Overview
overview
10Static
static
3131b47af99...32.exe
windows10-2004-x64
10227ab56ef5...eb.exe
windows10-2004-x64
104537f51b0d...4c.exe
windows10-2004-x64
104852dcede8...5b.exe
windows7-x64
104852dcede8...5b.exe
windows10-2004-x64
104d68d381e4...34.exe
windows10-2004-x64
1062d27d23e1...d0.exe
windows10-2004-x64
106f4e5c3b3a...2b.exe
windows10-2004-x64
10775b7a0479...3d.exe
windows10-2004-x64
1080a8dab579...f7.exe
windows10-2004-x64
10a28852a355...af.exe
windows10-2004-x64
7d02a87f385...3a.exe
windows10-2004-x64
10d0c1074be1...1f.exe
windows10-2004-x64
10d427832084...e1.exe
windows10-2004-x64
10d53f5a64de...d1.exe
windows10-2004-x64
10d62198c81d...0d.exe
windows10-2004-x64
10dd0f820c33...a3.exe
windows10-2004-x64
10e3c377dc6b...f7.exe
windows10-2004-x64
10e9172c1691...86.exe
windows10-2004-x64
10f6c86e8cbc...da.exe
windows10-2004-x64
10fbd8d72f7e...0c.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 08:34
Static task
static1
Behavioral task
behavioral1
Sample
131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
227ab56ef5937ce1494f5b0cd787a052c624e8a674162dba77f9c8d6aebfbceb.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
4537f51b0d234db42162223f94f6617d6df0e7eb077362a4b5249ab8da1e684c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
6f4e5c3b3a8de995cf390c778532164b570dcf1ea9c58ab8797a7cc16a674a2b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
775b7a04793f8621742cc362f51bef7b4d75b10169fa3493b7c9f713d38fa73d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
80a8dab5792d1a02e87ec84b22f15eb4bbac6d7635c605250fb1379296e8ccf7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a28852a355422f5e5dba04ddfb954e654687e210441a284402775d3dbb8392af.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
d02a87f385dee50b4399336265bbf8fe7f692201914bcb50c64ca95a35707f3a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
d4278320848f0e71f678149e0b9ee4ecac3b5305400ae7d69a7131364d60cae1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
d53f5a64de740270c801f8951781be9743b4ec40b8b353271cb0cbf0a4c8b8d1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
e3c377dc6b3cceb0b4ae2fa0504de53fe1dad61a6bb656af0994220dfea6bdf7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
f6c86e8cbc27556d873bb54eaa4778cf8529fe90df5c8b3070e8ed040254afda.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
fbd8d72f7e8046c650efa73c6d984945abfe9952bd8f67360b4658fc5138e70c.exe
Resource
win10v2004-20240508-en
General
-
Target
d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe
-
Size
1.1MB
-
MD5
49d567d32dd0c1e1e61bf5e848c46345
-
SHA1
84a6f4f0b064e024c714d235de7ad29e60831730
-
SHA256
d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f
-
SHA512
d6e6e2ad69dc513fdf17b0502fa97f9fd269cb6269743050e4b3768a2b34cd52fbc7c852c6a6a3a00f912d5c2c6b17ed40f7f63583f3f370b74e9257bc2b74df
-
SSDEEP
24576:Gy+DubI6MnVbrroOWonnRie4FLFyHm9M6Scvr:VUQI6M93oOWEnRie2LFom9Mb
Malware Config
Extracted
redline
magia
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral13/memory/2620-63-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral13/memory/2620-66-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral13/memory/2620-64-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1Xf12sO2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1Xf12sO2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1Xf12sO2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1Xf12sO2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1Xf12sO2.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1Xf12sO2.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral13/memory/3172-74-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 5cc3Lj3.exe -
Executes dropped EXE 8 IoCs
pid Process 3684 Iw4gF55.exe 1052 Nq2tO87.exe 3504 Vp5nv55.exe 2892 1Xf12sO2.exe 3932 2VQ3223.exe 4600 3Ub46bc.exe 5036 4Ks824nY.exe 1940 5cc3Lj3.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1Xf12sO2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1Xf12sO2.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Iw4gF55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Nq2tO87.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Vp5nv55.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3932 set thread context of 2620 3932 2VQ3223.exe 97 PID 4600 set thread context of 3692 4600 3Ub46bc.exe 102 PID 5036 set thread context of 3172 5036 4Ks824nY.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1932 3932 WerFault.exe 96 4772 4600 WerFault.exe 101 676 5036 WerFault.exe 105 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2892 1Xf12sO2.exe 2892 1Xf12sO2.exe 4520 msedge.exe 4520 msedge.exe 1688 msedge.exe 1688 msedge.exe 3884 msedge.exe 3884 msedge.exe 4556 identity_helper.exe 4556 identity_helper.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2892 1Xf12sO2.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1252 wrote to memory of 3684 1252 d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe 82 PID 1252 wrote to memory of 3684 1252 d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe 82 PID 1252 wrote to memory of 3684 1252 d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe 82 PID 3684 wrote to memory of 1052 3684 Iw4gF55.exe 83 PID 3684 wrote to memory of 1052 3684 Iw4gF55.exe 83 PID 3684 wrote to memory of 1052 3684 Iw4gF55.exe 83 PID 1052 wrote to memory of 3504 1052 Nq2tO87.exe 84 PID 1052 wrote to memory of 3504 1052 Nq2tO87.exe 84 PID 1052 wrote to memory of 3504 1052 Nq2tO87.exe 84 PID 3504 wrote to memory of 2892 3504 Vp5nv55.exe 86 PID 3504 wrote to memory of 2892 3504 Vp5nv55.exe 86 PID 3504 wrote to memory of 2892 3504 Vp5nv55.exe 86 PID 3504 wrote to memory of 3932 3504 Vp5nv55.exe 96 PID 3504 wrote to memory of 3932 3504 Vp5nv55.exe 96 PID 3504 wrote to memory of 3932 3504 Vp5nv55.exe 96 PID 3932 wrote to memory of 2620 3932 2VQ3223.exe 97 PID 3932 wrote to memory of 2620 3932 2VQ3223.exe 97 PID 3932 wrote to memory of 2620 3932 2VQ3223.exe 97 PID 3932 wrote to memory of 2620 3932 2VQ3223.exe 97 PID 3932 wrote to memory of 2620 3932 2VQ3223.exe 97 PID 3932 wrote to memory of 2620 3932 2VQ3223.exe 97 PID 3932 wrote to memory of 2620 3932 2VQ3223.exe 97 PID 3932 wrote to memory of 2620 3932 2VQ3223.exe 97 PID 3932 wrote to memory of 2620 3932 2VQ3223.exe 97 PID 3932 wrote to memory of 2620 3932 2VQ3223.exe 97 PID 1052 wrote to memory of 4600 1052 Nq2tO87.exe 101 PID 1052 wrote to memory of 4600 1052 Nq2tO87.exe 101 PID 1052 wrote to memory of 4600 1052 Nq2tO87.exe 101 PID 4600 wrote to memory of 3692 4600 3Ub46bc.exe 102 PID 4600 wrote to memory of 3692 4600 3Ub46bc.exe 102 PID 4600 wrote to memory of 3692 4600 3Ub46bc.exe 102 PID 4600 wrote to memory of 3692 4600 3Ub46bc.exe 102 PID 4600 wrote to memory of 3692 4600 3Ub46bc.exe 102 PID 4600 wrote to memory of 3692 4600 3Ub46bc.exe 102 PID 3684 wrote to memory of 5036 3684 Iw4gF55.exe 105 PID 3684 wrote to memory of 5036 3684 Iw4gF55.exe 105 PID 3684 wrote to memory of 5036 3684 Iw4gF55.exe 105 PID 5036 wrote to memory of 3720 5036 4Ks824nY.exe 106 PID 5036 wrote to memory of 3720 5036 4Ks824nY.exe 106 PID 5036 wrote to memory of 3720 5036 4Ks824nY.exe 106 PID 5036 wrote to memory of 3172 5036 4Ks824nY.exe 107 PID 5036 wrote to memory of 3172 5036 4Ks824nY.exe 107 PID 5036 wrote to memory of 3172 5036 4Ks824nY.exe 107 PID 5036 wrote to memory of 3172 5036 4Ks824nY.exe 107 PID 5036 wrote to memory of 3172 5036 4Ks824nY.exe 107 PID 5036 wrote to memory of 3172 5036 4Ks824nY.exe 107 PID 5036 wrote to memory of 3172 5036 4Ks824nY.exe 107 PID 5036 wrote to memory of 3172 5036 4Ks824nY.exe 107 PID 1252 wrote to memory of 1940 1252 d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe 110 PID 1252 wrote to memory of 1940 1252 d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe 110 PID 1252 wrote to memory of 1940 1252 d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe 110 PID 1940 wrote to memory of 4268 1940 5cc3Lj3.exe 111 PID 1940 wrote to memory of 4268 1940 5cc3Lj3.exe 111 PID 4268 wrote to memory of 3884 4268 cmd.exe 114 PID 4268 wrote to memory of 3884 4268 cmd.exe 114 PID 3884 wrote to memory of 536 3884 msedge.exe 115 PID 3884 wrote to memory of 536 3884 msedge.exe 115 PID 4268 wrote to memory of 1056 4268 cmd.exe 116 PID 4268 wrote to memory of 1056 4268 cmd.exe 116 PID 1056 wrote to memory of 4792 1056 msedge.exe 117 PID 1056 wrote to memory of 4792 1056 msedge.exe 117 PID 3884 wrote to memory of 5056 3884 msedge.exe 118 PID 3884 wrote to memory of 5056 3884 msedge.exe 118 PID 3884 wrote to memory of 5056 3884 msedge.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe"C:\Users\Admin\AppData\Local\Temp\d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Iw4gF55.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Iw4gF55.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nq2tO87.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nq2tO87.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vp5nv55.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vp5nv55.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xf12sO2.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xf12sO2.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2VQ3223.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2VQ3223.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 5766⤵
- Program crash
PID:1932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Ub46bc.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Ub46bc.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Checks SCSI registry key(s)
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 5405⤵
- Program crash
PID:4772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Ks824nY.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Ks824nY.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3720
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 5924⤵
- Program crash
PID:676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5cc3Lj3.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5cc3Lj3.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\79F3.tmp\79F4.tmp\79F5.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5cc3Lj3.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x170,0x174,0x178,0x14c,0x17c,0x7fff4b6546f8,0x7fff4b654708,0x7fff4b6547185⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:25⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:85⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:15⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:15⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:15⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:85⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:15⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:15⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:15⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:15⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1844 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7fff4b6546f8,0x7fff4b654708,0x7fff4b6547185⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10388855297788859711,3346942226376907017,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:25⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,10388855297788859711,3346942226376907017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3932 -ip 39321⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4600 -ip 46001⤵PID:2024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5036 -ip 50361⤵PID:848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3516
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD536703835f0f84d4146f8371910b807af
SHA1183615abdc63dd6dd0768c9bbe07976a671b7ee7
SHA256fcb04bf2cc79fcce7d8fc265d0095fa64725178518dabcd9af5ac6acb3a28246
SHA512fd5d1e5377c396e2ee60e83674bca3874723f861286aa37752b74014edcac95eed2d63673749768eef71678d3c9baf75a162922206883ba50a29069151da7b7c
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD589c1b63d5ced2a8c19ece254e54df33f
SHA17a6f083986bfa3f24ad41f97d20e468fca6c60cf
SHA256b0fa466a6725bccd51c870e77046932849c8fffcef62b37e8a8b771aca9ea1f0
SHA5123f627edde0be38c7008eef44b071d7b4499aea87d4fc1bfc7dc05efeda334638bce6154eada90d9bba953476df3f9b8352ced87e47f7eea849195e3b4601d5c3
-
Filesize
1KB
MD5efce9460007935a1abb0f7321a5a153a
SHA1aa84a60687da28fcbda34775c70753bdd4fd28ee
SHA2569ade0073271fa62d517c15c80c8571fe7a83d0824e5928918c35425164da1748
SHA512c6a3bd74b42b547d8879162b23dbe0f546b61e4b0de6c7f344b8b64f159504269356467a39ce63991fd7592ca90a41207f9a792ad40d85c98640142ea99f4b61
-
Filesize
1KB
MD5ed28601c0e0f7aa2ab8c89a00d08caa0
SHA1de2c71f5cc35ae083539c1c65f0109872035c788
SHA25602275eee2e1ffe7cdf129abf346475a54661a1fe9d2d6a7badc267138653dc64
SHA512f253ce2c81368d244128041fd97c1efdace4116f05db140633ba1d37aef8a0b7b700279b41c3406e578e5513efa47f1a4f84738672fffb9b0abba1b690caaded
-
Filesize
5KB
MD526775f19ed2380646e97614b4d684b7b
SHA1e6381f74ee9156178e835ca625928aebb3510348
SHA2562957dd93c80ea84d883a84127aecc2bec4af7e8e825ab60d82b3dfb97e9dd6e2
SHA512b7984ee74f756c51cf1d4acf8e6e2a326fddc88f9a7896000e5ee23e7d2ccbe67a719a1e045f4d99b345d9f82953424ebf18bdfa3a2a8cfc04e647dde0734845
-
Filesize
7KB
MD52b75e9a61089c897a1c7a87d6d230bb8
SHA199d2b214e0cf4563eb807ece0e7942fe30ee0c51
SHA2565c6e16777fa40dcfdb47bb0930b6cea91b1392a8e78bd12a221c39f090a7b982
SHA512f6e14643a643ef89c084e29f36fd545d8db3448c920ca06d329a2ba2c20ea8f7c14103ff303ddf265d8db5d9a85977ba838bd72a0fa91705c2e9eb2b7fca5bbe
-
Filesize
872B
MD50ce2e48b6ffaaf491135aef259af1134
SHA1375644c0f0a9b2d68671e98a7860870ae34567e9
SHA256653a1f1d6c552343b7bc311d7351c6a68ab41aad1ed62e2ae220715a30bb0d57
SHA512b62194114bf47202a234339d550988ba4b1fd0519f5fa846dcec5b1aa03f3e86a421a3f024d283172a450aee332e77939977ab038cade70dd8c329b8ed5cc276
-
Filesize
872B
MD50ebb9593939c8b0c271e334b41dab1e4
SHA1dba2a5509af402b5de878fcf58d68ca4d1cb7106
SHA25604c1ab1ff5a27d51d679a9d66ab5f541e434ecb69e3008d052b27904ba8ea9ef
SHA512295770923e0153552e9014961b710d85cf9dbf64bc68b915b638f220f5e28dff3a6a6dcd5f9ea979e176c4e5d5bd1cf28d63895f79755821beb16fb00f4d4286
-
Filesize
872B
MD5c255161ea989f8527641ff2abcd1234d
SHA1c26a1d3c5559c9dcf8f38021f888e638db9556cc
SHA25664991aa6ba58896bc6659f29ccb330457c1560ab6fc4bfd534e27de735f2403c
SHA51267dae462e2dcb8e0502ae1e9509ef65d7f8dd4f3fc5abb834e098d62834d56f3824ebb8022c4d3b1a9196b83fc01e59aa40f377823cde104469237a3c766def8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50138678b4eb5dd7d2b7fe3a1ce2b8ec7
SHA194cf5600b00e2238f4d8efeb30510803a93365a0
SHA2560ace6816c99ab683f51e0a5f28051207668db1f514bb92f15ef91da3a4567ddd
SHA51267b5826ecbfbad7329e20b9218d6394186b430bc112190b11b0beea3c2b822ffec127a45c81312878e178b5026140da463da41af12462d697791d8341bbb006c
-
Filesize
90B
MD55a115a88ca30a9f57fdbb545490c2043
SHA167e90f37fc4c1ada2745052c612818588a5595f4
SHA25652c4113e7f308faa933ae6e8ff5d1b955ba62d1edac0eb7c972caa26e1ae4e2d
SHA51217c399dad7b7343d5b16156e4d83de78ff5755d12add358bd2987ed4216dd13d24cfec9ecdb92d9d6723bb1d20d8874c0bad969dbec69eed95beb7a2817eb4fe
-
Filesize
87KB
MD5619ce79c55efb23618d79b2ab8bf61fd
SHA1753b21ff5ca0c9badaa932bf3d476866f23824dc
SHA2561e3ce93557984816776ae8f423c8cd1af00b68dc7ec812d9a14611447d7ee3e2
SHA51246d760ea85497298f7521d03f2c9fee7fa831ea122e5e183a2ca8f64af451274c3e28aa7e8d97ce13c1925d26ad892cbc0e5c9ce65023ec6df8db9ce904322e0
-
Filesize
1022KB
MD5d68a352b054b0bc4f309c79377844027
SHA187c07537a00f0f62d59f880d46984f89514c30e4
SHA256fda90584567040552aaa25b79ef86725e4e500393d703dc71839a01d89f0145d
SHA512c3b638be682ca2bcc8475cb5049b109f1e76629257b4ef4154b554c8c11e91ffc43b0c82f3bf95a38ac8c3dd3d97b2785bc584b4a96d707f63aec0aec52a5a25
-
Filesize
461KB
MD5fc9af8aad670e6faea27dd70ec4bf339
SHA1b3d9e532cbe79381d0ba0a9a8e0086afc1a7c6d3
SHA256bb8c74f99bd09260aa9b4942a992e9489b6e2b3a6300508d4fffae9530538af2
SHA512bd84f4c1bd2b09567cef71c9ef559c3f7ac33f47b249fdfa7dbf4273a810a3f7ea3105263e4bb072ab40ca560ce9d765d06ea36cca2fcddb814cd56906cebd01
-
Filesize
727KB
MD5e3e8b00602efbec6fffe09e809679d32
SHA16e853a7b89df446781d79cfde5e4b60f1a2bb189
SHA256fcf131b7f4a4c17a4cef36f7655e3fb1383e15f4a4d75a21bcf10aa2cd5b73b6
SHA512a0591b3f123d99197bdf74b1a20c2f42771db1021389274590948347b2d86523e84e9afd95113c8df8f42c4630d40898bb920b55fc5f7a5689fa12b7fb90dd8a
-
Filesize
270KB
MD571fefde72d25d474cf288af92c3d058d
SHA1ada09f423d8da8e11d858c20bcd8c1360ef3bf9d
SHA256e2a05d3834b6a325c150cd20fd5659daf5af95c04d9ca34b929eeb891815dc53
SHA5128bc79ad8b5ec399264fa96544c5c201a44902ed43958ae62c3784c7f0cba0e8306b9636e9c40f538c09b2aa104edf64b51f492fa7383330fb004d30fd6a5495f
-
Filesize
482KB
MD52e344f24c04980b4e4978fbfc5995af7
SHA1bfa0ca5a17ac638772edfc69b29841262f4a5e45
SHA256ddbbcc9777cfbc839fa7e22db466863b419b28f7e1543ecf705012925635c989
SHA512e00cf399294792440c146d3d81b88befe800d7a51628e47942d38a86a98cae744903b5c6c69f16d4f918b492d0556eb989e2dd0f12bc86c6a3a9811bdf158a35
-
Filesize
194KB
MD535d718538c3e1346cb4fcf54aaa0f141
SHA1234c0aa0465c27c190a83936e8e3aa3c4b991224
SHA25697e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36
SHA5124bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3
-
Filesize
422KB
MD59e9196e1f884777f5b681af78f4be0c3
SHA1e6db0678dee3f6a3abdc586889bf1d61fca6e3d4
SHA2565170aee76e1ce4d6dbc751f87c07b479663776446561379f235b77fb01e63556
SHA51273653ec9c7d869d12815d677d3376c8a22a94eb5967ec0cd3c6eb88ccf7383066164ee9fe616a94f3841750e1cf642a4fcf37694a81b761c98008a2e20e3bc8f