Analysis
-
max time kernel
132s -
max time network
278s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe
Resource
win10-20240404-en
General
-
Target
dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe
-
Size
1.1MB
-
MD5
afe0d5fa1956d8a29d24c9776d5f0992
-
SHA1
1019105f592fc3b41c5b160079587fc99c14ba28
-
SHA256
dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416
-
SHA512
424345ed950f46c92f872495401090002daa3181ebf6f6e69ae3e23cbf58b205176fd4550d2326b2f5536b6000cf721cfc9bdaece2f7d223c28667c4ba1f13ac
-
SSDEEP
24576:0qDEvCTbMWu7rQYlBQcBiT6rprG8auE2+b+HdiJUX:0TvC/MTQYxsWR7auE2+b+HoJU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 1664 chrome.exe 1664 chrome.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe -
Suspicious use of SendNotifyMessage 43 IoCs
pid Process 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1664 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 28 PID 2220 wrote to memory of 1664 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 28 PID 2220 wrote to memory of 1664 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 28 PID 2220 wrote to memory of 1664 2220 dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe 28 PID 1664 wrote to memory of 2752 1664 chrome.exe 29 PID 1664 wrote to memory of 2752 1664 chrome.exe 29 PID 1664 wrote to memory of 2752 1664 chrome.exe 29 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 2868 1664 chrome.exe 31 PID 1664 wrote to memory of 1560 1664 chrome.exe 32 PID 1664 wrote to memory of 1560 1664 chrome.exe 32 PID 1664 wrote to memory of 1560 1664 chrome.exe 32 PID 1664 wrote to memory of 2404 1664 chrome.exe 33 PID 1664 wrote to memory of 2404 1664 chrome.exe 33 PID 1664 wrote to memory of 2404 1664 chrome.exe 33 PID 1664 wrote to memory of 2404 1664 chrome.exe 33 PID 1664 wrote to memory of 2404 1664 chrome.exe 33 PID 1664 wrote to memory of 2404 1664 chrome.exe 33 PID 1664 wrote to memory of 2404 1664 chrome.exe 33 PID 1664 wrote to memory of 2404 1664 chrome.exe 33 PID 1664 wrote to memory of 2404 1664 chrome.exe 33 PID 1664 wrote to memory of 2404 1664 chrome.exe 33 PID 1664 wrote to memory of 2404 1664 chrome.exe 33 PID 1664 wrote to memory of 2404 1664 chrome.exe 33 PID 1664 wrote to memory of 2404 1664 chrome.exe 33 PID 1664 wrote to memory of 2404 1664 chrome.exe 33 PID 1664 wrote to memory of 2404 1664 chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe"C:\Users\Admin\AppData\Local\Temp\dedb31c8a33a049f17d613e66c38d7562a97e59c604ffdcac3b7b8766ace0416.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6d79758,0x7fef6d79768,0x7fef6d797783⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1204,i,9805456830772782558,5052349130478292751,131072 /prefetch:23⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1204,i,9805456830772782558,5052349130478292751,131072 /prefetch:83⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1204,i,9805456830772782558,5052349130478292751,131072 /prefetch:83⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2328 --field-trial-handle=1204,i,9805456830772782558,5052349130478292751,131072 /prefetch:13⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2336 --field-trial-handle=1204,i,9805456830772782558,5052349130478292751,131072 /prefetch:13⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2832 --field-trial-handle=1204,i,9805456830772782558,5052349130478292751,131072 /prefetch:23⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3172 --field-trial-handle=1204,i,9805456830772782558,5052349130478292751,131072 /prefetch:13⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3512 --field-trial-handle=1204,i,9805456830772782558,5052349130478292751,131072 /prefetch:83⤵PID:1080
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD579f09b0deaec9d5285882152cd30cbfe
SHA1f79cfde54787eb49e4969c27090cea7f21ede5c8
SHA25664c209c7ee49d179fc90bc78778c26169f614a8b12202d72e406adf341b715a8
SHA5124494a4e1706535512c646fd5354d33d7bba648c1feed2b5700eca4914e3348fa90405624a42bd349daa4c5931e6cfbf0a0fbb458114278162475205bc5107e9d
-
Filesize
1KB
MD5b0fa0f928e455145e3758dda10757a24
SHA1a6d3b58dcb504b9676c3a22b29ecbfca7f310e6b
SHA25634c584a41ff0ff24cc61a261403d97627e99ce90a1cd5558d1df83e084b95833
SHA5121b217d863446f456b370194bc61affd651eeb66f92d2ba3e1bb8baf88604e81998f2fbe8bd12588f07cff26b9bd8e2f7533a5ea4d47b471b4523666801de7746
-
Filesize
5KB
MD5230d76fe791b3c45f0649156be7d8e79
SHA15b6c880ad47c9da58200cb5e290d544bebceb82e
SHA256b78e85fd9bfafe4561b30406baae392c797b33ca29ef34b93c831a51b230f23f
SHA512eafec4b3ff17701810a029ca365f8409bb95760e8af1a93f52d2e4cea2fe497fabb2841cb0c4f992b7610c1a996b531d8445511d4e8d76e56be71d4e1114f96f
-
Filesize
5KB
MD5e66b8769facb9ff975fdc2de4fb7889a
SHA1946be58d79cbe56a7306d9c10e61312c3994292e
SHA256d627b9e54c8f281efd88d50a6db88288b7366acf5f799af0e837b548c864058d
SHA5125cf742b366aa6e3e6c43453e5bf7ce464446ac9bb0ac91c6fb0c76d69df259bba63ae27f4c27cbde126fa66ecc73a0877d0a3609c5d60bdc54260e595c042509
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2