Overview
overview
10Static
static
30237b61e61...e4.exe
windows7-x64
30237b61e61...e4.exe
windows10-2004-x64
100cbf9c5b59...f9.exe
windows10-2004-x64
100edb945c8d...dd.exe
windows10-2004-x64
1013ca0bbb32...3f.exe
windows10-2004-x64
101465a638f9...f2.exe
windows10-2004-x64
101b0729839d...dd.exe
windows10-2004-x64
1027bf431b08...9f.exe
windows10-2004-x64
1034b8fdeeaf...27.exe
windows10-2004-x64
10488c7cb3b3...18.exe
windows10-2004-x64
104bc64c0375...75.exe
windows10-2004-x64
104f85c3e4ec...fe.exe
windows10-2004-x64
1055b18033bb...53.exe
windows7-x64
355b18033bb...53.exe
windows10-2004-x64
1060e7e1ac00...07.exe
windows10-2004-x64
10979a97cb16...99.exe
windows10-2004-x64
10b3eb736a5d...9f.exe
windows10-2004-x64
10d57352b171...d0.exe
windows10-2004-x64
10d62f03a558...b6.exe
windows10-2004-x64
10e72a6e51db...6d.exe
windows10-2004-x64
10f5c9c18cca...6b.exe
windows10-2004-x64
10fdb9b25099...78.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 12:56
Static task
static1
Behavioral task
behavioral1
Sample
0237b61e61fe845c052d94e1696f694fd1c69b55134971372a39facd025272e4.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0237b61e61fe845c052d94e1696f694fd1c69b55134971372a39facd025272e4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
0cbf9c5b5986e5ea6119fe8fc3da31af9c240982a4a7cfed5ca9fb56c4d768f9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
13ca0bbb3221adeaf830fc435756121e64e03f342fec62e30bcd13f7d5c1083f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
1465a638f9237c41616fc372bd66b6e66553baab8af20a969337be53108abaf2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
1b0729839d14f565e8de6c35f683e4cf6c401cc652ea06fe9d0da0c95e9abadd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
27bf431b08d40bcbf5b763154e97f70f0745d6072ffe1d77d49e6cc8d3181c9f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
34b8fdeeafe15c31ab10314949d8d534bca5cfd6995d47dbab8b3506a2847a27.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
488c7cb3b3ae680032b59617bf38fb807c934eab7717cda13ee71996311ea718.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
4bc64c0375f3ffea0f45741a1f4ed6af4f66e8f13084960da4aeb003e9f45675.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
4f85c3e4ec4db9780db30f402a82cf4f34e6d0a934cf7eb35d8bdb58e46d06fe.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
55b18033bb16a6ebd933d4b24c7828c19ea0ec0937cbb06be066053c204d9753.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
55b18033bb16a6ebd933d4b24c7828c19ea0ec0937cbb06be066053c204d9753.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
60e7e1ac00410438a148bcba6a92dbac02c94531491c577d988a49e9c281cf07.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
979a97cb16762728856ff5dd929cb625d1673048544e092731742005342da799.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
b3eb736a5d62ca99c3bb61ab1572ce044dd3f3d33a0f83509bfc2cb1204b0b9f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
d57352b17144065c6fd05a0807532115ba9622e99b096ac4432dd312359b06d0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
d62f03a5584e3ca2265a79bdd4e0fb0add3d0412b01568178f46f8dcecf881b6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
e72a6e51dbac1e6313459eab1ffc1832d973b0fd23fe10aba5acdee9ba028f6d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f5c9c18ccaa6f832b0b5e79345b5442c799774303bf84ea96f45d3c21b2a1f6b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
fdb9b250992b8c5988cfe05d255d96db5dd1d7a3ac4959de26b8546038f10c78.exe
Resource
win10v2004-20240508-en
General
-
Target
1465a638f9237c41616fc372bd66b6e66553baab8af20a969337be53108abaf2.exe
-
Size
4.3MB
-
MD5
071f8bfffa76377293c3846706a9eee9
-
SHA1
fb8a1393c2c7c9e3adb21930e10633605c028a2d
-
SHA256
1465a638f9237c41616fc372bd66b6e66553baab8af20a969337be53108abaf2
-
SHA512
84d21135d1410597037321ce8434a27dee3878e4b3992ca2ae3837c0b1715f021aec3e5a42a00e2ae019b917c631b87bcd08844b672e3669f0c0c55b71789b4f
-
SSDEEP
98304:tIOMcwQObrql/9CpTxJJphqC3vKfOlk36VncyH7kuK2OFVa:tIUfObrQ/kX8euKk36VnH62
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 2Xd7831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2Xd7831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2Xd7831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2Xd7831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2Xd7831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2Xd7831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" 2Xd7831.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 2Xd7831.exe -
Executes dropped EXE 5 IoCs
pid Process 3732 Jo6pN03.exe 2928 HX6eg45.exe 2772 Aq8fa68.exe 2904 1aF72hB0.exe 4524 2Xd7831.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 2Xd7831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2Xd7831.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" HX6eg45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Aq8fa68.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 2Xd7831.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1465a638f9237c41616fc372bd66b6e66553baab8af20a969337be53108abaf2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Jo6pN03.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral6/files/0x00080000000233bd-27.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 4524 2Xd7831.exe 4524 2Xd7831.exe 4524 2Xd7831.exe 4524 2Xd7831.exe 4524 2Xd7831.exe 4524 2Xd7831.exe 4524 2Xd7831.exe 4524 2Xd7831.exe 4524 2Xd7831.exe 4524 2Xd7831.exe 4524 2Xd7831.exe 4524 2Xd7831.exe 4524 2Xd7831.exe 4524 2Xd7831.exe 4524 2Xd7831.exe 4524 2Xd7831.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 784 schtasks.exe 3988 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4656 msedge.exe 4656 msedge.exe 2368 powershell.exe 2368 powershell.exe 2368 powershell.exe 2392 identity_helper.exe 2392 identity_helper.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4524 2Xd7831.exe Token: SeDebugPrivilege 2368 powershell.exe Token: 33 1500 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1500 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2904 1aF72hB0.exe 2904 1aF72hB0.exe 2904 1aF72hB0.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 2904 1aF72hB0.exe 2904 1aF72hB0.exe 2904 1aF72hB0.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4524 2Xd7831.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4248 wrote to memory of 3732 4248 1465a638f9237c41616fc372bd66b6e66553baab8af20a969337be53108abaf2.exe 80 PID 4248 wrote to memory of 3732 4248 1465a638f9237c41616fc372bd66b6e66553baab8af20a969337be53108abaf2.exe 80 PID 4248 wrote to memory of 3732 4248 1465a638f9237c41616fc372bd66b6e66553baab8af20a969337be53108abaf2.exe 80 PID 3732 wrote to memory of 2928 3732 Jo6pN03.exe 81 PID 3732 wrote to memory of 2928 3732 Jo6pN03.exe 81 PID 3732 wrote to memory of 2928 3732 Jo6pN03.exe 81 PID 2928 wrote to memory of 2772 2928 HX6eg45.exe 82 PID 2928 wrote to memory of 2772 2928 HX6eg45.exe 82 PID 2928 wrote to memory of 2772 2928 HX6eg45.exe 82 PID 2772 wrote to memory of 2904 2772 Aq8fa68.exe 83 PID 2772 wrote to memory of 2904 2772 Aq8fa68.exe 83 PID 2772 wrote to memory of 2904 2772 Aq8fa68.exe 83 PID 2904 wrote to memory of 4656 2904 1aF72hB0.exe 84 PID 2904 wrote to memory of 4656 2904 1aF72hB0.exe 84 PID 4656 wrote to memory of 392 4656 msedge.exe 86 PID 4656 wrote to memory of 392 4656 msedge.exe 86 PID 2772 wrote to memory of 4524 2772 Aq8fa68.exe 87 PID 2772 wrote to memory of 4524 2772 Aq8fa68.exe 87 PID 2772 wrote to memory of 4524 2772 Aq8fa68.exe 87 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 2488 4656 msedge.exe 89 PID 4656 wrote to memory of 4812 4656 msedge.exe 90 PID 4656 wrote to memory of 4812 4656 msedge.exe 90 PID 4656 wrote to memory of 3752 4656 msedge.exe 91 PID 4656 wrote to memory of 3752 4656 msedge.exe 91 PID 4656 wrote to memory of 3752 4656 msedge.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1465a638f9237c41616fc372bd66b6e66553baab8af20a969337be53108abaf2.exe"C:\Users\Admin\AppData\Local\Temp\1465a638f9237c41616fc372bd66b6e66553baab8af20a969337be53108abaf2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jo6pN03.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jo6pN03.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\HX6eg45.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\HX6eg45.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Aq8fa68.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Aq8fa68.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1aF72hB0.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1aF72hB0.exe5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/6⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff8b25946f8,0x7ff8b2594708,0x7ff8b25947187⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,2432991609431011302,12372630432377092271,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:27⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,2432991609431011302,12372630432377092271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,2432991609431011302,12372630432377092271,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:87⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,2432991609431011302,12372630432377092271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:17⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,2432991609431011302,12372630432377092271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:17⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,2432991609431011302,12372630432377092271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:17⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,2432991609431011302,12372630432377092271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4420 /prefetch:17⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1976,2432991609431011302,12372630432377092271,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5312 /prefetch:87⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1976,2432991609431011302,12372630432377092271,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5440 /prefetch:87⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,2432991609431011302,12372630432377092271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:87⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,2432991609431011302,12372630432377092271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:87⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,2432991609431011302,12372630432377092271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:17⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,2432991609431011302,12372630432377092271,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:17⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,2432991609431011302,12372630432377092271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:17⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,2432991609431011302,12372630432377092271,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:17⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,2432991609431011302,12372630432377092271,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4364 /prefetch:27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Xd7831.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Xd7831.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Drops startup file
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4524 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST6⤵PID:3296
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:784
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST6⤵PID:1512
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:3988
-
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1940
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x314 0x4ac1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2036
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5bec84d009f631cde399054b3929423e4
SHA1ca1c1fe9a348e5ee20ec70c58af21da23fc2c6f2
SHA2563333389ec9a1089ebe18f9747ea4c61e4b7b3bb4a7b0f9c8453d438ed5fcc04b
SHA512de3f86a6a83d025703a1918f8c4e7b3f653e8cf739f3d1f92f55f8038bc2443a8050c896018fd407e7ba3793d33ea52b9e3f0de40ce7d28da9bc7d2a28c82d27
-
Filesize
2KB
MD5013532cc3a9ec9a6e1644e26007368fe
SHA174bbf0e69dfe28c75267eaeb83fea119aec020d0
SHA2561fedef00bba9ef4eaefee3d5705cf68c40f4ffc9c7a01920cbc2b8ed5b6e4c00
SHA512d6edfe1ae90a699523881b771bb8a9b13b2d856f26aa0be54194cd42fd4d2e1364a79fe7be07d300ff672714f79dee1ce3a9a89ff1478f270ce76b8e0b04b979
-
Filesize
2KB
MD5d2f875b3c03ef275fa17ca84bea5fefb
SHA14d59304ddd57c815b18fceb22b6bda77956d94a8
SHA256a5f8a750ee1d4185689b4d4b2f84e53ceeb2481eade53153ad8c75bad7dc0ca5
SHA51246a24f2d3f446fb12975a4e7c1b4699bfa422449c11a8572f0bbedd82c657ccd79a9ecafe9254438eb25bf25a343e5f933ff14dc37267450c6ed911febad91ed
-
Filesize
6KB
MD550600b8a49510758d34d39935c3ef1b0
SHA1972f84f3f03ea158e5b127f2715274f56c4e773c
SHA256180b75f0207847332b51621f5319dd9955cf18a62729d64d84e1d86fd61cfeac
SHA512d53a432432775df261f150cc7be60b3248e4cdf09819b5594cea1203eeb1658d4d0f4ce7d27e21f4b21344d3b2eb5974d6a70eeeffb637e4c2ec630844ef735f
-
Filesize
6KB
MD5003f17beaafbf2d452cd97170734b68d
SHA11046dc1a58983becee4e3f32cae6ce0f5b581efa
SHA25689ea632fb4a8d136801efc988a1d7595cb95c1e43aadde14de2cec01175d61a6
SHA512f55c0a1ed816c222bcef46bc14b06a0d012c73eb8624d89a9ba545182eaef3e94a2bf7ec9035de2559b316cb60de9891be7d1ae9322ad18df3143d157941a5cb
-
Filesize
6KB
MD5db0e462fc99f3a52258cda2e82205057
SHA15860d0d28507e4daf5045863261238832b412aef
SHA2561b8d6c09a72f48ef994d5c64f9f537877697406e1605680ba11b4a196367078f
SHA5129c066ba1879220e4773e41ae29468a0b2e881c086d2b2923d53f3183a806341a55eb9c118188512b27fc7af7921d14c2f757a8221d525eb2f11b0e86a611fe09
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\08475ca1-4bfa-4c8c-b9af-19b39169f027\index-dir\the-real-index
Filesize2KB
MD55f6b6d5d1ac66ce1b9f8fc36d41d25e3
SHA136892e3c7a7d3db5bdd00f39a16f8dda10b75917
SHA25661b7601ac10fd10ce7f2bfac43e965e5af03b343ec4952ec0038914c9feceda4
SHA512d7f30891da3c8e9a10b57dee8f4d1985d9835c404513d880012458bbeb07559386455d8b136b803fa4561aa496e548ef952370ce993462ff8cbdc24581a29647
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\08475ca1-4bfa-4c8c-b9af-19b39169f027\index-dir\the-real-index~RFe57a2c8.TMP
Filesize48B
MD5e59f74819cb71506d15e0fb8792f4b06
SHA1641342c23433ab8c1a5f2b574a6ae50c484fbc03
SHA256b29cc85011a6ccd7714894c3aa2ae0b68ead649970de2ec75ef724a9bd0ecd64
SHA51201259628997366c435ed86b69d13e68f85ba4c05ce4255895338a3f75d4c6d0f5ee68456069d79f048721ab768ebb6e466d90c63fe056661e99f79524c8cf64b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD54e8cd9305411249ee8ff7095bfea7245
SHA19f25f2b098687400a5ffa85c43484ee26e0b796f
SHA256c70db5d9e30a1e247e290c80af99591fa92911fabdc1a4f88ec01bd519ff64e2
SHA512ef24f2119bbe548407a086e5820108d0222fde9989002f8606ec7ebc5e501da70dc32b566e0bc47432da18dcbbdc4fd44e4356167a245d995595f62171db616d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD56dffc8427840d3e85b6300f888fe820d
SHA19904aeadfadd27706db21cd8fbebd88103d0e93f
SHA256e0b3866e274728d98feaf02a4955d5fdd40e4848a3123f7b2ec6b82ffd403cff
SHA51221a3fad070aaf27c56fa339196557afb047ee647ffdb44fbab6019b71840f5397199d1e41d09322d7ea64a33ff89335a4dfe8b1124f6478d94a81cd09ebb90fb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize84B
MD52498d630e0241a403219fdce2e8e7c67
SHA1fd4ae3d53b3f6f60efc241ba98f82d15d172cbb6
SHA2564e251f5b564bb48c942d5558b12365d4479df270059e1ac99b11c336bcdccd5d
SHA5126e395d0cc709344f58d6eba8fc8a2d7374a51722edf6117f8817895fcffa029358bf2d138e1b5962a51310ef6bb79eb2dae3f1ac68bda2b53093613db208617f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD5c7fd5f4f0a3610cb24e37e126e99d5aa
SHA17986477588804dd7b2b9455d76f76e85530b6948
SHA2566ebf4c28a0e671761158c3df188b2148e9c1640055cc9ec31b823a64a11cc5bd
SHA512f1d98746b0b006d2c6ab1cc40230a3414e21687be95d4765fbd3bc6cdb735538ab7166166b15090ab3f8c233d123e45c7925c91663aeb0cc956d1e4cfcf6befa
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5b731579186b5f1ff699f58a68d432f40
SHA101c70bf7c61bdab850c87a0aa30ebcbcedec4a24
SHA256ac827da67df2411bd07397cf49c75f7bbad93dcde4e97999a6b312dd41146381
SHA512a8b1f1cc31df71b76ac00770e98402b9a0360536ed62fa96478c8d88a9dbaacfbe6e6cac614f3a5386a50a5818ff0bb695b930fd4607f2063d2dcdbc757d038c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe579ac9.TMP
Filesize48B
MD58f7bd65f5213c5f180bd9b5a9ac1c954
SHA1acee79bb4f0838c214eff10a514518b5a696defd
SHA2564dc8707973dd431ed70daa3e383a2a5fe7493b7907077ba1b400fce0df17254c
SHA5121e9c7b455546daaabdcf3b36dd7ffe3c2d7306444e725cbd93fdf0b694f428f1f82131369c80c38929c47e1b2dd173cb9d65bb240bc0ef11fe3e202c8ede6102
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5c495a39e8c57de0826093295276739c5
SHA15806dadd89ad6ad86a28074a32e6ad3bfb67ae30
SHA256b356e8d372df2a435eb4a558dbed94b42720c10a3b090bb91ea9638606f369fe
SHA5121b68b4edbdce1b393e1f46f8e28a22756ce554a6137851ab1a582572d4d84d0aa6b41d7ea7120982da1d52d7d8950195f41d48a25e392d366534941d792bde81
-
Filesize
3.8MB
MD58f20f82e55f613e3387d8a4393d84415
SHA11fbb59f002e77b5608e555d5fb856ec649a94128
SHA256fa130ffbae77f393b8c3761880769505ffbb2fe708e7fc375f0bf42732542b7e
SHA5123596ff1cd6012bc0c3f6a8f928dc124499b2c64406ae8e99d994e84c6f8e817869adb3c23a1ca221a418521dbba2592bef264c43514a0dbab794d69b57af3f4d
-
Filesize
2.4MB
MD5b56c9c48c9be9fe4136433ba42ff386b
SHA1ca41a545b363d093d54478164341a674d14fc20e
SHA2566547f1c95bc0b060cd5e5f6b8e5e968b730cd21f758f6dd5371e802b13a5a1de
SHA512cd0d1d2515ddfa2f82c0a231ac628087ec07e12ae18f16725c8c00f143e42babbdf6fdaa364c3a73995b11c500229ed2b80fb0b49ee9c053b27d00c0318b30f4
-
Filesize
2.0MB
MD5e1ca89e321f8198d4253c9178eb523ff
SHA1fe072ee589998082c37b054c4d8e4f0a6aa4eeb7
SHA2563e36cb02ee15f0803929c4cc4ae0639ce652b40ae83519e020dc3e5273dde39a
SHA512af0d2629e4fce28b141f77762d351ff64c64fc965b9fd51bad073948841c6ea19655e34a7d1aed30837c67cac6e0e5f8af52e9eca07d58a77fdf3d213cd59f2d
-
Filesize
894KB
MD53e82adb682d9d441331dde8a3c888f6e
SHA16dc1fe6731402b85d721946e65559a375878a3e1
SHA2564b87018ae58796055ba9ae76bc21519c1e51f7dcfa79344b27047efec6d9d666
SHA512f346d6eea780ae0cf5faf8fcbb7815a0c461de710a013ac5106c9eaad31dd778765c8709550911921653a13c3e94e5d860b472a671944b51edfa840c019ccca7
-
Filesize
1.5MB
MD5fb69bac77dd5e98885e6caea73271736
SHA151ad255e0b6ffe879375c4cda30f8791a13e1c55
SHA256302f18643a0476b96ae334230de72d315f753902124fbb9b97d73d73941eed7e
SHA5123558688f41a573793d4d717316b1243d1371bb02f7f2c41a5156c60fdbc66a38ab36ce0f3c57f6fb4f4da5b546b6f18eff663d5647829432c02ce2693f856716
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82