Analysis
-
max time kernel
173s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
f9d38578548860b25034aff69de426e59020162ab64834d5c8899353021c57ca.exe
Resource
win10v2004-20240226-en
General
-
Target
f9d38578548860b25034aff69de426e59020162ab64834d5c8899353021c57ca.exe
-
Size
877KB
-
MD5
5cf30590c99aa762134358dc148a27e5
-
SHA1
627a0b97c6c2964ac518879412c2773efc191da7
-
SHA256
f9d38578548860b25034aff69de426e59020162ab64834d5c8899353021c57ca
-
SHA512
223f35d9740e8b7b6e19937b739f61df4ad5f1de38b7e56914eabf58df0450d763bb1c8aea90a11d95374adff6a02cc374603a5fcdc30a99385adff0bdec7a6d
-
SSDEEP
24576:xyzeIH1htQ79fKIFTycY6wlt608PheVQZxN:kzeShg9fK2nwewK7
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
breha
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/4168-36-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/4168-37-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/4168-38-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/4168-40-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/32-56-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation 5uB4gS1.exe -
Executes dropped EXE 8 IoCs
pid Process 3252 JE9PA13.exe 4792 IT5cZ21.exe 3304 ha4Bj68.exe 1708 1Px39ut7.exe 2264 2FO0840.exe 2096 3CE08DX.exe 4076 4Ic616YF.exe 1508 5uB4gS1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f9d38578548860b25034aff69de426e59020162ab64834d5c8899353021c57ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" JE9PA13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" IT5cZ21.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ha4Bj68.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1708 set thread context of 4080 1708 1Px39ut7.exe 93 PID 2264 set thread context of 4168 2264 2FO0840.exe 101 PID 2096 set thread context of 2416 2096 3CE08DX.exe 109 PID 4076 set thread context of 32 4076 4Ic616YF.exe 114 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 4844 1708 WerFault.exe 92 4768 2264 WerFault.exe 98 1656 4168 WerFault.exe 101 1436 2096 WerFault.exe 106 4444 4076 WerFault.exe 112 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4080 AppLaunch.exe 4080 AppLaunch.exe 2416 AppLaunch.exe 2416 AppLaunch.exe 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2416 AppLaunch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4080 AppLaunch.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3436 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4612 wrote to memory of 3252 4612 f9d38578548860b25034aff69de426e59020162ab64834d5c8899353021c57ca.exe 88 PID 4612 wrote to memory of 3252 4612 f9d38578548860b25034aff69de426e59020162ab64834d5c8899353021c57ca.exe 88 PID 4612 wrote to memory of 3252 4612 f9d38578548860b25034aff69de426e59020162ab64834d5c8899353021c57ca.exe 88 PID 3252 wrote to memory of 4792 3252 JE9PA13.exe 90 PID 3252 wrote to memory of 4792 3252 JE9PA13.exe 90 PID 3252 wrote to memory of 4792 3252 JE9PA13.exe 90 PID 4792 wrote to memory of 3304 4792 IT5cZ21.exe 91 PID 4792 wrote to memory of 3304 4792 IT5cZ21.exe 91 PID 4792 wrote to memory of 3304 4792 IT5cZ21.exe 91 PID 3304 wrote to memory of 1708 3304 ha4Bj68.exe 92 PID 3304 wrote to memory of 1708 3304 ha4Bj68.exe 92 PID 3304 wrote to memory of 1708 3304 ha4Bj68.exe 92 PID 1708 wrote to memory of 4080 1708 1Px39ut7.exe 93 PID 1708 wrote to memory of 4080 1708 1Px39ut7.exe 93 PID 1708 wrote to memory of 4080 1708 1Px39ut7.exe 93 PID 1708 wrote to memory of 4080 1708 1Px39ut7.exe 93 PID 1708 wrote to memory of 4080 1708 1Px39ut7.exe 93 PID 1708 wrote to memory of 4080 1708 1Px39ut7.exe 93 PID 1708 wrote to memory of 4080 1708 1Px39ut7.exe 93 PID 1708 wrote to memory of 4080 1708 1Px39ut7.exe 93 PID 3304 wrote to memory of 2264 3304 ha4Bj68.exe 98 PID 3304 wrote to memory of 2264 3304 ha4Bj68.exe 98 PID 3304 wrote to memory of 2264 3304 ha4Bj68.exe 98 PID 2264 wrote to memory of 4452 2264 2FO0840.exe 100 PID 2264 wrote to memory of 4452 2264 2FO0840.exe 100 PID 2264 wrote to memory of 4452 2264 2FO0840.exe 100 PID 2264 wrote to memory of 4168 2264 2FO0840.exe 101 PID 2264 wrote to memory of 4168 2264 2FO0840.exe 101 PID 2264 wrote to memory of 4168 2264 2FO0840.exe 101 PID 2264 wrote to memory of 4168 2264 2FO0840.exe 101 PID 2264 wrote to memory of 4168 2264 2FO0840.exe 101 PID 2264 wrote to memory of 4168 2264 2FO0840.exe 101 PID 2264 wrote to memory of 4168 2264 2FO0840.exe 101 PID 2264 wrote to memory of 4168 2264 2FO0840.exe 101 PID 2264 wrote to memory of 4168 2264 2FO0840.exe 101 PID 2264 wrote to memory of 4168 2264 2FO0840.exe 101 PID 4792 wrote to memory of 2096 4792 IT5cZ21.exe 106 PID 4792 wrote to memory of 2096 4792 IT5cZ21.exe 106 PID 4792 wrote to memory of 2096 4792 IT5cZ21.exe 106 PID 2096 wrote to memory of 1692 2096 3CE08DX.exe 108 PID 2096 wrote to memory of 1692 2096 3CE08DX.exe 108 PID 2096 wrote to memory of 1692 2096 3CE08DX.exe 108 PID 2096 wrote to memory of 2416 2096 3CE08DX.exe 109 PID 2096 wrote to memory of 2416 2096 3CE08DX.exe 109 PID 2096 wrote to memory of 2416 2096 3CE08DX.exe 109 PID 2096 wrote to memory of 2416 2096 3CE08DX.exe 109 PID 2096 wrote to memory of 2416 2096 3CE08DX.exe 109 PID 2096 wrote to memory of 2416 2096 3CE08DX.exe 109 PID 3252 wrote to memory of 4076 3252 JE9PA13.exe 112 PID 3252 wrote to memory of 4076 3252 JE9PA13.exe 112 PID 3252 wrote to memory of 4076 3252 JE9PA13.exe 112 PID 4076 wrote to memory of 32 4076 4Ic616YF.exe 114 PID 4076 wrote to memory of 32 4076 4Ic616YF.exe 114 PID 4076 wrote to memory of 32 4076 4Ic616YF.exe 114 PID 4076 wrote to memory of 32 4076 4Ic616YF.exe 114 PID 4076 wrote to memory of 32 4076 4Ic616YF.exe 114 PID 4076 wrote to memory of 32 4076 4Ic616YF.exe 114 PID 4076 wrote to memory of 32 4076 4Ic616YF.exe 114 PID 4076 wrote to memory of 32 4076 4Ic616YF.exe 114 PID 4612 wrote to memory of 1508 4612 f9d38578548860b25034aff69de426e59020162ab64834d5c8899353021c57ca.exe 117 PID 4612 wrote to memory of 1508 4612 f9d38578548860b25034aff69de426e59020162ab64834d5c8899353021c57ca.exe 117 PID 4612 wrote to memory of 1508 4612 f9d38578548860b25034aff69de426e59020162ab64834d5c8899353021c57ca.exe 117 PID 1508 wrote to memory of 432 1508 5uB4gS1.exe 118 PID 1508 wrote to memory of 432 1508 5uB4gS1.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9d38578548860b25034aff69de426e59020162ab64834d5c8899353021c57ca.exe"C:\Users\Admin\AppData\Local\Temp\f9d38578548860b25034aff69de426e59020162ab64834d5c8899353021c57ca.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\JE9PA13.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\JE9PA13.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IT5cZ21.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IT5cZ21.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ha4Bj68.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ha4Bj68.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Px39ut7.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Px39ut7.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 5526⤵
- Program crash
PID:4844
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2FO0840.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2FO0840.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4452
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 5407⤵
- Program crash
PID:1656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 5686⤵
- Program crash
PID:4768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3CE08DX.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3CE08DX.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1692
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 5845⤵
- Program crash
PID:1436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Ic616YF.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Ic616YF.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:32
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 1364⤵
- Program crash
PID:4444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5uB4gS1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5uB4gS1.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7092.tmp\7093.tmp\7094.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5uB4gS1.exe"3⤵PID:432
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵PID:1932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ff9d13d46f8,0x7ff9d13d4708,0x7ff9d13d47185⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,11848368759346989394,7464561263361240200,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:25⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,11848368759346989394,7464561263361240200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:35⤵PID:2968
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/4⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff9d13d46f8,0x7ff9d13d4708,0x7ff9d13d47185⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:25⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:35⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:85⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2280 /prefetch:15⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:15⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:15⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:15⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:15⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:15⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6640 /prefetch:15⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6552 /prefetch:15⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:15⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:85⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:85⤵PID:4952
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵PID:5040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff9d13d46f8,0x7ff9d13d4708,0x7ff9d13d47185⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,15743899138429910485,4550123373515034266,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:25⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,15743899138429910485,4550123373515034266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:35⤵PID:708
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1708 -ip 17081⤵PID:1212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2264 -ip 22641⤵PID:4984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4168 -ip 41681⤵PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2096 -ip 20961⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4076 -ip 40761⤵PID:4320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:184
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
11KB
MD5ffe0462faa7b2f2abb7ad24dbef217f4
SHA1dde93dfc87f6b60dde31dff19b8561b561b09eb6
SHA256bf8aab73feb82bec2637c6f03d41df448ce5dabc6189f877f13ea2743faf960f
SHA51253821116befd8381b0d85e00231556f9fe0f9a62fb061df0f124d8568c14b9c9a019abfa98a94c22bec3854020580d15879c7c1eedf5c364b3d8b1cc6dfad603
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
Filesize
6KB
MD581cf4a244e015224cb48acbc2c1aebe1
SHA1e5675c5e44e2db760b01963378642cd06f5745a4
SHA2567c1c87eefdad32cc4aec0ff5cc48a6e063e9c3a5285e70b1eb53c5345cde5533
SHA512ced81f435c124c0dc1d3565f6ea57b992d4a7c274ec6f12bca080a1cc720be694bd666252c6bb29c84ca03188c31c39fe2e7afbc41eae2c40770afc848b9980a
-
Filesize
7KB
MD58073c698e313e8a74636b2179575d642
SHA12d9f13a14d74704f11ac016f4b4aee6b77b6ebf1
SHA25627f1d87c8cef6d722fc4e78eaeaf28021c52941c4c6bfab275c74be907d8e862
SHA51262cade8a2c893f5a48317cdbdeb7d9a6acf706152018c0ba850de78f99062e75294c1dfacc263995944fc771e47a263c348aacc53597065d74e96e8f4d6aed2d
-
Filesize
7KB
MD56d5bba0422001dff0a1b5162c409513c
SHA1847da3eee74647f953c59b6f718d9225062bcc8b
SHA256ead7fa599b4139736db9ebc25126b6b5f57500595d40204483fc0aab06381df2
SHA512422800f16892c55dfba0d951ee5320b6dacb7490c693a81d21b33094e31ec5aa108508a339f710d29585a73fc6952d8751fb2bad6a292f7ef1213c40735cff25
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD55cc0d69525a71d366c58aa49aab20269
SHA152f1d774c485ca7c271f0ec8c99fe16713b79bb2
SHA256626e343ed319cd174d3e265cf4be824dc09d00be2136d528721c841906107d2b
SHA5121b16154d12422c7de596cd3ba15f9f12725fb375df938a547d3353efac2a5ac7fdba2ca8749ec0ac8d2d88724c0bad9cd0d455835a40f2021ef4f3e2089c293b
-
Filesize
8KB
MD54a0cfbe536e29336c1768a58f98f1223
SHA18a86e1df01d7519dfc36451e1b24bf43cced9faf
SHA256f596341f655f5a12e9de647e3911068309d90990a455a715e6b59f32f4f583ca
SHA5125d1e9ced50d6fbea506d2dccfd4d386f46675cf38de5baefa925641d39e06af7fc3d432eeb85202182c4ce458b36de7c665346b7f5f5fd1213ad29486b53bee2
-
Filesize
8KB
MD586ea2d1fd8b05207a8853c160ac4ca43
SHA164a6fd3af030a36fc4f91a3d781d4dc007826dc7
SHA25666623094c26e8323afee8d01d82d76aa9311d7e10d2f0f91388dec816093a57e
SHA512437c9c5d4d1e0a0130a7fdac56d19b932d55e12c3c837dbcb0ca139e6cb17f62956cc7d014bc25d2f77850e69d7675caf8c38bf4a5443cee76690c1368626c7d
-
Filesize
124B
MD5dec89e5682445d71376896eac0d62d8b
SHA1c5ae3197d3c2faf3dea137719c804ab215022ea6
SHA256c3dea90ca98985007f0de66bf0197fdcd2d4a35e365135bf37a18a4895d81668
SHA512b746b79120d2ff8a9f3327b0bed99c70339155ea831c1eb9f412056fc8de36a0e3005378ba9102bd25ce6cc24fe1171f1a9c8453f33a9bcd6dd59e9ad0f8e186
-
Filesize
87KB
MD506f8b4b3dfe7a2ed9534f78765e5c623
SHA143964ba962303ff5dbe3f3b2d0ccb6088ae7931a
SHA2560273130e9b225c0c4d1772535a382e27d79bd0de807ad537aa305b129c517bc2
SHA5122844f324b8c9e86cf312d5e66c580d069f386a255455f087f3ab146cb6db5d5da3aad45962e826345f2ee67b6b8d19cc30da9e58ca310e8eaddc89f4bb7f42f5
-
Filesize
739KB
MD524dc758b8982a91afe8563dc9b6505b9
SHA19dc6312ae33de5a8294c76bd32a50354659d1c1c
SHA256e93482911cdbbb2670d4b4692a8ef5b479b56647308309776d38e8e4640e81bf
SHA5122e736897e8dd637d25b2eb812fc2a2ae60f31bf778dde1a61d8dee3979a6efe4d8678ca03b3c4a76c9cd863256f1946388dc93dbe46695ecd7c07c003855886e
-
Filesize
339KB
MD5b6065a3e30887f2c4bf46c81437f8db8
SHA13ee2c9352894427de00093e4686597cfca21abbc
SHA256c22d72bdc936010e01f24d4e5d429139ad7826846ca4652ebb664e73832e2a4f
SHA51252397a06d938cc2f21584b32414049faeb717d658ed8dd4ff6c07b8ee8bb9a084cbf0887a0eccfbe1a05d37d65214faf43c96a0da063ae5ba53f9caf93f27a6b
-
Filesize
503KB
MD568c126c0483a85333bc96d631c116142
SHA19992f54d0126ebfdb5f5cb90d91d2b48351eed6b
SHA25674f32a5232a45f65d671660dc3177c701c85de2500113b7195a96a4d97af2df0
SHA512b9942372b9b32191dbee459d6399d7cb91451df33691f99078706832d29d0fc1f3755f39b38ac54c0156e50a264d9120e20aec7f1ad30bfcaeae10a187d76f3f
-
Filesize
148KB
MD5aa52fdd2418c834d99276c985fdbaf1a
SHA1c56dc824babf8d0d53e809d5d0db680a37a02f63
SHA25650ba13ac3e6f1ea5a91a0c62d1829fe9bdcb03d098018ad094088f67b7a80f38
SHA51269418c5d5d0e3c0099e4eb026211a674a6ea14af0d6b9821456bf0df6948ea9ce61bcdcf95d84077875c795535fa58169d397d8b7f46a09c8ef9d57829680c41
-
Filesize
317KB
MD51e71d0be349396195913d65c7a46339a
SHA1d6237a9c9ff2bdf96bea08707fa5605f3f88c501
SHA25690df95b4584663dd13009aeacca9648600a0bb6daea1bc78ce397020b6753b57
SHA512e24511b4e83d1f4eeb571343ef5a55bfb9e809eb2a0d2684c7156101324a296bc7635a42520452fafdc27e65845fd02da3bb095fa67b8ec71bb1f8b5e7393a5b
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
298KB
MD539a77dd444d335e91b247aa7cd8a3ca1
SHA18b97ae2fe569679ac5f641c46eb2d3c8e8b37971
SHA2562b800882ff65ee4010d5fcbbd38330c4ce0c817afd53060523311cd87e7c082d
SHA512f407040ae1dc453a96ef10d06d694208ea0bb6374e4ac243be85da42abdd0f085a8f88d623c3104c4dcc09b5b220a0235bbe46035ebe08dfa599cd58017da119