Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 02:40
Behavioral task
behavioral1
Sample
ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe
Resource
win10v2004-20240508-en
General
-
Target
ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe
-
Size
104KB
-
MD5
d0d63d709fdee0b9c126108c80efc852
-
SHA1
dbfc8222def5b0538b39656468ef41eb496ba22e
-
SHA256
ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d
-
SHA512
bcce89179023668051af79bdbb85fee3bcb4ce63abf6626b7c50e98ca2c60f2348a5d45a7907ac9826b8aa6bbc881651ad6d0018b82a69368853be73287793ff
-
SSDEEP
1536:YRVCaKgzbLc54hukfgvYnouy8LN68/YCDZEleLrczR13hDM3:gjbLl/gvQoutZ6KYese/c91hD8
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 17 IoCs
resource yara_rule behavioral1/memory/2548-56-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1688-92-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2548-95-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1952-104-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1688-105-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1688-109-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1688-112-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1688-115-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1688-120-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1688-123-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1688-126-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1688-129-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1688-132-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1688-135-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1688-138-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1688-141-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1688-144-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 19 IoCs
resource yara_rule behavioral1/memory/1688-0-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/files/0x0007000000015662-5.dat UPX behavioral1/memory/2548-56-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1688-92-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/2548-95-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1952-104-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1688-105-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1688-109-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1688-112-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1688-115-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1688-120-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1688-123-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1688-126-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1688-129-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1688-132-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1688-135-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1688-138-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1688-141-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1688-144-0x0000000000400000-0x0000000000420000-memory.dmp UPX -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1688-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/files/0x0007000000015662-5.dat upx behavioral1/memory/2548-56-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1688-92-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2548-95-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1952-104-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1688-105-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1688-109-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1688-112-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1688-115-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1688-120-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1688-123-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1688-126-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1688-129-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1688-132-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1688-135-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1688-138-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1688-141-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1688-144-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\H: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\J: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\V: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\W: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\Y: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\Z: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\B: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\Q: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\T: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\U: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\G: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\I: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\K: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\N: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\P: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\X: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\A: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\M: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\O: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\R: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\S: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File opened (read-only) \??\L: ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\System32\LogFiles\Fax\Incoming\beast masturbation mature .mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\SysWOW64\config\systemprofile\cum porn [free] legs young (Janette).zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\xxx sleeping vagina girly (Tatjana).mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\SysWOW64\IME\shared\spanish lingerie uncut cock ejaculation .zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\lingerie uncut high heels .mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\SysWOW64\FxsTmp\horse fucking [bangbus] .zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\SysWOW64\IME\shared\brasilian action lingerie hot (!) titts ash .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\System32\DriverStore\Temp\cum [free] gorgeoushorny .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\SysWOW64\FxsTmp\swedish cum sleeping legs mistress (Christine).mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\SysWOW64\config\systemprofile\american hardcore trambling full movie high heels .zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\nude sleeping legs 50+ (Sylvia,Jenna).rar.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\russian beastiality trambling uncut titts lady (Tatjana,Anniston).mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Program Files\Common Files\Microsoft Shared\gay beast masturbation (Gina,Melissa).mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Program Files\DVD Maker\Shared\blowjob bukkake catfight nipples penetration .avi.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Program Files\Windows Journal\Templates\tyrkish action trambling voyeur .rar.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\gay porn catfight titts (Tatjana).zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Program Files (x86)\Common Files\microsoft shared\horse [bangbus] granny .mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Program Files (x86)\Google\Update\Download\german action masturbation .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\british kicking trambling licking hole .mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Program Files (x86)\Google\Temp\fetish [free] legs circumcision .avi.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\gang bang hot (!) blondie .avi.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\danish nude cum public girly .rar.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\beastiality beast girls hole (Britney,Gina).zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Program Files (x86)\Microsoft Office\Templates\malaysia fucking [bangbus] .zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\beastiality trambling voyeur .avi.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_bcc167434bb9b3ea\malaysia fucking lingerie masturbation legs .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6B8E.tmp\german bukkake fucking [bangbus] wifey .zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\swedish hardcore hot (!) lady .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_it-it_ea4a469ab7713182\italian beastiality voyeur mature .rar.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_en-us_00f45b041e1e8fd3\german cum [bangbus] .zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0993a1b8823a4e79\gang bang horse uncut castration .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_it-it_963e6ae24c653bfe\lingerie [bangbus] (Sonja,Gina).mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_6.1.7600.16385_none_6b16fa9f975e1109\horse [milf] beautyfull (Curtney,Britney).avi.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\x86_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_94ab98ac6d213009\horse bukkake hot (!) boobs .rar.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_98b24799b5d08c05\animal licking .zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_8c6fc5a7aa8c435d\malaysia horse public femdom .zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_6.1.7600.16385_none_49dd84a06c7c8863\bukkake full movie femdom .mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_ddab3bcb3a4ffb45\animal public lady (Ashley).mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_34400a5790d1d336\chinese fucking licking .mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_es-es_8bc7919d3f36cee7\chinese action masturbation vagina .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\InstallTemp\indian trambling several models ash ìï .rar.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_6.1.7600.16385_none_965db382b6fef5cb\malaysia porn gay [free] redhair .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_3d98a610fed70b75\gay cum catfight titts .zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\security\templates\canadian action fetish uncut feet fishy .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_en-us_5d9f7d70ed4643fd\norwegian gang bang fetish hot (!) .mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_de-de_5803850b2f40840e\chinese sperm gang bang [bangbus] hairy .rar.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_a3772de7111797da\german blowjob fetish big (Ashley).avi.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\chinese beastiality big fishy (Jenna).mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_en-us_65b23d3c3a97bfaf\trambling horse sleeping hole blondie (Britney).avi.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\lingerie cum several models ejaculation (Sandy,Melissa).rar.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_293ea1e3e6bc5364\blowjob blowjob lesbian hotel (Anniston).mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_es-es_5d6ada54ed6d35a2\swedish cum lesbian swallow (Janette).avi.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_bacc7ceffc55dca2\spanish xxx [milf] ejaculation .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_6.1.7600.16385_none_c26c5b8280c6af34\brasilian fetish sperm [bangbus] mistress .rar.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\indian cum fucking hot (!) upskirt .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_de-de_b4aea777fe683838\horse lesbian leather .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_0ac4ebfc358e5ec0\chinese action hot (!) mature .avi.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_it-it_97a45841ff925aa0\horse cum catfight hole .avi.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_mscorlib_b03f5f7f11d50a3a_6.1.7600.16385_none_2958d4a31d2ec64f\malaysia cum kicking public legs redhair .rar.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_7f84cd98a7a56fd8\kicking full movie ìï .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE291.tmp\african xxx hidden upskirt .avi.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_05ea1d9b8e2bf020\tyrkish kicking animal several models .rar.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\chinese cum horse masturbation .rar.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\cumshot fetish licking .avi.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_00225053e03f4c04\cum public gorgeoushorny .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_6.1.7601.17514_none_39374e2435a71b47\hardcore porn lesbian .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE56E.tmp\xxx lesbian [bangbus] .mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_94828572f7ddbf0f\japanese cum action [bangbus] leather (Anniston,Curtney).avi.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\assembly\tmp\italian lesbian [milf] .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\PLA\Templates\russian gay public 50+ .zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_0835101f2d90c7b6\sperm action sleeping .mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_it-it_18a6fde3093acac7\african horse porn hot (!) feet .avi.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_39c9d74ef2ad6c7b\indian porn sleeping boobs young .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_6.1.7600.16385_none_a727eb798dcfb185\norwegian handjob voyeur ash pregnant .mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_3863e9ef3f804dd9\cum [bangbus] .zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\xxx hardcore sleeping nipples femdom .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\x86_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_5e4ff1f4cf2dee9b\african horse cum public boobs .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_6.1.7601.17514_none_d81c96999f75bd77\indian beastiality several models ash gorgeoushorny (Jenna).avi.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_2fc4a33adb648f33\asian fetish kicking several models .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_6.1.7600.16385_none_6377027f0030a06a\chinese gang bang [free] legs femdom (Janette,Jade).mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0af98f1835676d1b\gang bang lingerie voyeur hotel .zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\Temp\danish xxx public hotel .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_6.1.7600.16385_none_f27c4f066f5c6701\fucking action catfight bondage .avi.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_es-es_00bfb7e81e458178\porn trambling [milf] glans (Melissa,Sylvia).zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ad7c61fb28607522\italian beastiality animal masturbation ìï .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\x86_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_d8216ed3d8746200\japanese beast gay [free] young (Sonja,Britney).rar.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\SoftwareDistribution\Download\fucking horse full movie .mpeg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.SharePoint.BusinessData.Administration.Client.Intl\japanese gay several models (Sarah,Samantha).zip.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_2e7f079c3208e549\animal fucking voyeur .mpg.exe ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 1952 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2548 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 28 PID 1688 wrote to memory of 2548 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 28 PID 1688 wrote to memory of 2548 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 28 PID 1688 wrote to memory of 2548 1688 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 28 PID 2548 wrote to memory of 1952 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 29 PID 2548 wrote to memory of 1952 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 29 PID 2548 wrote to memory of 1952 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 29 PID 2548 wrote to memory of 1952 2548 ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe"C:\Users\Admin\AppData\Local\Temp\ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe"C:\Users\Admin\AppData\Local\Temp\ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe"C:\Users\Admin\AppData\Local\Temp\ad8759da214153b016b43d8674ee2b4f2c7d24c0eff283edbeb5f6d220f0789d.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD5a61fe713a295cc4a29efb3ebebbd1d76
SHA1086c7f816fe890a14be835aed13bcc9ac4cbaa49
SHA256566298f71afe0402f35a3d81639088952d7358ab581769ac28dca7bca0dd0b83
SHA512f685a9b2f80c833631e3732779bbaf2bcba400d1971236f6b103a1d2fe9c68222b31de67b1e8bf3ebcbc4b4d0c39dae4904e9b768aeaad29eb4b523d6486093f