Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 23:52
Static task
static1
Behavioral task
behavioral1
Sample
079a6b7ec6a7311dd8845286678c76f5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
079a6b7ec6a7311dd8845286678c76f5.exe
Resource
win10v2004-20231215-en
General
-
Target
079a6b7ec6a7311dd8845286678c76f5.exe
-
Size
877KB
-
MD5
079a6b7ec6a7311dd8845286678c76f5
-
SHA1
dd67cb9b94fbef1d57b3eacd3d3487183b9ccf72
-
SHA256
37486e6a37ceeafc4acbb6300b4fc97ec4961f58fa479982b4bfa389bd643df5
-
SHA512
b8be27e226392b1b7877a0c2a3f9788b78d27b49aed0996ebc890a13a4a030ad9fb42c204b2b80fcc6f82bd684b99e55878e801e7e76abefa6be174b2aac24fa
-
SSDEEP
12288:UZWtI6RkE+erQZb+md4w1UWOB0JupOB0H:UuhaE+erQZb+md4wmWO9OM
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" regedit.exe -
Blocks application from running via registry modification 17 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" regedit.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" regedit.exe -
Sets file execution options in registry 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe -
Executes dropped EXE 1 IoCs
pid Process 2656 KavUpda.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\Autorun.inf KavUpda.exe File opened for modification C:\Autorun.inf KavUpda.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Option.bat KavUpda.exe File created C:\Windows\SysWOW64\Option.bat 079a6b7ec6a7311dd8845286678c76f5.exe -
Drops file in Program Files directory 39 IoCs
description ioc Process File opened for modification C:\Program Files\dotnet\dotnet.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\createdump.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\7-Zip\7z.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\createdump.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe 079a6b7ec6a7311dd8845286678c76f5.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\regedt32.sys KavUpda.exe File opened for modification C:\Windows\Help\HelpCat.exe 079a6b7ec6a7311dd8845286678c76f5.exe File created C:\Windows\Sysinf.bat 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Windows\Sysinf.bat KavUpda.exe File created C:\Windows\regedt32.sys 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Windows\system\KavUpda.exe KavUpda.exe File opened for modification C:\Windows\regedt32.sys KavUpda.exe File created C:\Windows\system\KavUpda.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Windows\system\KavUpda.exe 079a6b7ec6a7311dd8845286678c76f5.exe File created C:\Windows\Help\HelpCat.exe 079a6b7ec6a7311dd8845286678c76f5.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4452 sc.exe 2596 sc.exe 2992 sc.exe 4048 sc.exe 1720 sc.exe 1312 sc.exe 2836 sc.exe 2424 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 2188 regedit.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2656 KavUpda.exe Token: SeIncBasePriorityPrivilege 2656 KavUpda.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 216 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 216 079a6b7ec6a7311dd8845286678c76f5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 216 079a6b7ec6a7311dd8845286678c76f5.exe 2656 KavUpda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 3360 216 079a6b7ec6a7311dd8845286678c76f5.exe 25 PID 216 wrote to memory of 3360 216 079a6b7ec6a7311dd8845286678c76f5.exe 25 PID 216 wrote to memory of 3360 216 079a6b7ec6a7311dd8845286678c76f5.exe 25 PID 216 wrote to memory of 3792 216 079a6b7ec6a7311dd8845286678c76f5.exe 24 PID 216 wrote to memory of 3792 216 079a6b7ec6a7311dd8845286678c76f5.exe 24 PID 216 wrote to memory of 3792 216 079a6b7ec6a7311dd8845286678c76f5.exe 24 PID 3792 wrote to memory of 2644 3792 net.exe 199 PID 3792 wrote to memory of 2644 3792 net.exe 199 PID 3792 wrote to memory of 2644 3792 net.exe 199 PID 216 wrote to memory of 1132 216 079a6b7ec6a7311dd8845286678c76f5.exe 100 PID 216 wrote to memory of 1132 216 079a6b7ec6a7311dd8845286678c76f5.exe 100 PID 216 wrote to memory of 1132 216 079a6b7ec6a7311dd8845286678c76f5.exe 100 PID 216 wrote to memory of 3244 216 079a6b7ec6a7311dd8845286678c76f5.exe 99 PID 216 wrote to memory of 3244 216 079a6b7ec6a7311dd8845286678c76f5.exe 99 PID 216 wrote to memory of 3244 216 079a6b7ec6a7311dd8845286678c76f5.exe 99 PID 216 wrote to memory of 5004 216 079a6b7ec6a7311dd8845286678c76f5.exe 98 PID 216 wrote to memory of 5004 216 079a6b7ec6a7311dd8845286678c76f5.exe 98 PID 216 wrote to memory of 5004 216 079a6b7ec6a7311dd8845286678c76f5.exe 98 PID 216 wrote to memory of 2028 216 079a6b7ec6a7311dd8845286678c76f5.exe 128 PID 216 wrote to memory of 2028 216 079a6b7ec6a7311dd8845286678c76f5.exe 128 PID 216 wrote to memory of 2028 216 079a6b7ec6a7311dd8845286678c76f5.exe 128 PID 216 wrote to memory of 872 216 079a6b7ec6a7311dd8845286678c76f5.exe 105 PID 216 wrote to memory of 872 216 079a6b7ec6a7311dd8845286678c76f5.exe 105 PID 216 wrote to memory of 872 216 079a6b7ec6a7311dd8845286678c76f5.exe 105 PID 216 wrote to memory of 2036 216 079a6b7ec6a7311dd8845286678c76f5.exe 93 PID 216 wrote to memory of 2036 216 079a6b7ec6a7311dd8845286678c76f5.exe 93 PID 216 wrote to memory of 2036 216 079a6b7ec6a7311dd8845286678c76f5.exe 93 PID 216 wrote to memory of 60 216 079a6b7ec6a7311dd8845286678c76f5.exe 91 PID 216 wrote to memory of 60 216 079a6b7ec6a7311dd8845286678c76f5.exe 91 PID 216 wrote to memory of 60 216 079a6b7ec6a7311dd8845286678c76f5.exe 91 PID 216 wrote to memory of 3336 216 079a6b7ec6a7311dd8845286678c76f5.exe 88 PID 216 wrote to memory of 3336 216 079a6b7ec6a7311dd8845286678c76f5.exe 88 PID 216 wrote to memory of 3336 216 079a6b7ec6a7311dd8845286678c76f5.exe 88 PID 216 wrote to memory of 2836 216 079a6b7ec6a7311dd8845286678c76f5.exe 85 PID 216 wrote to memory of 2836 216 079a6b7ec6a7311dd8845286678c76f5.exe 85 PID 216 wrote to memory of 2836 216 079a6b7ec6a7311dd8845286678c76f5.exe 85 PID 216 wrote to memory of 1312 216 079a6b7ec6a7311dd8845286678c76f5.exe 84 PID 216 wrote to memory of 1312 216 079a6b7ec6a7311dd8845286678c76f5.exe 84 PID 216 wrote to memory of 1312 216 079a6b7ec6a7311dd8845286678c76f5.exe 84 PID 216 wrote to memory of 1720 216 079a6b7ec6a7311dd8845286678c76f5.exe 82 PID 216 wrote to memory of 1720 216 079a6b7ec6a7311dd8845286678c76f5.exe 82 PID 216 wrote to memory of 1720 216 079a6b7ec6a7311dd8845286678c76f5.exe 82 PID 216 wrote to memory of 4048 216 079a6b7ec6a7311dd8845286678c76f5.exe 60 PID 216 wrote to memory of 4048 216 079a6b7ec6a7311dd8845286678c76f5.exe 60 PID 216 wrote to memory of 4048 216 079a6b7ec6a7311dd8845286678c76f5.exe 60 PID 216 wrote to memory of 2188 216 079a6b7ec6a7311dd8845286678c76f5.exe 61 PID 216 wrote to memory of 2188 216 079a6b7ec6a7311dd8845286678c76f5.exe 61 PID 216 wrote to memory of 2188 216 079a6b7ec6a7311dd8845286678c76f5.exe 61 PID 216 wrote to memory of 4780 216 079a6b7ec6a7311dd8845286678c76f5.exe 79 PID 216 wrote to memory of 4780 216 079a6b7ec6a7311dd8845286678c76f5.exe 79 PID 216 wrote to memory of 4780 216 079a6b7ec6a7311dd8845286678c76f5.exe 79 PID 60 wrote to memory of 4092 60 net.exe 77 PID 60 wrote to memory of 4092 60 net.exe 77 PID 60 wrote to memory of 4092 60 net.exe 77 PID 216 wrote to memory of 3636 216 079a6b7ec6a7311dd8845286678c76f5.exe 78 PID 216 wrote to memory of 3636 216 079a6b7ec6a7311dd8845286678c76f5.exe 78 PID 216 wrote to memory of 3636 216 079a6b7ec6a7311dd8845286678c76f5.exe 78 PID 3244 wrote to memory of 4644 3244 cmd.exe 76 PID 3244 wrote to memory of 4644 3244 cmd.exe 76 PID 3244 wrote to memory of 4644 3244 cmd.exe 76 PID 2028 wrote to memory of 3576 2028 Conhost.exe 75 PID 2028 wrote to memory of 3576 2028 Conhost.exe 75 PID 2028 wrote to memory of 3576 2028 Conhost.exe 75 PID 5004 wrote to memory of 3384 5004 cmd.exe 73 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 1152 attrib.exe 2532 attrib.exe 4620 attrib.exe 1316 attrib.exe 4932 attrib.exe 1628 attrib.exe 1400 attrib.exe 3188 attrib.exe 3748 attrib.exe 4124 attrib.exe 880 attrib.exe 2928 attrib.exe 3460 attrib.exe 5064 attrib.exe 464 attrib.exe 380 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\079a6b7ec6a7311dd8845286678c76f5.exe"C:\Users\Admin\AppData\Local\Temp\079a6b7ec6a7311dd8845286678c76f5.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵
- Suspicious use of WriteProcessMemory
PID:3792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat2⤵PID:3360
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:4048
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Modifies visibility of file extensions in Explorer
- Blocks application from running via registry modification
- Sets file execution options in registry
- Runs regedit.exe
PID:2188
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵
- Executes dropped EXE
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:1540
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y4⤵PID:2532
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:2424 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Suspicious use of WriteProcessMemory
PID:2028
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:4452
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3108
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3692
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:4364
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:1824
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:2596
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:2992
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:2280
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:2644
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:2872
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:1528
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:13:08 PM C:\Windows\Sysinf.bat3⤵PID:1588
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:10:08 PM C:\Windows\Sysinf.bat3⤵PID:4696
-
-
C:\Windows\SysWOW64\At.exeAt.exe 6:11:06 PM C:\Windows\Help\HelpCat.exe3⤵PID:4244
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3432
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3900
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:396
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2532
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4788
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3080
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4992
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3460
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:392
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1960
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:452
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2728
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:5112
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2464
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:396
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3412
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4988
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3164
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3984
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:3748
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3504
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:5064
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3768
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2456
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:4124
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3460
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2896
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1804
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1400
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1120
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4992
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:464
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3184
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4176
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:380
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2740
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:3636
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:4780
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:1720
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:1312
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2836
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:3336
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵
- Suspicious use of WriteProcessMemory
PID:60
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:2036
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:872
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:2028
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:13:05 PM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:5004
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:10:05 PM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3244
-
-
C:\Windows\SysWOW64\At.exeAt.exe 6:11:03 PM C:\Windows\Help\HelpCat.exe2⤵PID:1132
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:3992
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:3968
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:3408
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:592
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:4160
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:2644
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y2⤵PID:1152
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:828
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:4680
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵PID:3748
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y2⤵PID:1712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat1⤵PID:2796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:4788
-
C:\Windows\SysWOW64\at.exeat 6:13:05 PM C:\Windows\Sysinf.bat1⤵PID:3384
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:3576
-
C:\Windows\SysWOW64\at.exeat 6:10:05 PM C:\Windows\Sysinf.bat1⤵PID:4644
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:4092
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:872
-
C:\Windows\SysWOW64\at.exeat 6:10:08 PM C:\Windows\Sysinf.bat1⤵PID:1200
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3188
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:1436
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2868
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:544
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:5104
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:3716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1980
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1504
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:1616
-
C:\Windows\SysWOW64\at.exeat 6:13:08 PM C:\Windows\Sysinf.bat1⤵PID:4508
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4680
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1152
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 58cb0a5c033b55a06b4c74afc951dfd5 0YfcFGLLCkylQzSFJ56bWw.0.1.0.0.01⤵PID:2644
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:1616
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2928
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4932
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1628
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1400
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3460
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1316
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5c02140a0b11470d0776fac7533b56441
SHA149340674259c09bcc653d6d437c7f57d118d1627
SHA2560825de767a2ee6c314afc417f7602f633adb89c108757fe7313aad9f317d096b
SHA5120f778ac465f58c946ad7389e49d6b1ea466bf3b79c2440757193177ae57800713b4dc0faa770671f780423ff53ad91cdcf58571a7edf586c66c6638ba4829148
-
Filesize
2KB
MD5e7d7ec66bd61fac3843c98650b0c68f6
SHA1a15ae06e1be51038863650746368a71024539bac
SHA2566475d5ecc14fea090774be55723d2d52b7ec7670527a7dbd61edf28c77944cb8
SHA512ac9e9893f5a0af03957731445f63279085f164e9a968d706a99d13012e4459314a7ccc32dc48f62379d69e21a0953c13543c9ded38b5ad5fbc346aa442af1ae6