Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 12:10
Static task
static1
Behavioral task
behavioral1
Sample
cb5f96fa73006ec910553fb2a3bc986d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb5f96fa73006ec910553fb2a3bc986d.exe
Resource
win10v2004-20240226-en
General
-
Target
cb5f96fa73006ec910553fb2a3bc986d.exe
-
Size
172KB
-
MD5
cb5f96fa73006ec910553fb2a3bc986d
-
SHA1
7fe83fcbc70e9a152610e8b7ad77b4af6e7058a0
-
SHA256
b694691dc58c664b72191f81523cf4ae3926283f3d77d363fd5d14786d069549
-
SHA512
a3a505d1b4a3caf2f86c7465df3816c652cd2906e6ab25e976be3bcf2b385d3015ac3c29d03ba9dd38c81b9dc836e8083b8a230d1a4bc0ed97703f9d89e1865e
-
SSDEEP
3072:V9P0I2tfDXvFdHHbVP3ifOJzlFwV+u9tBb2W6eSMmd:VJ2RXtdHNyf8zlKJtFZ6LMm
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 36 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation cb5f96fa73006ec910553fb2a3bc986d.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wmpcx1.exe -
Deletes itself 1 IoCs
pid Process 5108 wmpcx1.exe -
Executes dropped EXE 64 IoCs
pid Process 5020 wmpcx1.exe 5108 wmpcx1.exe 2468 wmpcx1.exe 3356 wmpcx1.exe 924 wmpcx1.exe 1996 wmpcx1.exe 3516 wmpcx1.exe 4268 wmpcx1.exe 5108 wmpcx1.exe 2468 wmpcx1.exe 652 wmpcx1.exe 2728 wmpcx1.exe 1896 wmpcx1.exe 4068 wmpcx1.exe 3184 wmpcx1.exe 4584 wmpcx1.exe 2388 wmpcx1.exe 3564 wmpcx1.exe 2128 wmpcx1.exe 468 wmpcx1.exe 4400 wmpcx1.exe 3256 wmpcx1.exe 4184 wmpcx1.exe 3648 wmpcx1.exe 4540 wmpcx1.exe 852 wmpcx1.exe 3164 wmpcx1.exe 3920 wmpcx1.exe 3284 wmpcx1.exe 3856 wmpcx1.exe 3544 wmpcx1.exe 2648 wmpcx1.exe 1628 wmpcx1.exe 708 wmpcx1.exe 1108 wmpcx1.exe 3956 wmpcx1.exe 3252 wmpcx1.exe 3248 wmpcx1.exe 5108 wmpcx1.exe 3860 wmpcx1.exe 2320 wmpcx1.exe 3852 wmpcx1.exe 1416 wmpcx1.exe 1256 wmpcx1.exe 3012 wmpcx1.exe 3320 wmpcx1.exe 3560 wmpcx1.exe 3524 wmpcx1.exe 1892 wmpcx1.exe 3284 wmpcx1.exe 2152 wmpcx1.exe 208 wmpcx1.exe 4512 wmpcx1.exe 4636 wmpcx1.exe 1892 wmpcx1.exe 1020 wmpcx1.exe 3132 wmpcx1.exe 2548 wmpcx1.exe 1248 wmpcx1.exe 4048 wmpcx1.exe 2480 wmpcx1.exe 3796 wmpcx1.exe 2604 wmpcx1.exe 1120 wmpcx1.exe -
resource yara_rule behavioral2/memory/3548-2-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3548-4-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3548-5-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3548-6-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3548-67-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/5108-74-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/5108-75-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/5108-76-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/5108-78-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3356-85-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3356-86-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3356-87-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3356-89-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1996-95-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4268-114-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4268-116-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4268-115-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4268-117-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2468-129-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2728-141-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4068-152-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4584-162-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3564-171-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3564-172-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3564-173-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3564-177-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/468-190-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3256-202-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3648-214-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/852-227-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3920-238-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3856-251-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2648-263-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/708-275-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3956-287-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3248-301-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3860-313-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3852-324-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1256-337-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3320-347-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3524-358-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3284-368-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/208-378-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4636-388-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1020-397-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2548-409-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4048-418-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3796-427-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1120-437-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2460-447-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2484-458-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/668-468-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 cb5f96fa73006ec910553fb2a3bc986d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpcx1.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe File created C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\wmpcx1.exe wmpcx1.exe File opened for modification C:\Windows\SysWOW64\ wmpcx1.exe -
Suspicious use of SetThreadContext 37 IoCs
description pid Process procid_target PID 1136 set thread context of 3548 1136 cb5f96fa73006ec910553fb2a3bc986d.exe 99 PID 5020 set thread context of 5108 5020 wmpcx1.exe 105 PID 2468 set thread context of 3356 2468 wmpcx1.exe 109 PID 924 set thread context of 1996 924 wmpcx1.exe 112 PID 3516 set thread context of 4268 3516 wmpcx1.exe 116 PID 5108 set thread context of 2468 5108 wmpcx1.exe 118 PID 652 set thread context of 2728 652 wmpcx1.exe 121 PID 1896 set thread context of 4068 1896 wmpcx1.exe 123 PID 3184 set thread context of 4584 3184 wmpcx1.exe 125 PID 2388 set thread context of 3564 2388 wmpcx1.exe 127 PID 2128 set thread context of 468 2128 wmpcx1.exe 131 PID 4400 set thread context of 3256 4400 wmpcx1.exe 133 PID 4184 set thread context of 3648 4184 wmpcx1.exe 135 PID 4540 set thread context of 852 4540 wmpcx1.exe 137 PID 3164 set thread context of 3920 3164 wmpcx1.exe 139 PID 3284 set thread context of 3856 3284 wmpcx1.exe 141 PID 3544 set thread context of 2648 3544 wmpcx1.exe 143 PID 1628 set thread context of 708 1628 wmpcx1.exe 145 PID 1108 set thread context of 3956 1108 wmpcx1.exe 148 PID 3252 set thread context of 3248 3252 wmpcx1.exe 150 PID 5108 set thread context of 3860 5108 wmpcx1.exe 152 PID 2320 set thread context of 3852 2320 wmpcx1.exe 154 PID 1416 set thread context of 1256 1416 wmpcx1.exe 156 PID 3012 set thread context of 3320 3012 wmpcx1.exe 158 PID 3560 set thread context of 3524 3560 wmpcx1.exe 160 PID 1892 set thread context of 3284 1892 wmpcx1.exe 162 PID 2152 set thread context of 208 2152 wmpcx1.exe 164 PID 4512 set thread context of 4636 4512 wmpcx1.exe 167 PID 1892 set thread context of 1020 1892 wmpcx1.exe 172 PID 3132 set thread context of 2548 3132 wmpcx1.exe 178 PID 1248 set thread context of 4048 1248 wmpcx1.exe 180 PID 2480 set thread context of 3796 2480 wmpcx1.exe 182 PID 2604 set thread context of 1120 2604 wmpcx1.exe 184 PID 3900 set thread context of 2460 3900 wmpcx1.exe 186 PID 1676 set thread context of 2484 1676 wmpcx1.exe 188 PID 1896 set thread context of 668 1896 wmpcx1.exe 190 PID 4444 set thread context of 1528 4444 wmpcx1.exe 192 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ cb5f96fa73006ec910553fb2a3bc986d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpcx1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3548 cb5f96fa73006ec910553fb2a3bc986d.exe 3548 cb5f96fa73006ec910553fb2a3bc986d.exe 5108 wmpcx1.exe 5108 wmpcx1.exe 3356 wmpcx1.exe 3356 wmpcx1.exe 4268 wmpcx1.exe 4268 wmpcx1.exe 2468 wmpcx1.exe 2468 wmpcx1.exe 2728 wmpcx1.exe 2728 wmpcx1.exe 4068 wmpcx1.exe 4068 wmpcx1.exe 4584 wmpcx1.exe 4584 wmpcx1.exe 3564 wmpcx1.exe 3564 wmpcx1.exe 468 wmpcx1.exe 468 wmpcx1.exe 3256 wmpcx1.exe 3256 wmpcx1.exe 3648 wmpcx1.exe 3648 wmpcx1.exe 852 wmpcx1.exe 852 wmpcx1.exe 3920 wmpcx1.exe 3920 wmpcx1.exe 3856 wmpcx1.exe 3856 wmpcx1.exe 2648 wmpcx1.exe 2648 wmpcx1.exe 708 wmpcx1.exe 708 wmpcx1.exe 3956 wmpcx1.exe 3956 wmpcx1.exe 3248 wmpcx1.exe 3248 wmpcx1.exe 3860 wmpcx1.exe 3860 wmpcx1.exe 3852 wmpcx1.exe 3852 wmpcx1.exe 1256 wmpcx1.exe 1256 wmpcx1.exe 3320 wmpcx1.exe 3320 wmpcx1.exe 3524 wmpcx1.exe 3524 wmpcx1.exe 3284 wmpcx1.exe 3284 wmpcx1.exe 208 wmpcx1.exe 208 wmpcx1.exe 4636 wmpcx1.exe 4636 wmpcx1.exe 1020 wmpcx1.exe 1020 wmpcx1.exe 2548 wmpcx1.exe 2548 wmpcx1.exe 4048 wmpcx1.exe 4048 wmpcx1.exe 3796 wmpcx1.exe 3796 wmpcx1.exe 1120 wmpcx1.exe 1120 wmpcx1.exe -
Suspicious use of SetWindowsHookEx 37 IoCs
pid Process 1136 cb5f96fa73006ec910553fb2a3bc986d.exe 5020 wmpcx1.exe 2468 wmpcx1.exe 924 wmpcx1.exe 3516 wmpcx1.exe 5108 wmpcx1.exe 652 wmpcx1.exe 1896 wmpcx1.exe 3184 wmpcx1.exe 2388 wmpcx1.exe 2128 wmpcx1.exe 4400 wmpcx1.exe 4184 wmpcx1.exe 4540 wmpcx1.exe 3164 wmpcx1.exe 3284 wmpcx1.exe 3544 wmpcx1.exe 1628 wmpcx1.exe 1108 wmpcx1.exe 3252 wmpcx1.exe 5108 wmpcx1.exe 2320 wmpcx1.exe 1416 wmpcx1.exe 3012 wmpcx1.exe 3560 wmpcx1.exe 1892 wmpcx1.exe 2152 wmpcx1.exe 4512 wmpcx1.exe 1892 wmpcx1.exe 3132 wmpcx1.exe 1248 wmpcx1.exe 2480 wmpcx1.exe 2604 wmpcx1.exe 3900 wmpcx1.exe 1676 wmpcx1.exe 1896 wmpcx1.exe 4444 wmpcx1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1136 wrote to memory of 3548 1136 cb5f96fa73006ec910553fb2a3bc986d.exe 99 PID 1136 wrote to memory of 3548 1136 cb5f96fa73006ec910553fb2a3bc986d.exe 99 PID 1136 wrote to memory of 3548 1136 cb5f96fa73006ec910553fb2a3bc986d.exe 99 PID 1136 wrote to memory of 3548 1136 cb5f96fa73006ec910553fb2a3bc986d.exe 99 PID 1136 wrote to memory of 3548 1136 cb5f96fa73006ec910553fb2a3bc986d.exe 99 PID 1136 wrote to memory of 3548 1136 cb5f96fa73006ec910553fb2a3bc986d.exe 99 PID 1136 wrote to memory of 3548 1136 cb5f96fa73006ec910553fb2a3bc986d.exe 99 PID 1136 wrote to memory of 3548 1136 cb5f96fa73006ec910553fb2a3bc986d.exe 99 PID 3548 wrote to memory of 5020 3548 cb5f96fa73006ec910553fb2a3bc986d.exe 104 PID 3548 wrote to memory of 5020 3548 cb5f96fa73006ec910553fb2a3bc986d.exe 104 PID 3548 wrote to memory of 5020 3548 cb5f96fa73006ec910553fb2a3bc986d.exe 104 PID 5020 wrote to memory of 5108 5020 wmpcx1.exe 105 PID 5020 wrote to memory of 5108 5020 wmpcx1.exe 105 PID 5020 wrote to memory of 5108 5020 wmpcx1.exe 105 PID 5020 wrote to memory of 5108 5020 wmpcx1.exe 105 PID 5020 wrote to memory of 5108 5020 wmpcx1.exe 105 PID 5020 wrote to memory of 5108 5020 wmpcx1.exe 105 PID 5020 wrote to memory of 5108 5020 wmpcx1.exe 105 PID 5020 wrote to memory of 5108 5020 wmpcx1.exe 105 PID 5108 wrote to memory of 2468 5108 wmpcx1.exe 108 PID 5108 wrote to memory of 2468 5108 wmpcx1.exe 108 PID 5108 wrote to memory of 2468 5108 wmpcx1.exe 108 PID 2468 wrote to memory of 3356 2468 wmpcx1.exe 109 PID 2468 wrote to memory of 3356 2468 wmpcx1.exe 109 PID 2468 wrote to memory of 3356 2468 wmpcx1.exe 109 PID 2468 wrote to memory of 3356 2468 wmpcx1.exe 109 PID 2468 wrote to memory of 3356 2468 wmpcx1.exe 109 PID 2468 wrote to memory of 3356 2468 wmpcx1.exe 109 PID 2468 wrote to memory of 3356 2468 wmpcx1.exe 109 PID 2468 wrote to memory of 3356 2468 wmpcx1.exe 109 PID 3356 wrote to memory of 924 3356 wmpcx1.exe 111 PID 3356 wrote to memory of 924 3356 wmpcx1.exe 111 PID 3356 wrote to memory of 924 3356 wmpcx1.exe 111 PID 924 wrote to memory of 1996 924 wmpcx1.exe 112 PID 924 wrote to memory of 1996 924 wmpcx1.exe 112 PID 924 wrote to memory of 1996 924 wmpcx1.exe 112 PID 924 wrote to memory of 1996 924 wmpcx1.exe 112 PID 924 wrote to memory of 1996 924 wmpcx1.exe 112 PID 924 wrote to memory of 1996 924 wmpcx1.exe 112 PID 924 wrote to memory of 1996 924 wmpcx1.exe 112 PID 924 wrote to memory of 1996 924 wmpcx1.exe 112 PID 3516 wrote to memory of 4268 3516 wmpcx1.exe 116 PID 3516 wrote to memory of 4268 3516 wmpcx1.exe 116 PID 3516 wrote to memory of 4268 3516 wmpcx1.exe 116 PID 3516 wrote to memory of 4268 3516 wmpcx1.exe 116 PID 3516 wrote to memory of 4268 3516 wmpcx1.exe 116 PID 3516 wrote to memory of 4268 3516 wmpcx1.exe 116 PID 3516 wrote to memory of 4268 3516 wmpcx1.exe 116 PID 3516 wrote to memory of 4268 3516 wmpcx1.exe 116 PID 4268 wrote to memory of 5108 4268 wmpcx1.exe 117 PID 4268 wrote to memory of 5108 4268 wmpcx1.exe 117 PID 4268 wrote to memory of 5108 4268 wmpcx1.exe 117 PID 5108 wrote to memory of 2468 5108 wmpcx1.exe 118 PID 5108 wrote to memory of 2468 5108 wmpcx1.exe 118 PID 5108 wrote to memory of 2468 5108 wmpcx1.exe 118 PID 5108 wrote to memory of 2468 5108 wmpcx1.exe 118 PID 5108 wrote to memory of 2468 5108 wmpcx1.exe 118 PID 5108 wrote to memory of 2468 5108 wmpcx1.exe 118 PID 5108 wrote to memory of 2468 5108 wmpcx1.exe 118 PID 5108 wrote to memory of 2468 5108 wmpcx1.exe 118 PID 2468 wrote to memory of 652 2468 wmpcx1.exe 120 PID 2468 wrote to memory of 652 2468 wmpcx1.exe 120 PID 2468 wrote to memory of 652 2468 wmpcx1.exe 120 PID 652 wrote to memory of 2728 652 wmpcx1.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb5f96fa73006ec910553fb2a3bc986d.exe"C:\Users\Admin\AppData\Local\Temp\cb5f96fa73006ec910553fb2a3bc986d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\cb5f96fa73006ec910553fb2a3bc986d.exeC:\Users\Admin\AppData\Local\Temp\cb5f96fa73006ec910553fb2a3bc986d.exe2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Users\Admin\AppData\Local\Temp\CB5F96~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Users\Admin\AppData\Local\Temp\CB5F96~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
PID:1996 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1896 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4068 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3184 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4584 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2388 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3564 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2128 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:468 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4400 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3256 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4184 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3648 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4540 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:852 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3164 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3920 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3284 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3856 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3544 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1628 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:708 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1108 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3956 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3252 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3248 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5108 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3860 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2320 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3852 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1416 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe46⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1256 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3012 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe48⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3320 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3560 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe50⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3524 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1892 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe52⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3284 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2152 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe54⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:208 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4512 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe56⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4636 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1892 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe58⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1020 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3132 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe60⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2548 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1248 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe62⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4048 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2480 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe64⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3796 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe66⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1120 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe67⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3900 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe68⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:2460 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe69⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe70⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:2484 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe71⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1896 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe72⤵
- Checks computer location settings
- Maps connected drives based on registry
- Modifies registry class
PID:668 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\system32\wmpcx1.exe" C:\Windows\SysWOW64\wmpcx1.exe73⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4444 -
C:\Windows\SysWOW64\wmpcx1.exe"C:\Windows\SysWOW64\wmpcx1.exe " C:\Windows\SysWOW64\wmpcx1.exe74⤵
- Maps connected drives based on registry
PID:1528
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5cb5f96fa73006ec910553fb2a3bc986d
SHA17fe83fcbc70e9a152610e8b7ad77b4af6e7058a0
SHA256b694691dc58c664b72191f81523cf4ae3926283f3d77d363fd5d14786d069549
SHA512a3a505d1b4a3caf2f86c7465df3816c652cd2906e6ab25e976be3bcf2b385d3015ac3c29d03ba9dd38c81b9dc836e8083b8a230d1a4bc0ed97703f9d89e1865e