Analysis
-
max time kernel
295s -
max time network
296s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 22:39
Static task
static1
Behavioral task
behavioral1
Sample
9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exe
Resource
win10-20240221-en
General
-
Target
9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exe
-
Size
312KB
-
MD5
bb1bc9ff909263205ad9e956fe545042
-
SHA1
a71cf2c3a896810fcc276ed00f78c19ee6aab148
-
SHA256
9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e
-
SHA512
1bbfd82113f925dbd98d615b6940eb0f2e3fb192c66c662e8e7f1c5d2c8887c63f31f37987915b206cf22ea0d7a4dbdf14aca91f297153e74d2284843602c297
-
SSDEEP
3072:Kpv1aQz0ZhthyNy+jlx5lXJjaJva1rto9xtrjLkNt/IBeiOlFRR:KDBzBEobJ2pa5to9/DkP/sexv
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Extracted
smokeloader
pub1
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Signatures
-
Glupteba payload 11 IoCs
Processes:
resource yara_rule behavioral1/memory/1420-84-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1420-83-0x0000000002AC0000-0x00000000033AB000-memory.dmp family_glupteba behavioral1/memory/1420-389-0x0000000002AC0000-0x00000000033AB000-memory.dmp family_glupteba behavioral1/memory/1420-411-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1420-414-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1420-453-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1420-463-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/888-467-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/888-478-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2372-482-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2372-646-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
F0AA.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ F0AA.exe -
Modifies boot configuration data using bcdedit 14 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 1700 bcdedit.exe 452 bcdedit.exe 2672 bcdedit.exe 3060 bcdedit.exe 2400 bcdedit.exe 1828 bcdedit.exe 2216 bcdedit.exe 2704 bcdedit.exe 2804 bcdedit.exe 936 bcdedit.exe 2184 bcdedit.exe 1812 bcdedit.exe 1436 bcdedit.exe 1340 bcdedit.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
csrss.exedescription ioc process File created C:\Windows\system32\drivers\Winmon.sys csrss.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1752 netsh.exe -
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
F0AA.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion F0AA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion F0AA.exe -
Deletes itself 1 IoCs
Processes:
pid process 1240 -
Executes dropped EXE 22 IoCs
Processes:
6D25.exeBE81.exeDE32.exeInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exeEasyAppns.exeapril.exeEasyApp.exeapril.tmpF0AA.exeulg.0.exe288c47bbc1871b439df19ff4df68f076.execsrss.exepatch.exeinjector.exe64C1.exeulg.1.exe73B0.exeIEHCAKKJDB.exedsefix.exewindefender.exewindefender.exepid process 2688 6D25.exe 2636 BE81.exe 2940 DE32.exe 772 InstallSetup_four.exe 1420 288c47bbc1871b439df19ff4df68f076.exe 1304 EasyAppns.exe 1232 april.exe 1576 EasyApp.exe 2660 april.tmp 2480 F0AA.exe 324 ulg.0.exe 888 288c47bbc1871b439df19ff4df68f076.exe 2372 csrss.exe 2524 patch.exe 312 injector.exe 1048 64C1.exe 1032 ulg.1.exe 1808 73B0.exe 2776 IEHCAKKJDB.exe 2376 dsefix.exe 3056 windefender.exe 2140 windefender.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
F0AA.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Wine F0AA.exe -
Loads dropped DLL 47 IoCs
Processes:
regsvr32.exeBE81.exeWerFault.exeEasyAppns.exeapril.exeapril.tmpInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exepatch.execsrss.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exeulg.0.execmd.exepid process 2812 regsvr32.exe 2636 BE81.exe 1652 WerFault.exe 1652 WerFault.exe 2636 BE81.exe 2636 BE81.exe 2636 BE81.exe 2636 BE81.exe 1304 EasyAppns.exe 1304 EasyAppns.exe 1304 EasyAppns.exe 1304 EasyAppns.exe 1232 april.exe 2660 april.tmp 2660 april.tmp 2660 april.tmp 1652 WerFault.exe 772 InstallSetup_four.exe 772 InstallSetup_four.exe 772 InstallSetup_four.exe 772 InstallSetup_four.exe 888 288c47bbc1871b439df19ff4df68f076.exe 888 288c47bbc1871b439df19ff4df68f076.exe 860 2524 patch.exe 2524 patch.exe 2524 patch.exe 2524 patch.exe 2524 patch.exe 2372 csrss.exe 1240 772 InstallSetup_four.exe 772 InstallSetup_four.exe 772 InstallSetup_four.exe 772 InstallSetup_four.exe 2632 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2632 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2632 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2632 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2632 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 324 ulg.0.exe 324 ulg.0.exe 2124 cmd.exe 2524 patch.exe 2524 patch.exe 2524 patch.exe 2372 csrss.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.exeIEHCAKKJDB.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IEHCAKKJDB.exe" IEHCAKKJDB.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMon driver. 1 IoCs
Roottkits write to WinMon to hide PIDs from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMon csrss.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
73B0.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 73B0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
F0AA.exepid process 2480 F0AA.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
64C1.exedescription pid process target process PID 1048 set thread context of 2640 1048 64C1.exe BitLockerToGo.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe -
Drops file in Windows directory 6 IoCs
Processes:
csrss.exeF0AA.exe288c47bbc1871b439df19ff4df68f076.exemakecab.exedescription ioc process File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\explorgu.job F0AA.exe File opened for modification C:\Windows\rss 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\rss\csrss.exe 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\Logs\CBS\CbsPersist_20240321224107.cab makecab.exe File created C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1996 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1652 2940 WerFault.exe DE32.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exe6D25.exeulg.1.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6D25.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6D25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ulg.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6D25.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ulg.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ulg.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
ulg.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ulg.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ulg.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2744 schtasks.exe 1564 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
windefender.exe288c47bbc1871b439df19ff4df68f076.exenetsh.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-492 = "India Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-741 = "New Zealand Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-661 = "Cen. Australia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-201 = "US Mountain Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-551 = "North Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-582 = "North Asia East Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-581 = "North Asia East Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1042 = "Ulaanbaatar Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-151 = "Central America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-351 = "FLE Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-212 = "Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-162 = "Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-571 = "China Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-371 = "Jerusalem Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-331 = "E. Europe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-42 = "E. South America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-372 = "Jerusalem Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1471 = "Magadan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" windefender.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" windefender.exe -
Processes:
csrss.exepatch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 1400000001000000140000004e2254201895e6e36ee60ffafab912ed06178f39030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a40f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a32000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exepid process 1756 9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exe 1756 9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exe 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 480 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exe6D25.exepid process 1756 9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exe 2688 6D25.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.execsrss.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exeIEHCAKKJDB.exesc.exedescription pid process Token: SeShutdownPrivilege 1240 Token: SeShutdownPrivilege 1240 Token: SeShutdownPrivilege 1240 Token: SeDebugPrivilege 1420 288c47bbc1871b439df19ff4df68f076.exe Token: SeImpersonatePrivilege 1420 288c47bbc1871b439df19ff4df68f076.exe Token: SeSystemEnvironmentPrivilege 2372 csrss.exe Token: SeShutdownPrivilege 1240 Token: SeShutdownPrivilege 1240 Token: SeShutdownPrivilege 1240 Token: SeDebugPrivilege 2632 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeShutdownPrivilege 1240 Token: SeDebugPrivilege 2776 IEHCAKKJDB.exe Token: SeSecurityPrivilege 1996 sc.exe Token: SeSecurityPrivilege 1996 sc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
F0AA.exeulg.1.exepid process 2480 F0AA.exe 1032 ulg.1.exe 1032 ulg.1.exe 1032 ulg.1.exe 1032 ulg.1.exe 1032 ulg.1.exe 1032 ulg.1.exe 1032 ulg.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
ulg.1.exepid process 1032 ulg.1.exe 1032 ulg.1.exe 1032 ulg.1.exe 1032 ulg.1.exe 1032 ulg.1.exe 1032 ulg.1.exe 1032 ulg.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exeBE81.exeDE32.exeEasyAppns.exeapril.exedescription pid process target process PID 1240 wrote to memory of 2688 1240 6D25.exe PID 1240 wrote to memory of 2688 1240 6D25.exe PID 1240 wrote to memory of 2688 1240 6D25.exe PID 1240 wrote to memory of 2688 1240 6D25.exe PID 1240 wrote to memory of 2820 1240 regsvr32.exe PID 1240 wrote to memory of 2820 1240 regsvr32.exe PID 1240 wrote to memory of 2820 1240 regsvr32.exe PID 1240 wrote to memory of 2820 1240 regsvr32.exe PID 1240 wrote to memory of 2820 1240 regsvr32.exe PID 2820 wrote to memory of 2812 2820 regsvr32.exe regsvr32.exe PID 2820 wrote to memory of 2812 2820 regsvr32.exe regsvr32.exe PID 2820 wrote to memory of 2812 2820 regsvr32.exe regsvr32.exe PID 2820 wrote to memory of 2812 2820 regsvr32.exe regsvr32.exe PID 2820 wrote to memory of 2812 2820 regsvr32.exe regsvr32.exe PID 2820 wrote to memory of 2812 2820 regsvr32.exe regsvr32.exe PID 2820 wrote to memory of 2812 2820 regsvr32.exe regsvr32.exe PID 1240 wrote to memory of 2636 1240 BE81.exe PID 1240 wrote to memory of 2636 1240 BE81.exe PID 1240 wrote to memory of 2636 1240 BE81.exe PID 1240 wrote to memory of 2636 1240 BE81.exe PID 1240 wrote to memory of 2940 1240 DE32.exe PID 1240 wrote to memory of 2940 1240 DE32.exe PID 1240 wrote to memory of 2940 1240 DE32.exe PID 1240 wrote to memory of 2940 1240 DE32.exe PID 2636 wrote to memory of 772 2636 BE81.exe InstallSetup_four.exe PID 2636 wrote to memory of 772 2636 BE81.exe InstallSetup_four.exe PID 2636 wrote to memory of 772 2636 BE81.exe InstallSetup_four.exe PID 2636 wrote to memory of 772 2636 BE81.exe InstallSetup_four.exe PID 2636 wrote to memory of 772 2636 BE81.exe InstallSetup_four.exe PID 2636 wrote to memory of 772 2636 BE81.exe InstallSetup_four.exe PID 2636 wrote to memory of 772 2636 BE81.exe InstallSetup_four.exe PID 2940 wrote to memory of 1652 2940 DE32.exe WerFault.exe PID 2940 wrote to memory of 1652 2940 DE32.exe WerFault.exe PID 2940 wrote to memory of 1652 2940 DE32.exe WerFault.exe PID 2940 wrote to memory of 1652 2940 DE32.exe WerFault.exe PID 2636 wrote to memory of 1420 2636 BE81.exe 288c47bbc1871b439df19ff4df68f076.exe PID 2636 wrote to memory of 1420 2636 BE81.exe 288c47bbc1871b439df19ff4df68f076.exe PID 2636 wrote to memory of 1420 2636 BE81.exe 288c47bbc1871b439df19ff4df68f076.exe PID 2636 wrote to memory of 1420 2636 BE81.exe 288c47bbc1871b439df19ff4df68f076.exe PID 2636 wrote to memory of 1304 2636 BE81.exe EasyAppns.exe PID 2636 wrote to memory of 1304 2636 BE81.exe EasyAppns.exe PID 2636 wrote to memory of 1304 2636 BE81.exe EasyAppns.exe PID 2636 wrote to memory of 1304 2636 BE81.exe EasyAppns.exe PID 2636 wrote to memory of 1232 2636 BE81.exe april.exe PID 2636 wrote to memory of 1232 2636 BE81.exe april.exe PID 2636 wrote to memory of 1232 2636 BE81.exe april.exe PID 2636 wrote to memory of 1232 2636 BE81.exe april.exe PID 2636 wrote to memory of 1232 2636 BE81.exe april.exe PID 2636 wrote to memory of 1232 2636 BE81.exe april.exe PID 2636 wrote to memory of 1232 2636 BE81.exe april.exe PID 1304 wrote to memory of 1576 1304 EasyAppns.exe EasyApp.exe PID 1304 wrote to memory of 1576 1304 EasyAppns.exe EasyApp.exe PID 1304 wrote to memory of 1576 1304 EasyAppns.exe EasyApp.exe PID 1304 wrote to memory of 1576 1304 EasyAppns.exe EasyApp.exe PID 1232 wrote to memory of 2660 1232 april.exe april.tmp PID 1232 wrote to memory of 2660 1232 april.exe april.tmp PID 1232 wrote to memory of 2660 1232 april.exe april.tmp PID 1232 wrote to memory of 2660 1232 april.exe april.tmp PID 1232 wrote to memory of 2660 1232 april.exe april.tmp PID 1232 wrote to memory of 2660 1232 april.exe april.tmp PID 1232 wrote to memory of 2660 1232 april.exe april.tmp PID 1240 wrote to memory of 2480 1240 F0AA.exe PID 1240 wrote to memory of 2480 1240 F0AA.exe PID 1240 wrote to memory of 2480 1240 F0AA.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exe"C:\Users\Admin\AppData\Local\Temp\9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1756
-
C:\Users\Admin\AppData\Local\Temp\6D25.exeC:\Users\Admin\AppData\Local\Temp\6D25.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2688
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\8C59.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\8C59.dll2⤵
- Loads dropped DLL
PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\BE81.exeC:\Users\Admin\AppData\Local\Temp\BE81.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:772 -
C:\Users\Admin\AppData\Local\Temp\ulg.0.exe"C:\Users\Admin\AppData\Local\Temp\ulg.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:324 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\IEHCAKKJDB.exe"4⤵
- Loads dropped DLL
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\IEHCAKKJDB.exe"C:\Users\Admin\AppData\Local\Temp\IEHCAKKJDB.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\IEHCAKKJDB.exe6⤵PID:3004
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:2480
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ulg.1.exe"C:\Users\Admin\AppData\Local\Temp\ulg.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD14⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:888 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:1700
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:1752
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Manipulates WinMon driver.
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2372 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:2744
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:2524 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER6⤵
- Modifies boot configuration data using bcdedit
PID:1700
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:6⤵
- Modifies boot configuration data using bcdedit
PID:452
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:6⤵
- Modifies boot configuration data using bcdedit
PID:2672
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows6⤵
- Modifies boot configuration data using bcdedit
PID:3060
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe6⤵
- Modifies boot configuration data using bcdedit
PID:2400
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe6⤵
- Modifies boot configuration data using bcdedit
PID:1828
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 06⤵
- Modifies boot configuration data using bcdedit
PID:2216
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn6⤵
- Modifies boot configuration data using bcdedit
PID:2704
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 16⤵
- Modifies boot configuration data using bcdedit
PID:2804
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}6⤵
- Modifies boot configuration data using bcdedit
PID:936
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast6⤵
- Modifies boot configuration data using bcdedit
PID:2184
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 06⤵
- Modifies boot configuration data using bcdedit
PID:1812
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}6⤵
- Modifies boot configuration data using bcdedit
PID:1436
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:312
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v5⤵
- Modifies boot configuration data using bcdedit
PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe5⤵
- Executes dropped EXE
PID:2376
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:1564
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:3056 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:1532
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Public\Music\EasyApp.exe"C:\Users\Public\Music\EasyApp.exe"3⤵
- Executes dropped EXE
PID:1576
-
-
-
C:\Users\Admin\AppData\Local\Temp\april.exe"C:\Users\Admin\AppData\Local\Temp\april.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\is-1CQQ8.tmp\april.tmp"C:\Users\Admin\AppData\Local\Temp\is-1CQQ8.tmp\april.tmp" /SL5="$3017C,1485356,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2660
-
-
-
C:\Users\Admin\AppData\Local\Temp\DE32.exeC:\Users\Admin\AppData\Local\Temp\DE32.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 1242⤵
- Loads dropped DLL
- Program crash
PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\F0AA.exeC:\Users\Admin\AppData\Local\Temp\F0AA.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:2480
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240321224107.log C:\Windows\Logs\CBS\CbsPersist_20240321224107.cab1⤵
- Drops file in Windows directory
PID:2228
-
C:\Users\Admin\AppData\Local\Temp\64C1.exeC:\Users\Admin\AppData\Local\Temp\64C1.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1048 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\73B0.exeC:\Users\Admin\AppData\Local\Temp\73B0.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:1808
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2140
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\Local\Microsoft\ApplicationInsights\252e99e709753c2ab04b66e213ab7d72cfdb494a7016e07d23bc17fe7cebab94\796e31c054424b2dbc7e12f02cd1391d.trn
Filesize1KB
MD5033b303d89f7ef6596a1b9eff0c9d989
SHA1f01b0d1fdcadb8b3003e8d925b1a7c5e70efc456
SHA2564d20a099b5090b515a601cb0240e1a38e96d71a634855ac02217a893942dfa9f
SHA512ba5d107fec071cbd14b9f99b18f17ce376ce10122ecdb872eef7000f3494b776aca39137129f8c61284fd4da179fc1f6f9484f17db9fc288eb09c31756c4f7f0
-
Filesize
2.4MB
MD5606439b2a114682a2ee6ebad826fd9af
SHA1708e3410cc3402d250276ed12cd4351bb4cd7052
SHA25631ad4287234e99358c23f6c5b52b5e67c343296a072442bcc8e8d2c81d1229a0
SHA5129cf9d925ed55768baad5f4a6311c5f65e92cef0a43c5cc6e57b9b62cd894c3ed6e28c4312e8ffa0eefca1f610c22f5f5162ed4bdb5a3b15000ff42d69abc4cf1
-
Filesize
2.4MB
MD5298b3ee302804eaef72fbbea9f102e36
SHA1be45024b6f18fad16701ea636d9cb76b3dfe1eab
SHA2560a683c98154533d5961cd235f177b745381aed501534c7f31d88e0353f4baefb
SHA5126fd3bc65ba2c816a0227dde125ce73b12e75074a7f968adff7e8b67e52056d6a6ab99d438fb1e4dbb09d48983ba5b29594273c269defc6190eac96dcc2687459
-
Filesize
2.4MB
MD519fb670fade2a638e935379bf53273d5
SHA139bd030733f01a3f596c9ff3e56f1c56fcb14d66
SHA256fca0d61f13c2d545d8faffc2a5907531878daa429d18dd9c808dfc99256a1dcf
SHA512442811d2e1f25c5aea2aec3bf856538d90e292b64c8c016cc55176d50a677741c6941d20e95079bdebc1c6d5a4a3cee7c8e8c8e6f92051ecad6981917f591dc6
-
Filesize
1.7MB
MD559fc67de49d9d17b27a1a089065ebc3c
SHA16c500917f15ce2babc712360eb1a1fada54cc2f8
SHA2569139a0a0824389e9fd94d647bc06c2f99ce3da5cf5ace35f6de4083e6c9e2de4
SHA5129d3ca4191ba562c454501e230a3ee4679a4b4c8a83d9c3700c3f6d20197aa1aa13122a50579d24b5a446698f21a658753ff7871d339d6ca1923b9090915b5d98
-
Filesize
7.9MB
MD54f1a92dac9e5310834054874204e4a36
SHA12e4513fdeb06f643f7d3e21bb809f9d71ae928e9
SHA25628be5b5b665acb16b567ce009a198a733808a384ca84effbc0c04b1e69cbd4be
SHA51224fb49e8ee232d623f336b669b016aaab13f16b5d222305376ebb0de536cd27cf5ce3aa1854763510a44d5662874575ce644bf6195e5b6a4b577bb0d202d86be
-
Filesize
7.3MB
MD51374644f44fc990cd264d1b884a4e301
SHA15150bd8679e3d25f54273503bb587bc5f89efcc2
SHA256338dc9d8780256d3e94ec8472c18a05a05d645f9dbc6d5bd446efef9fe9a5c7e
SHA512e5e72a61e543b0248a467c3fb46da2cfc72d988746d5e21a150c4e9a3ef55d6f96d075bdc05e2172a664c749a057cf02eaa1ef3227a10da97568b285dfb2a66b
-
Filesize
232KB
MD5c8eac1d34e880b19859663677cf6f469
SHA14a20b4a61b2172f675e5047b2ce82cc1cc9e7150
SHA25647a23c0c61f2de27199085bde6f0d2f9b891e890d0e0ca9f7b37505ae7a0d69a
SHA512bb42f71f910dab8dfe9f5c769a078bc48bc4d93fb301ee820bdbe37dea1916ac7828671a8f5b356697f154a6e6174da9fdc8c248d1149088e2763a1ff3d7acd2
-
Filesize
1.1MB
MD5679e0c9d77c16f8529e6a08486c3a9c1
SHA18e74ee4ac19b5653981a1d8378aeda9e6fc1b009
SHA256585e21bcd0f3c05c51f4aa74f554e0a648370facb8b90134680c2e49b5fc272e
SHA51254195de01cdbf53812f172931d66ff8ee510f78ac972737c71a57fbae1a3b8b7a295347bba81ff38fa0ab934eb4cb60c90e267acdd512ec1b9e90831db454acc
-
Filesize
2.2MB
MD5e69125300a060d1eb870d352de33e4c3
SHA160f2c2e6f2a4289a05b5c6212cdaf0d02dad82ea
SHA256009de0571eb77c7ed594b9e5cda731e2953fd2198e00b25a0e2c4c4ef7414355
SHA512257d3b61b2c85c1e71d2a80a5fbf44436e9734785fe6b0a643c1939dd01c1d8b98f1c454695296f7137ff035ec6c0118f053e4833e0be91618f2a9066a8cace9
-
Filesize
6.6MB
MD50e751e03ec878c760a49bc9df89acdee
SHA12cc3555641605842d4e24d8508924f6971a5aeff
SHA256424a9987fef64b33bdad3e5c89cf0b920842e4e2164d4daa6f3ee986c584a725
SHA512919fff25cdd730e6279a4fd1f15e83587719fb52c5c48b1c4dd9fc5ce1b3bbf1410faa6c18380a37809e0ba1e52837377d5844339bb960e13b322a605a70a05c
-
Filesize
5.9MB
MD5dc4c29e7f65f9638f4ee67ab9618fca0
SHA10a8a2967e5614efd0de914b9df93588f8c3b2433
SHA256e9fe6aa72f98e06a5bb57647b0b0b21c3fde70c0cec683c3e0fb190f46ebdc58
SHA512566fbd2d2d80b77f3bb00f2261957032cd24324bcacd55895131bfc5a914e0886957a0f6da497172b7629ed84fee0d6c9a5d6bf407ea1f60837aef1933be0b70
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1.6MB
MD547b3f9c4b734474f9d1c3ccde8752283
SHA1fca72214fb93fe6456be39e6c03509dc8e36595d
SHA256303201631ae5d8522e4bfae12fab5a600b77c629728bb378986a2eae65bb682e
SHA51272c5c5941bd8429591868e108baaacf2d8d39e3723f04d437c338da0ff8d0ff1737a67ed5bd5c599c9869f2d080783d9785853d90c0cce5b17dec628ce036954
-
Filesize
740KB
MD5a1f56814759731d28114fab09cec7f81
SHA1d3850aa3c61516481e889a6b53f0a3f82c315dcf
SHA256d0280aa15e9e2fdf99a0fd528f635840ffc2ea6669a72fc74b4b863ce2b0b1b7
SHA51294f164bb1115e13d1444eda9d835ad659b3e9f812c21992f9b374e34dd3033d8ec73621c7ac810fa7f6aa4e6bd4b73275dab29a35032333f102db9365e586f08
-
Filesize
471KB
MD50543ed793ad5c930d456bf4ba1a0d410
SHA164a2b8bd0d9d5057a5e552e64ff21f4febd37275
SHA25632480ce4f43b94bda3d67b8d2472138815cf35d0b322a1d1b87f2ca8820b1984
SHA51254cf632b3ffb4b022d0d38ebe47b24a4b864a3c7db5bd88657049340765a1a7fe49fbc886c732a195ec20569a26a5c4be9b6b399b1bfb0e964485bb9dadf4742
-
Filesize
1KB
MD5adb5649f7ffbe6fe19b07ce0d94a9be6
SHA149ab606d1c41866063296d479d2c893d38107a63
SHA256bafdf72a9877472549c16a5ec499c8e95930330f854ac97ecfcde44627456910
SHA512221266bef75eeb8999045075bd6d77bcc41c04887c393c713b19dcde9a6a994b7cfdbaff0b77faa609c72451c42f5f8034166fa9144416f2015e32714f1693ca
-
Filesize
1.6MB
MD509c8d7e1bae2daad0f3dcd12348c480c
SHA1d3bfc1945d1a697fcb25d5ce30199e36b889fe39
SHA25637c0434342b61e1fcee260764dac07743cc984a71c40d3c6a7e0d09270c1682d
SHA512d82da549040da485f4efe81d27a1fc2f6c9a471b1f48fc2a2b31f9651c7c42fd7efd82e04dad1b42421a15e12cc35b60668a4a44116e3e7560e1e25837668a95
-
Filesize
826KB
MD58f2f15870f97fd6eba3c3031e559e3aa
SHA10c3c29d6d21a9cee274a9b328b1fd0c4d13c227d
SHA25693e5a12faaa8508df38c295a880ce12be7fd5314982a763f742697cf8d09c858
SHA5123dd293e0ac04f1f454cd586c3c13aa1c091202b19f174d9faaf82f0e881d2cbafe38489ea0515a3dd97954feb485c8ff418ce31231edf643a45090a5a479a2c4
-
Filesize
404KB
MD5383c48c7f64a6867db5b8577fa3abfbf
SHA1926911f9581df56f5ac38fac01f6d45acdfb7dbd
SHA2569b37a304f33bda4707c0dae60a20ac7c76c75752b0d06ad9fb2d6f07f8edd1b9
SHA51253b5d42ed93ad6f1163ed00be8cd1b66d367fadf25853c16d8c6fb710f69d9e8a32cb85d0dbf36d95c85da16b214de2a564bc0750c264bb0547dd8910a6f4442
-
C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
Filesize8.3MB
MD5fd2727132edd0b59fa33733daa11d9ef
SHA163e36198d90c4c2b9b09dd6786b82aba5f03d29a
SHA2563a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e
SHA5123e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e
-
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
Filesize492KB
MD5fafbf2197151d5ce947872a4b0bcbe16
SHA1a86eaa2dd9fc6d36fcfb41df7ead8d1166aea020
SHA256feb122b7916a1e62a7a6ae8d25ea48a2efc86f6e6384f5526e18ffbfc5f5ff71
SHA512acbd49a111704d001a4ae44d1a071d566452f92311c5c0099d57548eddc9b3393224792c602022df5c3dd19b0a1fb4eff965bf038c8783ae109336699f9d13f6
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
403KB
MD50c9b17916eb004a2ba52978a5b1add1e
SHA14bd8e23f5d88f1671536b0c639112f69ff692b35
SHA2564af2016d77a4bf7a2720fe6cc7ff4bed6545535fd6eaa5a8c8a4bc1554fe8913
SHA512578411cccd210819d548a2990f00515f36cffa012189febc844fe16644af163bf9df9e609b134a80a1cc967adc67425a39aea1d47e0cff6e23eb615fc4e7eed1
-
Filesize
427KB
MD5a110bfeb12e55738ab72500a257578ff
SHA1c8a09e6389ee31b84285125ac90fa596f2fc6907
SHA256f62f04af665e1e11b3e39af39f5eeeab87588f34c15a087a5041568bb4a2dd0c
SHA5120256615d68bd9982e86172d92036e05cd19bbc65dda8ed5370d18f81771c230e4bc2122f5a45012de1da9cccc47e4f92d30f93d7c9dff31bfd02cecb359173c3
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
837KB
MD5923c96b075f58c3bef855a4c84dc0acd
SHA1bef0c99be4f9e76ea4c6aff6df0c9dfc0b1fc2ef
SHA256f4aa4a3d2dea33f1672040c2554e9efdfd45c16e6f6a5b0120b55a9068fe681e
SHA512812ee87ca81381cbfbe6ddf76a4eddd38e8e36e13818eab5119bfca19fd2e331855a5a9186b8a4a7ea45aec7beb15847bc46db6238b706b7d2a13d63e55235fe
-
Filesize
24KB
MD5e91a24f5441c7ac3b2e3f8d5663ea247
SHA13ac78ef7269b43724fb4b7ef7236652b00422f89
SHA256a2487342e9413340d94c98709614e7c6fa81cce77c28c803e2e5f4a2d75ca927
SHA51276e202364de05c1d4c47b029f64668aeace3ec213f421e9a7e85d5700117990ce865f55da12b751a3aa0727bada9ab4f1f06ad78e10568b5a0d2ca50d767b37c
-
Filesize
677KB
MD58519bfba2d14dbdca979e73c62ed4b46
SHA1388030278d4f7e4d88754adc3ff95df54e01eda9
SHA2566848c671e27c33dd065e1d70c9be0a4205ad69ec9b4b4b356d03eb8dc73ddeb5
SHA512a1bfd50e48a82f7b100de76674a082eb77ac385b7ccc5ba574f45b97e2e4a992541a992b979b266b9e6bd27eddec02f943b776ed0210d5b788954e15463921aa
-
Filesize
665KB
MD570845032b114a25bf8659985d2082a61
SHA1abbcdad4a838b22699db75efd8e9b3b474762ad7
SHA2564ebff0b9d421ba0cb2c369f33d5fd8c905eed4eca50ccba62aaba51bd3101ecd
SHA512168ffe43cba4054d03b955a230bc9384cb352e17f1560e031a30a3951f62dc7ad59033d5020ad0c274d278b185c1d6a05eb6e04ef08fe3e132de1f3a867b9bb9
-
Filesize
591KB
MD5e2f68dc7fbd6e0bf031ca3809a739346
SHA19c35494898e65c8a62887f28e04c0359ab6f63f5
SHA256b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4
SHA51226256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579
-
Filesize
243KB
MD5329950142aa05e945bbbc65456a6d8f9
SHA12c01bbe93aae8a817330e1c818969bdd5e61b4d6
SHA256962d9d4c8b78b15d372c09d6511faabc7d3809f2d9a3df9233c16f57234d0d3c
SHA512b4a547aa20287f2a08190bb06f6defc111d8f543db715be561c463bd9518e40df90fbd38f3ab29b64c9f2b87898df2af883663feff214a74db9352e723deb1be
-
Filesize
256KB
MD5493c410fda4990c2a7f0981783be9cd6
SHA1d17941c6b29a6ad513d42256f1f6f8eae8990d44
SHA256c15a271138eb64555214b4ff562f986bc487d44332f78df62662eacde02e4db8
SHA5127b34bf83fde741c1e1fef0bd0668596171bedf4c8eb235eab39a1d3d70f262d31fcce42e8b92cb11e49d5aefecf0f7da9e33f40a582f1020319478731996eb60
-
Filesize
713KB
MD5c9af7db010c1a41af42664cfa09c2bee
SHA17a4035508f393ddce55d317a51fda4a5642771c6
SHA2568843a714f78d1265be65eafab1e8be0a8310fe4cd1af29892100762fdda0cf4e
SHA512e8e288cff81fff5955d114bd972e846bc2357fc168438478a41e866c7abfee08ccaa82f205abeff0af20099618aa96076bb519676f6b8c164b907e6ca7fd8180
-
Filesize
488KB
MD5d2e83a3df7ca435c95efb309aba69b9c
SHA1edc014e3e95a62e60c21421481c2994f8fe5d358
SHA2563c125415725cbedc1698cb22f9681c8cf1139118e7d06eb1870ef4c60ceb6ffc
SHA5129e3ee83b6fad52174dd3c5868aab7c96aef1ae7321c89a5e4face92663d7fb9c464651aadb554ac2f3b6bcbe90d222b004a60c3313b3e2c84a700966fc80e324
-
Filesize
217KB
MD5c12d62faa10ff9c887a971ec52416ae0
SHA1899de11aedf7a849aa5f2871a09ec8c14a1cc206
SHA256beec1c56401870337c44aaca4d83ef5f358ca9be65ea663878dc8dbbcfb755e9
SHA512d2caa696101f5c78e6ec5fdc88825127b8e3112d0dfcb44cfc7ef949a4656a02370b03a2cf042852eafcf057ae8f872704229b2ff0231c89f7cf83cd66f60e0e
-
Filesize
140KB
MD5d3242f47d85f154c3bc5ef9873c06a79
SHA18b0b1b43c8d616e4a92aafcbcdce04710ba32090
SHA2566ad7a88c1bd305852b31853055f5ae87943cc05a4113313ab89cbb679a620350
SHA5122a23b8f1ac5e29d084a89c9f232f75d3017df251a363e9300aa855f5a26d149aa039cdd9ca05ca358e391672079af657a2cd5b535ca8f98c1b7c2a63b54c507f
-
Filesize
574KB
MD5bcab58f601fec426ab95fa9a0c672f13
SHA1abaccfd69c820b3cfba760fea8cb5237d511c631
SHA256c8b63683dfb11fa5f9999b37af4f9ca45ffbce1c330d1ab727ced4ac8f27fb80
SHA51242da0d50196566e4074e0335f6732387de152ed37d17c1b4b23fbe1d056832b02e3a69ccae54aa5299f9786f92316f2243ce1c4d5c1aab0d1583adb4ad4d4b90
-
Filesize
142KB
MD59edbd5f62808f4aa9e6c639b57925733
SHA18e27e8785c1aadfc8995c39d304804cf562b612b
SHA25601088f74063949fc4450ee5461bb00c8a6181c3025bb6384d0351f2f7179548c
SHA5122566f25168a0e2671e0b52a449d190e0e41372288961b5dd9bca20d4231d3f2d0b92e806e57e86d6d35ba109f633a3845ef1ebaf87d9a726705e052af51c3c4c
-
Filesize
1.7MB
MD57239ead58031ed82ad01dfaffa7d6514
SHA14b0374341c3a08b37d24e96fc7e2bae0b3f15b61
SHA256cc0e7a732dd7617ea4bcc9401258d63c970607dc85d82dc8831d005ab319150d
SHA512b8faa738e050af8d4a68b826c648eac9a15cc8862e670d052a56171b0545435e5247f05abd9d950de1505e0692bf3f90b422735f578555c8bc4fa1c2583fed21
-
Filesize
2.5MB
MD5b9bf2bb1780f4b60cae4e11e1530be19
SHA10e93c6a91d95b40b69640463303a5df4a1782fd7
SHA256d935ace32a727333620096bc2a0af9ada437a8a276b490b574cdaf3c6d17d262
SHA5124a7327f03652ec1d7d92fce7d784496faa1b1d026f66aea221bf32a8718603f0f49a96b374ed1c75e244b620c88ac19f7839da23b861777a1870be043ac539ac
-
Filesize
6.5MB
MD592d4bc10a6d5d2a6773d866053c83f6f
SHA1cbe7e7d2f1f843684c84c78aaca33212568b258b
SHA256074ca91ecf07196fdd4f14fb3d13822d3b8e607e6b2e0657ac9474eedaa8c76f
SHA512961f1efadbd0983e976b1b9a99db96cface45bd20a691e75bce6ddef9018ddbff403e6ec18b014d86be3661bae6f79eef9748d53c9f15f165273044cf1858f36
-
Filesize
19KB
MD5ced482b6a03fdbf685046246bd70c41f
SHA12d3e032f327e493a1b02ff1f7a29fdea67681ba2
SHA2568507d60a2ce040935066b7de83e843c643e5ca1081a0f8fa854a05f9bbc5af06
SHA512ed324ba53c6cddea820efe468bbd0efbf0d3c162933bbabe4d50b7a1d986eec5b31ec7acfd36faa48fa417d97482dfc29ad3f8202769eb6691ed219c41e17a7c
-
Filesize
1.8MB
MD5d30435b88b51797ed1dd02688fa4a530
SHA14cf8482c9ecfd89ba213e2faf07fe5beb930aecc
SHA2568d7d5d9dd66ed6baf18022bcf034aaef62d862305461c3278856c49e327100b7
SHA51200e97084ef7d625e98c44c1cb0766a57f41a1206c5e3ded56b3cbefba0fd631d67bb04f7384c7be7d3df79f0cd06c4044485264f63c13ac6634c06bb86803c57
-
Filesize
1.7MB
MD5d1970a9799c8bbf6d43ed07e0da4a599
SHA1c2302d74d13f029504dfe5ae9d540fd4676e4c23
SHA2563c7ae8aac898b9382c4bd0e9a36f419ee9b84919e5bfc66fcc8f2d8b01ffbb1d
SHA512b95a7f1cc8201acfabe821a9ce5a4f3582dc62757a9dc3b327ccb8f37d0eccc796d3105ac690c41e2a6ab3830daceac8e47d81b84d144e740d89004562c7e08b
-
Filesize
756KB
MD57cc0bbd1c60d2c71abeab8c12ff475ea
SHA1577c4eda54745d0a688cb0fa8d0e0aa9851231a0
SHA256995253528f963102ed63ed810a68dcb8fae1c0812f16ad9e3a6f24a4e03182e7
SHA512a35d31087b208418beab1bfa9026930797f3eacf0bf65a80efd84ca318bf15c96e20928480da95c7ee0f8c6c27ab6a37b5ddc8a529362697a205027a31d2b8be
-
Filesize
128KB
MD52a520b3a5e943ddc1342c06028f2ba7c
SHA132b9858ad22e3860d249aac82e193a8d9dd4d1b5
SHA25694d5a924d3e3b515b78ffca804ebcc32e720fbafa90b185c51935b51b3ee7dad
SHA512f33491c7e3d5d323cc1423fcffba81bdbde0a5a84c97a670093dc1cbd93a59ec7cd7047f2fbebf72fa22e78beee1c97eeefe2cbb0b1e9f34684751af8dd1f64d
-
Filesize
726KB
MD54956c49e5fcb16666bf2a8b3a45940bb
SHA1b6b097c05ea572bab6188695ab9b6230167a5341
SHA256f1261281d52ef678924d51a631dd5d4c57b395310fff3ca1f35a262006e8f85a
SHA51262db69e738f6b641fe01f4fe05e322cff05161d33688a921c88b7f2e6f3aec8639d322768f1cc73ac3c889b40d5fb75e74d7cd890e20f2551875bcfb69d37ebc
-
Filesize
1.4MB
MD5fd63eacbced987c3b2e717988f1e5aff
SHA1fb6022038d518e2f1acced7642e8096756c562ea
SHA256fa7ca3c681d35975e823a1baca8b7bb21f32071ce424a0ebafd61cfd99193ab2
SHA5125d27630117dfc3a29ce8232bacda59f1f0473aa15a41f5b2766b6565588460a7a55aadef43810e22d35654c4367231993d421e979ba62fc7cc5b5dd3dc260a5b
-
Filesize
1.2MB
MD53946d9b608c82f0d233604b27731035e
SHA10b6b9e23c53f1b5888c39d82bcf2b4a40ae808b8
SHA256a8d8e0cc929e4714995bbf065ad8861faa64d49de75e068862afd51f70807e73
SHA51221155c4553b987d18dd6c530eb3d9b5a7dd8fa83ed635e26c0157fc402dcb635d6ec9f77fedfa438bf9fdba2e682ec487ee6b174974ac81b91ba21323d75258f
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
818KB
MD5c07f778d0be1232bf23ad148e2804163
SHA1b0c8a9497a087bb758808b6c80b255f6762c32cb
SHA256b037b31cd83ed56e6fe8d264350454ce52a802972d1d1134bfde35141e47b30b
SHA512e180542f9e77f5f5b8273ffbb6be11f00bc482b50a1ffaa4aded44cf9ec17ae869c2ae67974bf647e4e6c4b8d23bf4a1ef3ce5b4a035d6fd57772fa06f083c09
-
Filesize
816KB
MD54793234c5145ec70b71f62d396c025b8
SHA1b6f649c611b2787bb7bb86bac791a48883494fae
SHA25651b82953706c963fe30bd643dd4b9674e455f4f4d3d7758c28e1f68b9a57e9cb
SHA51241650878dcfdca60480a49a29ab2aebeed1db9cef55e55ac254b04f130fdc16c6d2a9c156e989b786eaa8b4340860a9f0815a4c5e9194db8efda1d609ba43532
-
Filesize
1.0MB
MD545fc7e2e73a8c386b1f28917197e6b52
SHA177fa0c35ee81e8cafb0f9b6b7684fbb16ce29397
SHA256188400d86bad517e14dfee9b87a954b26b90d6bf9794182b8829c2b4adc7bfa7
SHA512797f61c450c237923bbaabbc270fec140d73fc8b2b5df042f864145d9f63ddcf95aa96af728e08c95fff337a8d3d34433ca83e350f21ef42bf9b50bcd8919d02
-
Filesize
163KB
MD55c399d34d8dc01741269ff1f1aca7554
SHA1e0ceed500d3cef5558f3f55d33ba9c3a709e8f55
SHA256e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f
SHA5128ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d
-
Filesize
228KB
MD5f2d8c01785c084af3b8679925a2ef857
SHA1469e444108f646c36a6a03e20a2ea80c131570ab
SHA256da4f9409493521f39c4813ca868ecd3976ace1d0fa4f9706e32639adc7b14478
SHA512900e1d166d603fa661aa7f25b582ec6e28ea0bc56ebece7a97ebb14823827242753882692dc104350b08ff2d159d128892a894ffec1e13c2ab769e185173a14f
-
Filesize
261KB
MD5606625739201aa74813d211613b2aa82
SHA14409efa953358e31d940d698470bd0e2d952e8a7
SHA256848e37628e8301c0845cab2eab491e49995db81fec86dec3841af2fc6ee584e2
SHA512d6c1dff70bec93e54a1fa4dc420a2e1ca78955d9b5e1f25324732cb55dbe79642a949d5ffe7218d3b9e6534287f9924286d0eaa765cfd73b5f52f84924ef99f1
-
Filesize
1.4MB
MD55ac226b79dbc538d948a422b0da803c2
SHA1ad981113bf43ee0b347f3a0e881496cec0816173
SHA256615bff877e3efdff24f95f948a536a1f72bee2ad4043e31e1d58cf67f41e0d3e
SHA51244e46d1a59f18a87b220c7ef1dfcfeb19a8eefb046e64affd6f16e74e733a76075a5f091152656b72cb3f14b25a03d8aa512b44c3e7ddd0d862bab210930de36
-
Filesize
385KB
MD5cd09fedc88ad74aa2bacd1365e45fa66
SHA136d9c9f3d12946b1fe0ad56acdf3633173a35f3e
SHA25615d03ec2c27d13e086ce1b1e6bb6779a2321709d81837e88f99664cc7ba869eb
SHA5126ae2b8e49cc40de1bd432627c3a04f6a7deef3c5fbc5fbfcc9d01298bb140a0c81d70de23718dbe2dbd9d0e7eae88430c347f3a3683d7370d082cc0e4e7b5a91
-
Filesize
672KB
MD56fb1805a9418fb1739568cd6128a758d
SHA17e22d12bad6e2390294b76f0d9b9d4be99cd01d0
SHA256e121f350d458d5562d1a7f19f67533661aca650523ab23b3a0f00f6eb66194c7
SHA5120fa4e259d299fadd6691f1df593db157a46e1b139749d97deb04d45874d11da932c83268641e6af5bfcf551a1a8af2895a473c13a96e9c006815b898d870f93a
-
Filesize
550KB
MD50c487f61bb26461b571f728b2ea9062c
SHA19e922bf972280f41b7b718cff8a7d634493745ed
SHA256b2cb31555d550f5fbbbab24f42f81913db545d2a539af6f79be6634ee9ee31c1
SHA512b579e039bbc0d64b68d405e620acbf9065fd5eae2c0c08e261608abbcf4eadd2963fca1da38a510892a6e60d15eef9bb357a075a62402e1b72b53bfa7b00c58a
-
Filesize
341KB
MD50e49e66fd0e90ac46ad9f027df419048
SHA1357559abc784e69245db2e4302c838913df618b2
SHA256599fbee1c0335d5f8efae7ed35eed9700001841005158a1c8c6648b53a6e4bda
SHA51238aa37d633795de8ad65749a11da261e9f3aa2e1f285cd95e89a895c76e28a7d1fb72e87776013e8b508b9201d1b7ce92462c85cb4e3d55d5cf9b5a802479fed
-
Filesize
169KB
MD54eff97a5d293c88f3c07fcff49f0a7aa
SHA11f33d2b3011a233b6c11303f1783561107ecfb96
SHA256e8c05777aaa2c836599fbc8e0040772235822b0aae52b8e7dba56e94ea05b33f
SHA512a3881b3062c45c143d7f265bd116d161cee0acdc62cf5acf9f932eb358f544ac83b895243da19f949508a71959649cca05162a5cce4080d38ae1de6b19f0ded2
-
Filesize
213KB
MD5eab6915a2c835f1d8bc2505fb23ec402
SHA1ee889e424bb71a878b6d48c659746825396b05df
SHA2568b6c6fa10923b60efe7e93d8931189815b7ba6443028c158cdbae18a357d67ed
SHA5121d1b3dcbecd0da2b3b3b6908238b29b40b75876da9d88cfda73222309abf92c8378bce4b2da62aafb9bff5ae83e7578d91d5d31f4c3b9c98608e7082068151dc
-
Filesize
176KB
MD5a484ac63e2a9cddd514ab8bdb751196f
SHA1c31255fe65396dce925f1b4fca2e079cf4a03dbf
SHA2568d127e1e9adaeda8e815435805a274b03874efb109b1642327e38dc398c16ce4
SHA512025b0d5036b9fed9674547d4f95c04959c69ed223ad1af1f3d0e66a2e9a64b6f027c75dc199e01f42ff919266905afd589e9aa8db07eb6e6600916e2639ecd54
-
Filesize
512KB
MD548bfbce0d7197a6994d598fb5ed7ae91
SHA1a5f136df4d701df3f2916de54f578a6c3cd1ef77
SHA256efdacc8ef020596a6eb56abb84db94c3b2e805839fd2eb2474dcc04cb0d0ead8
SHA51259bde69b37fdfbae0ee4af24794aba88ce79dce45d2676485a138b724aafbeca3f78ec4b28e681a8bb0fdb1bf6905a4e264d404bb8d78733bc1b52197404c774
-
Filesize
495KB
MD5a7bb69a792a50973255fc7ecdae974a8
SHA19609a7360caf5936751c9ce5da51a44a167c18d5
SHA256f5ba10af04a1bfb95ffd5f2d9f7d81ec84ca0ade7d3cc5f5cc648da3c499f245
SHA512bff21a7626d1061d2d88d1cd06241f58d6c95c91cda40d915e4adb58dd8f917bc56cacc04da1f81a609e1872dbe67ab1cbd351cf91947299a5bd0ebdd9e07cd1