Overview
overview
10Static
static
3000643ece0...88.exe
windows10-2004-x64
100e413fa969...3c.exe
windows10-2004-x64
104312b77e60...ce.exe
windows10-2004-x64
105a9212ccca...d1.exe
windows10-2004-x64
10617783538b...1f.exe
windows10-2004-x64
10729187837b...ea.exe
windows10-2004-x64
10747238b5bd...97.exe
windows10-2004-x64
108e6dae5587...22.exe
windows10-2004-x64
10dd86e508d3...d9.exe
windows10-2004-x64
7e500bee084...71.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 10:07 UTC
Static task
static1
Behavioral task
behavioral1
Sample
000643ece079f96ed416c42e9dec2e3a647599f99950c60349c52e36cb724e88.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
0e413fa9690c02a45dc95f1ea020874ed2745670117fed803aea439be9b8683c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
4312b77e6031b30312b6c5c30180fca1895d4c065914103fa2e4ca9e8da9a0ce.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
617783538bdab4bd7c8fbacae9e8749b50cd02e596dc328612ea1d600c11dc1f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
729187837b6282872fd853df135ab03458edda808d089983498f29a635b978ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
747238b5bd007fbf264cbd66b42a3fa3d6c54ccb6a1d0ce2c79715650a55d097.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
8e6dae5587d0150e1fa568f6ff42d2f6790750c017c08f86cff2c14b18de7422.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
dd86e508d33a5b71e82ab1b41a8dd7c49009ac65ba2191c467d7c58267e8ead9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
e500bee084b2757ef23283d465255eeb1eed61d9ed67171a24f814de66cf3b71.exe
Resource
win10v2004-20240508-en
General
-
Target
5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1.exe
-
Size
514KB
-
MD5
32ab0711c74737a7d5948b73ccc1ab6f
-
SHA1
3bd68e686a0260a11aa4805a2655867c4e780059
-
SHA256
5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1
-
SHA512
2aebec7ee681bd7e5e085571347a9caed38c2dfd5c705ee5fdb23da1258079bfb77b278427dd46811afc7f2f98afa2c818abb44e305cc13d4e43c8d1dec0a7e3
-
SSDEEP
12288:8Mrzy906i3DhgK5RE1g0xJF7ceeeeDC37Ztoj8QXII:HysNDSF7we97Zc
Malware Config
Extracted
amadey
3.85
http://77.91.68.3
-
install_dir
3ec1f323b5
-
install_file
danke.exe
-
strings_key
827021be90f1e85ab27949ea7e9347e8
-
url_paths
/home/love/index.php
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral4/files/0x0008000000023417-19.dat healer behavioral4/memory/2600-21-0x0000000000AD0000-0x0000000000ADA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0423755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0423755.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a0423755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0423755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0423755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0423755.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral4/files/0x0007000000023412-43.dat family_redline behavioral4/memory/3392-45-0x0000000000D20000-0x0000000000D50000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation b3882292.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation danke.exe -
Executes dropped EXE 9 IoCs
pid Process 1836 v9804047.exe 4892 v1593511.exe 2600 a0423755.exe 2700 b3882292.exe 1580 danke.exe 4580 c0749332.exe 3392 d6820135.exe 2980 danke.exe 4440 danke.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a0423755.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9804047.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1593511.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c0749332.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c0749332.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c0749332.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 8 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2600 a0423755.exe 2600 a0423755.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2600 a0423755.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 3788 wrote to memory of 1836 3788 5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1.exe 83 PID 3788 wrote to memory of 1836 3788 5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1.exe 83 PID 3788 wrote to memory of 1836 3788 5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1.exe 83 PID 1836 wrote to memory of 4892 1836 v9804047.exe 84 PID 1836 wrote to memory of 4892 1836 v9804047.exe 84 PID 1836 wrote to memory of 4892 1836 v9804047.exe 84 PID 4892 wrote to memory of 2600 4892 v1593511.exe 86 PID 4892 wrote to memory of 2600 4892 v1593511.exe 86 PID 4892 wrote to memory of 2700 4892 v1593511.exe 97 PID 4892 wrote to memory of 2700 4892 v1593511.exe 97 PID 4892 wrote to memory of 2700 4892 v1593511.exe 97 PID 2700 wrote to memory of 1580 2700 b3882292.exe 99 PID 2700 wrote to memory of 1580 2700 b3882292.exe 99 PID 2700 wrote to memory of 1580 2700 b3882292.exe 99 PID 1836 wrote to memory of 4580 1836 v9804047.exe 100 PID 1836 wrote to memory of 4580 1836 v9804047.exe 100 PID 1836 wrote to memory of 4580 1836 v9804047.exe 100 PID 3788 wrote to memory of 3392 3788 5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1.exe 101 PID 3788 wrote to memory of 3392 3788 5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1.exe 101 PID 3788 wrote to memory of 3392 3788 5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1.exe 101 PID 1580 wrote to memory of 8 1580 danke.exe 102 PID 1580 wrote to memory of 8 1580 danke.exe 102 PID 1580 wrote to memory of 8 1580 danke.exe 102 PID 1580 wrote to memory of 4540 1580 danke.exe 104 PID 1580 wrote to memory of 4540 1580 danke.exe 104 PID 1580 wrote to memory of 4540 1580 danke.exe 104 PID 4540 wrote to memory of 4076 4540 cmd.exe 106 PID 4540 wrote to memory of 4076 4540 cmd.exe 106 PID 4540 wrote to memory of 4076 4540 cmd.exe 106 PID 4540 wrote to memory of 4888 4540 cmd.exe 107 PID 4540 wrote to memory of 4888 4540 cmd.exe 107 PID 4540 wrote to memory of 4888 4540 cmd.exe 107 PID 4540 wrote to memory of 4924 4540 cmd.exe 108 PID 4540 wrote to memory of 4924 4540 cmd.exe 108 PID 4540 wrote to memory of 4924 4540 cmd.exe 108 PID 4540 wrote to memory of 460 4540 cmd.exe 109 PID 4540 wrote to memory of 460 4540 cmd.exe 109 PID 4540 wrote to memory of 460 4540 cmd.exe 109 PID 4540 wrote to memory of 2744 4540 cmd.exe 110 PID 4540 wrote to memory of 2744 4540 cmd.exe 110 PID 4540 wrote to memory of 2744 4540 cmd.exe 110 PID 4540 wrote to memory of 3748 4540 cmd.exe 111 PID 4540 wrote to memory of 3748 4540 cmd.exe 111 PID 4540 wrote to memory of 3748 4540 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1.exe"C:\Users\Admin\AppData\Local\Temp\5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9804047.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9804047.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1593511.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1593511.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0423755.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0423755.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3882292.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3882292.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F6⤵
- Creates scheduled task(s)
PID:8
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"7⤵PID:4888
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E7⤵PID:4924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:460
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"7⤵PID:2744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E7⤵PID:3748
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0749332.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0749332.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4580
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6820135.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6820135.exe2⤵
- Executes dropped EXE
PID:3392
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:2980
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4440
Network
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.dual-a-0034.a-msedge.netg-bing-com.dual-a-0034.a-msedge.netIN CNAMEdual-a-0034.a-msedge.netdual-a-0034.a-msedge.netIN A204.79.197.237dual-a-0034.a-msedge.netIN A13.107.21.237
-
GEThttps://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De89a-zHReowGSQCh5XdL7uJzVUCUySYt2xlbdbw5z-wPCd_hRsKnu46KYdE2tRlom6KcX7NTh3SYfFLCXFeKikk7n9cwuRjeYpJjJcm_NLIYTat-En4npHYEIH1XPf1oGAKJ1YoBqxSAPn6Uu2XGsP-gk-oFEegcZIj-3ZQ7VzZHwL8mGR%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D4392b8d149b11b74e7cadefafaa51733&TIME=20240426T135914Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0ERemote address:204.79.197.237:443RequestGET /neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De89a-zHReowGSQCh5XdL7uJzVUCUySYt2xlbdbw5z-wPCd_hRsKnu46KYdE2tRlom6KcX7NTh3SYfFLCXFeKikk7n9cwuRjeYpJjJcm_NLIYTat-En4npHYEIH1XPf1oGAKJ1YoBqxSAPn6Uu2XGsP-gk-oFEegcZIj-3ZQ7VzZHwL8mGR%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D4392b8d149b11b74e7cadefafaa51733&TIME=20240426T135914Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0E HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=0BFBDABE58C666BF1E71CEC45926674F; domain=.bing.com; expires=Tue, 03-Jun-2025 10:08:29 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 8F69FFB622F04CAEA9A0996ACD0C0A12 Ref B: LON04EDGE1016 Ref C: 2024-05-09T10:08:29Z
date: Thu, 09 May 2024 10:08:28 GMT
-
GEThttps://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De89a-zHReowGSQCh5XdL7uJzVUCUySYt2xlbdbw5z-wPCd_hRsKnu46KYdE2tRlom6KcX7NTh3SYfFLCXFeKikk7n9cwuRjeYpJjJcm_NLIYTat-En4npHYEIH1XPf1oGAKJ1YoBqxSAPn6Uu2XGsP-gk-oFEegcZIj-3ZQ7VzZHwL8mGR%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D4392b8d149b11b74e7cadefafaa51733&TIME=20240426T135914Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0ERemote address:204.79.197.237:443RequestGET /neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De89a-zHReowGSQCh5XdL7uJzVUCUySYt2xlbdbw5z-wPCd_hRsKnu46KYdE2tRlom6KcX7NTh3SYfFLCXFeKikk7n9cwuRjeYpJjJcm_NLIYTat-En4npHYEIH1XPf1oGAKJ1YoBqxSAPn6Uu2XGsP-gk-oFEegcZIj-3ZQ7VzZHwL8mGR%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D4392b8d149b11b74e7cadefafaa51733&TIME=20240426T135914Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0E HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=0BFBDABE58C666BF1E71CEC45926674F; _EDGE_S=SID=10ACDEA574156F3028C8CADF75D56E63
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=wAyu0YBfDI-h8SDMA8mskdzgQAGFzrlqxQ7RckXgejc; domain=.bing.com; expires=Tue, 03-Jun-2025 10:08:30 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: EBCDC83CCA9045FFA57EA07529864840 Ref B: LON04EDGE1016 Ref C: 2024-05-09T10:08:30Z
date: Thu, 09 May 2024 10:08:29 GMT
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
GEThttps://www.bing.com/aes/c.gif?RG=9ff339fc70c74a308a1cc10aabfdc949&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T135914Z&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893Remote address:2.17.196.65:443RequestGET /aes/c.gif?RG=9ff339fc70c74a308a1cc10aabfdc949&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T135914Z&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893 HTTP/2.0
host: www.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=0BFBDABE58C666BF1E71CEC45926674F
ResponseHTTP/2.0 200
pragma: no-cache
vary: Origin
p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 1DC78E47497D41C28E464DCC4C260250 Ref B: DUS30EDGE0310 Ref C: 2024-05-09T10:08:29Z
content-length: 0
date: Thu, 09 May 2024 10:08:29 GMT
set-cookie: _EDGE_S=SID=10ACDEA574156F3028C8CADF75D56E63; path=/; httponly; domain=bing.com
set-cookie: MUIDB=0BFBDABE58C666BF1E71CEC45926674F; path=/; httponly; expires=Tue, 03-Jun-2025 10:08:29 GMT
alt-svc: h3=":443"; ma=93600
x-cdn-traceid: 0.3dc41102.1715249309.25a50b8
-
Remote address:8.8.8.8:53Request237.197.79.204.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request79.190.18.2.in-addr.arpaIN PTRResponse79.190.18.2.in-addr.arpaIN PTRa2-18-190-79deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request65.196.17.2.in-addr.arpaIN PTRResponse65.196.17.2.in-addr.arpaIN PTRa2-17-196-65deploystaticakamaitechnologiescom
-
GEThttps://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90Remote address:2.17.196.65:443RequestGET /th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90 HTTP/2.0
host: www.bing.com
accept: */*
cookie: MUID=0BFBDABE58C666BF1E71CEC45926674F; _EDGE_S=SID=10ACDEA574156F3028C8CADF75D56E63; MSPTC=wAyu0YBfDI-h8SDMA8mskdzgQAGFzrlqxQ7RckXgejc; MUIDB=0BFBDABE58C666BF1E71CEC45926674F
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-type: image/png
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
content-length: 1107
date: Thu, 09 May 2024 10:08:31 GMT
alt-svc: h3=":443"; ma=93600
x-cdn-traceid: 0.3dc41102.1715249311.25a5c06
-
Remote address:8.8.8.8:53Request205.47.74.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request77.190.18.2.in-addr.arpaIN PTRResponse77.190.18.2.in-addr.arpaIN PTRa2-18-190-77deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request55.36.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request149.220.183.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request31.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340783933_1QOIM48UV8MGOV4SU&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340783933_1QOIM48UV8MGOV4SU&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 638730
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: C12C9101BCDD42A0A652E6A7DA8CC8C9 Ref B: LON04EDGE1022 Ref C: 2024-05-09T10:10:09Z
date: Thu, 09 May 2024 10:10:08 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239351691769_17S178H4I11J3APXJ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239351691769_17S178H4I11J3APXJ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 555746
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 2E14B55AB230427F9A871F11E72ABDF9 Ref B: LON04EDGE1022 Ref C: 2024-05-09T10:10:09Z
date: Thu, 09 May 2024 10:10:08 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239351691770_1IUJHOACLFVRNOEKH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239351691770_1IUJHOACLFVRNOEKH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 496166
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 31897DAE8A9D418FAD5545A2A8C28B85 Ref B: LON04EDGE1022 Ref C: 2024-05-09T10:10:09Z
date: Thu, 09 May 2024 10:10:08 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340783932_1JCHO8JLBZ4TPAX49&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340783932_1JCHO8JLBZ4TPAX49&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 496229
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 885A572319BC4E8EB9CD5F77119E8424 Ref B: LON04EDGE1022 Ref C: 2024-05-09T10:10:09Z
date: Thu, 09 May 2024 10:10:08 GMT
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
204.79.197.237:443https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De89a-zHReowGSQCh5XdL7uJzVUCUySYt2xlbdbw5z-wPCd_hRsKnu46KYdE2tRlom6KcX7NTh3SYfFLCXFeKikk7n9cwuRjeYpJjJcm_NLIYTat-En4npHYEIH1XPf1oGAKJ1YoBqxSAPn6Uu2XGsP-gk-oFEegcZIj-3ZQ7VzZHwL8mGR%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D4392b8d149b11b74e7cadefafaa51733&TIME=20240426T135914Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0Etls, http22.5kB 9.0kB 19 16
HTTP Request
GET https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De89a-zHReowGSQCh5XdL7uJzVUCUySYt2xlbdbw5z-wPCd_hRsKnu46KYdE2tRlom6KcX7NTh3SYfFLCXFeKikk7n9cwuRjeYpJjJcm_NLIYTat-En4npHYEIH1XPf1oGAKJ1YoBqxSAPn6Uu2XGsP-gk-oFEegcZIj-3ZQ7VzZHwL8mGR%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D4392b8d149b11b74e7cadefafaa51733&TIME=20240426T135914Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0EHTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De89a-zHReowGSQCh5XdL7uJzVUCUySYt2xlbdbw5z-wPCd_hRsKnu46KYdE2tRlom6KcX7NTh3SYfFLCXFeKikk7n9cwuRjeYpJjJcm_NLIYTat-En4npHYEIH1XPf1oGAKJ1YoBqxSAPn6Uu2XGsP-gk-oFEegcZIj-3ZQ7VzZHwL8mGR%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D4392b8d149b11b74e7cadefafaa51733&TIME=20240426T135914Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0EHTTP Response
204 -
2.17.196.65:443https://www.bing.com/aes/c.gif?RG=9ff339fc70c74a308a1cc10aabfdc949&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T135914Z&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893tls, http21.7kB 5.4kB 18 12
HTTP Request
GET https://www.bing.com/aes/c.gif?RG=9ff339fc70c74a308a1cc10aabfdc949&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T135914Z&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893HTTP Response
200 -
2.17.196.65:443https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90tls, http21.6kB 6.4kB 17 12
HTTP Request
GET https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90HTTP Response
200 -
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
1.2kB 8.1kB 16 14
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239340783932_1JCHO8JLBZ4TPAX49&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90tls, http279.6kB 2.3MB 1662 1659
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340783933_1QOIM48UV8MGOV4SU&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239351691769_17S178H4I11J3APXJ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239351691770_1IUJHOACLFVRNOEKH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340783932_1JCHO8JLBZ4TPAX49&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200 -
1.2kB 8.1kB 16 14
-
1.2kB 8.1kB 16 14
-
260 B 5
-
260 B 5
-
208 B 4
-
208 B 4
-
56 B 151 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.23713.107.21.237
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
73 B 143 B 1 1
DNS Request
237.197.79.204.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
79.190.18.2.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
65.196.17.2.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
205.47.74.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
77.190.18.2.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
55.36.223.20.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
149.220.183.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
31.243.111.52.in-addr.arpa
-
62 B 173 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD535c069df2551d2e840fda156cc641cc6
SHA13d585c42d1263b19654dbbb2116c6e1634748f45
SHA2566f0c4d8a21e15d15d6f6bc50e37e67a0e9217cc8601de1c084e16a35a82f3042
SHA51255bb9bc855872a4c51033e0343f78e3dd7c998bc46a704c9cff631e9bb27a117eaff3a2005a35e836d8c66d89372441c2b233778ff3dfbaa7edbaaa1f28b0619
-
Filesize
359KB
MD5f96731ad89768ce38ca85155833675d0
SHA1c5d8a91c287100b4fe000328e838a442380efed0
SHA2567441d0da025a83eb86b2311e1d4eba38dabcdc4d77ba48942bd0b8318e1cd4a0
SHA5120d2e17273a0222b9779ad33af67c33dc98e6a1917e5926ab5c44daa037698f169d1645380f46300d028303a9692d894210ae9b5c04e720fd535768c314e70c45
-
Filesize
32KB
MD5ff0df20aebaf00c240e35f3c6b3957ec
SHA1651f9c7a07b9f8b960e7ded63930e6e28b82b3f8
SHA2560397e50962c0459763242b1b1334a5e3fb923f693fbeb47a5a837ede9ab207bb
SHA51270de52de0f30a327b22d0d9a1d081369f1fc50cefc9b00d1c70c6919271e878b5d7d2d2fe824e81f418e7454c531956d875149827f31d8f4aeca779f2e485afa
-
Filesize
235KB
MD5f022d704d6a78d750895a61fa69ac1c0
SHA11cd6a0036b9b623372a3cc265cf498bdb6a992a8
SHA256c9aa8e6cc76da1ba13bb15864e57ccce2ea5f191245f3289a15a6df22a4f6c77
SHA512c228a1db499b7eaea173da79b87b95ba3d06664958d8e03ac6f95379732c22ccca25557c1247e2ae0d915fad34ee08103d8d7d0dee14edea331074348474d646
-
Filesize
14KB
MD5db00354a2702c30e10247ec3409494ed
SHA1e08194ec9f17cbc43f2fba1462feed2f89dd1550
SHA256dfd3e39fdb8c41e7b58bc6138a3773186bfc0bb2b65c555e66292603f032acd5
SHA51278af980cad7b2af08d261f42e2ed7191556f5c66de16246db82cee4391af644018a9ea8efe33ca390821b09c00ff9e150dc9bccfeb70991b0dba1cb72d38b511
-
Filesize
226KB
MD51559c7c688a29ee1fbc80447c10bb7d7
SHA1770fd8c753c5f5bca3001a6a5d132504f29bbcd7
SHA256bf50960f0a97170ac60526811496d5f47fb73e6d94962a4d624fdaa5669ed645
SHA512cdbb1dea45137051c156e05d698c018e5253f3ca48f4c9d637948594180431c33fc08f879549fd1a8f1fa38837c2cca4b540c15f2701cafb9284bf31c88f6e94