82 PID 2152 wrote to memory of 3748 2152 MicrosoftEdgeCP.exe 82 PID 2152 wrote to memory of 3748 2152 MicrosoftEdgeCP.exe 82 PID 2152 wrote to memory of 3748 2152 MicrosoftEdgeCP.exe 82 PID 2152 wrote to memory of 3748 2152 MicrosoftEdgeCP.exe 82 PID 2152 wrote to memory of 3748 2152 MicrosoftEdgeCP.exe 82 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79 PID 2152 wrote to memory of 4212 2152 MicrosoftEdgeCP.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d4e02cd38ccdc03c963e5b6673fd6dade63e0c74942cec56a7545d5b53f1f50.exe"C:\Users\Admin\AppData\Local\Temp\6d4e02cd38ccdc03c963e5b6673fd6dade63e0c74942cec56a7545d5b53f1f50.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1qg22cK3.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1qg22cK3.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3xx04ZB.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3xx04ZB.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2764
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1448
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4404
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3124
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:4188
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:676
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3796
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:4212
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:4120
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3748
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3024
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5532
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5680
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:208
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\7AD3.exeC:\Users\Admin\AppData\Local\Temp\7AD3.exe1⤵
- Executes dropped EXE
PID:3064
-
C:\Users\Admin\AppData\Local\Temp\BAEB.exeC:\Users\Admin\AppData\Local\Temp\BAEB.exe1⤵
- Executes dropped EXE
PID:8
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:3912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UGUTIJX0\buttons[1].css
Filesize32KB
MD5b91ff88510ff1d496714c07ea3f1ea20
SHA19c4b0ad541328d67a8cde137df3875d824891e41
SHA2560be99fd30134de50d457729cebd0e08342777af747caf503108178cb4c375085
SHA512e82438186bfc3e9ca690af8e099aafbfbc71c9310f9d1c8cb87ffa9e7f0f11f33982c63a2dac95c9b83fef1aaa59178b73212fc76e895d13a1ffbbe3c1adfa4c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UGUTIJX0\shared_global[1].css
Filesize84KB
MD5cfe7fa6a2ad194f507186543399b1e39
SHA148668b5c4656127dbd62b8b16aa763029128a90c
SHA256723131aba2cf0edd34a29d63af1d7b4ff515b9a3a3e164b2493026132dd37909
SHA5125c85bb6404d5be1871b0b2e2d2c9053716354acd69c7acca73d8ce8bf8f21645ae11f788f78ef624444016cb722ecbd6213e771bda36717725f2b60f53688c6b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UGUTIJX0\shared_global[1].js
Filesize149KB
MD5f94199f679db999550a5771140bfad4b
SHA110e3647f07ef0b90e64e1863dd8e45976ba160c0
SHA25626c013d87a0650ece1f28cdc42d7995ad1a57e5681e30c4fd1c3010d995b7548
SHA51266aef2dda0d8b76b68fd4a90c0c8332d98fe6d23590954a20317b0129a39feb9cd3bd44e0c57e6b309227d912c6c07b399302a5e680615e05269769b7e750036
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UGUTIJX0\shared_responsive[1].css
Filesize18KB
MD52ab2918d06c27cd874de4857d3558626
SHA1363be3b96ec2d4430f6d578168c68286cb54b465
SHA2564afb3e37bfdd549cc16ef5321faf3f0a3bf6e84c79fc4408bc6f157280636453
SHA5123af59e0b16ef9d39c2f1c5ccdbd5c9ea35bd78571fde1b5bf01e51a675d5554e03225a2d7c04ed67e22569e9f43b16788105a0bf591ebba28ef917c961cc59e2
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UGUTIJX0\shared_responsive_adapter[1].js
Filesize24KB
MD5a52bc800ab6e9df5a05a5153eea29ffb
SHA18661643fcbc7498dd7317d100ec62d1c1c6886ff
SHA25657cfaf9b92c98541f769090cd0229a30013cea7cfafc18519ca654bfae29e14e
SHA5121bcacd0ec7c3d633d6296fff3325802d6352805f0d2cf1eea39237424229ecffad6cb2aee4248e28b1eca02ff0646b58240851a246bbcf0aa1083830d5d9081e
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UGUTIJX0\tooltip[1].js
Filesize15KB
MD572938851e7c2ef7b63299eba0c6752cb
SHA1b75196bd3a6f9f4dfc1bbf5e43e96874bcd9ce4e
SHA256e2d4e0e1d3e162fdc815f16dfff9ae9b0a967949f0f3ae371f947d730a3f0661
SHA5122bb6c03a1335ef9514d0d172a4284d82a29d1783a72306bdcb8af3185d5cd2ff16303355aa4b05086d2fa0b5b7c7159cfa67de4a6175095ff0e68adec2a56ac1
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\4KOFPTML\www.epicgames[1].xml
Filesize13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\NFR6T3F4\favicon[1].ico
Filesize1KB
MD5630d203cdeba06df4c0e289c8c8094f6
SHA1eee14e8a36b0512c12ba26c0516b4553618dea36
SHA256bbce71345828a27c5572637dbe88a3dd1e065266066600c8a841985588bf2902
SHA51209f4e204960f4717848bf970ac4305f10201115e45dd5fe0196a6346628f0011e7bc17d73ec946b68731a5e179108fd39958cecf41125f44094f63fe5f2aeb2c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\NFR6T3F4\favicon[2].ico
Filesize37KB
MD5231913fdebabcbe65f4b0052372bde56
SHA1553909d080e4f210b64dc73292f3a111d5a0781f
SHA2569f890a9debcdfccc339149a7943be9aff9e4c9203c2fa37d5671a5b2c88503ad
SHA5127b11b709968c5a52b9b60189fb534f5df56912417243820e9d1c00c97f4bd6d0835f2cdf574d0c36ecb32dbbf5fc397324df54f7fdf9e1b062b5dbda2c02e919
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\WLL5YLMH\B8BxsscfVBr[1].ico
Filesize1KB
MD5e508eca3eafcc1fc2d7f19bafb29e06b
SHA1a62fc3c2a027870d99aedc241e7d5babba9a891f
SHA256e6d1d77403cd9f14fd2377d07e84350cfe768e3353e402bf42ebdc8593a58c9a
SHA51249e3f31fd73e52ba274db9c7d306cc188e09c3ae683827f420fbb17534d197a503460e7ec2f1af46065f8d0b33f37400659bfa2ae165e502f97a8150e184a38c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\60fck89\imagestore.dat
Filesize28KB
MD54d221e35bb63865754b54bbd8934f79d
SHA14d64cfd8da2fc429cd7e4f55db5c4984320eb8d9
SHA256dc8ef2fdbc01a1feecfe6e720744fe990308c34d6aebeb18e26cf8c0f47184c0
SHA512ee4db46235ee77733b5edbbc91c596a9755efeda6862e3285b7be470efc437196dbde7657b13805234242318db0f9a31e9e8b7cc8927ad3993efa7abeb4033bb
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize4KB
MD51bfe591a4fe3d91b03cdf26eaacd8f89
SHA1719c37c320f518ac168c86723724891950911cea
SHA2569cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8
SHA51202f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\13NML44T.cookie
Filesize131B
MD595a412b5f0313f4a3ca1860b60d1678a
SHA1e3af56b4accf26ea900ba7283911134001c47775
SHA256946230eb4f2e228970792acadc715fe22327254bc9f550c9c7854b72bc45d4c6
SHA512ca134da0ddf20294599d73645543f835552ddb4f2ca90e29fb552df153ccb89365aecdc73e9b74bf0430d61318ebbfa952ae01411ddc5cac8767f750b25c6b15
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\70H1NXZR.cookie
Filesize131B
MD54e52ef8ed31dcac0611023c3082583f7
SHA18d49e76817f8445705379f809ff305ce3b7e38f4
SHA256761f94d3f1db7dd1c71b7717d575c3c1aef16d6fca9011f440b51650be0ff6e8
SHA5128c1fe9c5ac4b2f8b6f6c2df5bd5378a05f0aa785c104c53064b3ad4b0bfe3255360676d119faf856cc266508621688b342ad0a73624c303e19c1607f21291c2a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\F9SEF4X4.cookie
Filesize859B
MD5eb4810caa57d67e794645d34060b86af
SHA1cedb00552552c4df3a7a1faf584e1df3ee35c076
SHA256555314ad6bac790c8727cad403ca8e60db22b0768278824070e56c2ad6ca090d
SHA5128a8333cab2bdf3c7371e8f816f94bc4ea1fb77c750b36b34a0a98e70e8a384f0f6ba8b9f657f4291a5622f9f9681d2aaaecee00e8833a2aae54d82c5fb112d6a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5a4c7d91884a85bdb10d3962b7edb6f31
SHA17ed4d4526f5d7876d704af420b18e2322f5cf21d
SHA256537ea6e404e1a67c311061606067244fcbd8892632cefd438b5376bd9bbbd539
SHA512c3517da44f2907924aff28bd1ca633c7c74ff1c373776546d8a2cfc24020fc9ffe177ba7a067eafb605eb9bda0e380195c3293ec3886a3c4cc116a85a2a0c444
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize4KB
MD51bfe591a4fe3d91b03cdf26eaacd8f89
SHA1719c37c320f518ac168c86723724891950911cea
SHA2569cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8
SHA51202f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize1KB
MD5bbf0e29268ddfd99bde03e58039df96a
SHA13ba0542fed7734b1fcb484d73df8583d4c1cb11d
SHA256ccb67510824670f69ce2ed17ba72455f2be26d053ab13b2d04e8c4bbc2a456a4
SHA5124eac0c845359016b7045100c146d83b3c5e94ca7d319e4bcde9c19f880b89d33630aadbfbeb21c85295388826e046857aafba5b55fd22397537761586af0df35
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize471B
MD580144ac74f3b6f6d6a75269bdc5d5a60
SHA16707bb0c8a3e92d1fd4765e10781535433036196
SHA256d746128fdb817742cb812c74fb8aa543191116feda6dfcfc59d74becf482a285
SHA512c61d3847bdc0c4a4b8cd94b2d9a3a474b985b974776ca2ef4caf78e5fb82e4d4f65c477dec1cdf080f9d397f3d0dfe035adc267f9b4fe9b75c82e399f20bc6b3
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_57CE1AECC398AD2C94DD1A683EAD09FC
Filesize471B
MD5512efc86ad030a9f7699232254b7dc91
SHA1b020f69657c8f9f6f31bac79eb9731fc65a7edea
SHA2568378bc432890d6865c27fd76c1daacedc5d6ab322eea880873f7acd9a85eee28
SHA51247eac50cafea502714868bd9004f90b9699cc883141407ec17ad4e165e1c6caffee12739381370cb37c9e12f389c5f2046465bedf977924a5fe5e3b51b6a91af
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD509568378e2128e562f96c77690f8e3da
SHA1643a7a4aac6e499d61cf033cfd246401614d5cb6
SHA2568235561124daa0547fd1ca9def3467b5cc311e6c5fc1bbc1deaa096f05572dbb
SHA5128da8c8a32c9dbf135a02aea91549851237f0329bb1c59f1607d63e99211204b1584308215a3475c2f91c6e5ea8f1441c34d7155f429726601c4e4d1f939541d7
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize338B
MD562212c0d0991c8b5690d7b0f0ed1ae7d
SHA10e1bd0f9ad2994f2bf4063bc17081c66e5055b70
SHA25625455d068e74eb12c0ee044b1e81075185d15270c667b1297b123e0fbb9ace5b
SHA51288e3e67b33a844416cd8dd20d94dbe6eb86a33320f549205ac24329b9b1a8d174efc8bb19abc74c49a08d8b02a7ee056d732c275dbe2da6a241d36f624a53a5e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize408B
MD581e9cfbf1da1894fecd50a325f370f19
SHA195faf8d6ce1528c1e62462a52104993d0a7994de
SHA25697aaac429fea34457ee8ff2b7848be7e9b269cd876cc40014393ce3c463c0225
SHA51212a8e0c3f4fe273d07fc05025c6a10d42c48bd07c1efc4a2a8b8c84d4d5512898c23612b470949e0a13dd8fa92ded2bebd2c4c0194642eeb312e96a7f9db8a4c
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD55fe28bf80e341a30da1007117d8e08f6
SHA1c3c4ec4d6d4bd09a4c5100901410e12e49cc8e51
SHA2561995e0c91738eb4c3b9142d0b79d6c2e160e4e929374efcb7965f95f8d7a30a8
SHA512c1e34648380198f412c464514ae54f9ba79c943d13053d758d777a2045fca838c81feb0a0e550fcbb2a223e10fccede7edee0781d837b1095e66e25153996c33
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize400B
MD51494222ce09b1254b1261bb6d85fb3f1
SHA1184cfc8e58a3f0c1548cc64efbc5d2913917e040
SHA2565a24a423d3f4dfe2aaaee48eb52794b41759f5555a34b39b1c626edaf706d4a4
SHA51284abca5209822b09a81c2ab90b922e736ca1ef53e41914c1799e287ea3267ec3f791e28e2237170b48c7dd17b1ce57781ada69ac40c014a2d157dd2ee86ec6db
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_57CE1AECC398AD2C94DD1A683EAD09FC
Filesize406B
MD562756be9041d4c6994c53be7843c37b4
SHA10e523bead0e3fcccd3a496088fd4a9943a325eae
SHA256ae2cb07f6d3c2ecf2583adb15e6a5b7838e569a26326711aee2afa46ce887771
SHA5127b2a4f5fc13ec2f10d52dbadae71f8503ade4d6b9e85775dfbd6bb8a3986e461d38961b30c8f5c760e2b8244f177b023f5a4c8d5e6202748f3e95dc28a030c7c
-
Filesize
428KB
MD500b8992b81895399705febca26261d2f
SHA1cad8070a0a9d26c5157af0430f3c6e4cfd507dc4
SHA256ecaa0c2607027b807cd7092124f7e3ce4982fb7a05436ede18e2fb3b66a48528
SHA5127bbb1e9f73b9f0c5aa1df89839c7affc59609deb483cc93b733707cb8248ed27f9c1cef6a0f12f5b50caf8ec6243c8d1114283d4fd5dbbbd7fef9cd16345f4c1
-
Filesize
428KB
MD500b8992b81895399705febca26261d2f
SHA1cad8070a0a9d26c5157af0430f3c6e4cfd507dc4
SHA256ecaa0c2607027b807cd7092124f7e3ce4982fb7a05436ede18e2fb3b66a48528
SHA5127bbb1e9f73b9f0c5aa1df89839c7affc59609deb483cc93b733707cb8248ed27f9c1cef6a0f12f5b50caf8ec6243c8d1114283d4fd5dbbbd7fef9cd16345f4c1
-
Filesize
95KB
MD50592c6d7674c77b053080c5b6e79fdcb
SHA1693339ede19093e2b4593fda93be0b140be69141
SHA256fe19cdb149ecd8fd116f048852dcc10e46a3521351102685ce25c61a7d962a14
SHA51237f2ff110b0702229b888280c8c2dff7885e6b1e583ccc47c36e74f44adfa491f70d6d6ab95d79149437d6fd9400448f1046eee3676ea98dffe99bc28e4783cb
-
Filesize
895KB
MD5be6ca12dc7ff93b359da469bb49d9b5b
SHA1b901843ddf28152543b74f31bb29805a3d12583d
SHA25689a85a6e3abb0d2b412cb4986149e064ee4162cfa9ceb7a208d0221ff6e951d9
SHA51204777e2663b3913b303bb92b00c3b40dd4c76409f7ad970f25e7ba30e2e0c3ea3d105f952dbe6697653bca10172da8ab2c9b1c09fd5ba1cb96524a61a2658c72
-
Filesize
895KB
MD5be6ca12dc7ff93b359da469bb49d9b5b
SHA1b901843ddf28152543b74f31bb29805a3d12583d
SHA25689a85a6e3abb0d2b412cb4986149e064ee4162cfa9ceb7a208d0221ff6e951d9
SHA51204777e2663b3913b303bb92b00c3b40dd4c76409f7ad970f25e7ba30e2e0c3ea3d105f952dbe6697653bca10172da8ab2c9b1c09fd5ba1cb96524a61a2658c72
-
Filesize
37KB
MD5b938034561ab089d7047093d46deea8f
SHA1d778c32cc46be09b107fa47cf3505ba5b748853d
SHA256260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161
SHA5124909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b
-
Filesize
37KB
MD5b938034561ab089d7047093d46deea8f
SHA1d778c32cc46be09b107fa47cf3505ba5b748853d
SHA256260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161
SHA5124909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b