Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 20:28
Static task
static1
Behavioral task
behavioral1
Sample
da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe
Resource
win11-20240611-en
General
-
Target
da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe
-
Size
1.8MB
-
MD5
babfaa8d0167b8d4752c6972df3d500e
-
SHA1
b5715cb8937f820ca1a92918c730c7acf3477c1b
-
SHA256
da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94
-
SHA512
024f717ad0c7e21151a2f38331076784334f05bbb60d359f19605370d22e4cfe6ed23dfdb1a4d09c7bb08ff4e5766e001df13a8166d000067c4bd60dc932b9cb
-
SSDEEP
24576:9zT3omHfIyXxmb07VY3qmVMqiar35YIgSgK/ia6qo2NDnTcuBnFEnUFOwMyrFRrf:FTYm/IK4KIF9jBFEiMyr3Oyfzy
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
8254624243
e76b71
http://77.91.77.81
-
install_dir
8254624243
-
install_file
axplong.exe
-
strings_key
90049e51fabf09df0d6748e0b271922e
-
url_paths
/Kiru9gu/index.php
Extracted
risepro
77.91.77.66:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 37faa0b749.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eb2e4ada04.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3c584ec583.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 37faa0b749.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3c584ec583.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eb2e4ada04.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 37faa0b749.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3c584ec583.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eb2e4ada04.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation eb2e4ada04.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 37faa0b749.exe -
Executes dropped EXE 13 IoCs
pid Process 1592 explortu.exe 2360 explortu.exe 1552 37faa0b749.exe 1748 axplong.exe 4104 3c584ec583.exe 2892 chromedriver.exe 4300 eb2e4ada04.exe 6288 explortu.exe 2372 axplong.exe 5704 chromedriver.exe 1780 explortu.exe 516 axplong.exe 5876 oidawq.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine 37faa0b749.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine eb2e4ada04.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine 3c584ec583.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine axplong.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3c584ec583.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\3c584ec583.exe" explortu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeDriver = "C:\\Users\\Admin\\AppData\\Roaming\\ChromeDriver.exe" chromedriver.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/4300-5107-0x0000000000660000-0x0000000000BD2000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 3396 da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe 1592 explortu.exe 2360 explortu.exe 1552 37faa0b749.exe 1748 axplong.exe 4104 3c584ec583.exe 4300 eb2e4ada04.exe 6288 explortu.exe 2372 axplong.exe 1780 explortu.exe 516 axplong.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2892 set thread context of 5704 2892 chromedriver.exe 122 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe File created C:\Windows\Tasks\axplong.job 37faa0b749.exe File created C:\Windows\Tasks\Test Task17.job chromedriver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133633889711958783" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2080292272-204036150-2159171770-1000\{788223BC-9BFC-497C-AE16-07976D77C5D0} chrome.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3396 da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe 3396 da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe 1592 explortu.exe 1592 explortu.exe 2360 explortu.exe 2360 explortu.exe 1552 37faa0b749.exe 1552 37faa0b749.exe 1748 axplong.exe 1748 axplong.exe 4104 3c584ec583.exe 4104 3c584ec583.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 1512 chrome.exe 1512 chrome.exe 2372 axplong.exe 2372 axplong.exe 6288 explortu.exe 6288 explortu.exe 1780 explortu.exe 1780 explortu.exe 516 axplong.exe 516 axplong.exe 6980 chrome.exe 6980 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2892 chromedriver.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 4300 eb2e4ada04.exe 1512 chrome.exe 1512 chrome.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe -
Suspicious use of SendNotifyMessage 61 IoCs
pid Process 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe 4300 eb2e4ada04.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3396 wrote to memory of 1592 3396 da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe 85 PID 3396 wrote to memory of 1592 3396 da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe 85 PID 3396 wrote to memory of 1592 3396 da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe 85 PID 1592 wrote to memory of 3960 1592 explortu.exe 91 PID 1592 wrote to memory of 3960 1592 explortu.exe 91 PID 1592 wrote to memory of 3960 1592 explortu.exe 91 PID 1592 wrote to memory of 1552 1592 explortu.exe 93 PID 1592 wrote to memory of 1552 1592 explortu.exe 93 PID 1592 wrote to memory of 1552 1592 explortu.exe 93 PID 1552 wrote to memory of 1748 1552 37faa0b749.exe 95 PID 1552 wrote to memory of 1748 1552 37faa0b749.exe 95 PID 1552 wrote to memory of 1748 1552 37faa0b749.exe 95 PID 1592 wrote to memory of 4104 1592 explortu.exe 96 PID 1592 wrote to memory of 4104 1592 explortu.exe 96 PID 1592 wrote to memory of 4104 1592 explortu.exe 96 PID 1748 wrote to memory of 2892 1748 axplong.exe 98 PID 1748 wrote to memory of 2892 1748 axplong.exe 98 PID 1748 wrote to memory of 2892 1748 axplong.exe 98 PID 1592 wrote to memory of 4300 1592 explortu.exe 99 PID 1592 wrote to memory of 4300 1592 explortu.exe 99 PID 1592 wrote to memory of 4300 1592 explortu.exe 99 PID 4300 wrote to memory of 1512 4300 eb2e4ada04.exe 100 PID 4300 wrote to memory of 1512 4300 eb2e4ada04.exe 100 PID 1512 wrote to memory of 4224 1512 chrome.exe 102 PID 1512 wrote to memory of 4224 1512 chrome.exe 102 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 224 1512 chrome.exe 103 PID 1512 wrote to memory of 972 1512 chrome.exe 104 PID 1512 wrote to memory of 972 1512 chrome.exe 104 PID 1512 wrote to memory of 2968 1512 chrome.exe 105 PID 1512 wrote to memory of 2968 1512 chrome.exe 105 PID 1512 wrote to memory of 2968 1512 chrome.exe 105 PID 1512 wrote to memory of 2968 1512 chrome.exe 105 PID 1512 wrote to memory of 2968 1512 chrome.exe 105 PID 1512 wrote to memory of 2968 1512 chrome.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe"C:\Users\Admin\AppData\Local\Temp\da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:3960
-
-
C:\Users\Admin\1000015002\37faa0b749.exe"C:\Users\Admin\1000015002\37faa0b749.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\1000087001\chromedriver.exe"C:\Users\Admin\AppData\Local\Temp\1000087001\chromedriver.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\1000087001\chromedriver.exe"C:\Users\Admin\AppData\Local\Temp\1000087001\chromedriver.exe"6⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5704
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000016001\3c584ec583.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\3c584ec583.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\1000017001\eb2e4ada04.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\eb2e4ada04.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff949dfab58,0x7ff949dfab68,0x7ff949dfab785⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1912,i,3672558924974045626,11753404157459730964,131072 /prefetch:25⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1912,i,3672558924974045626,11753404157459730964,131072 /prefetch:85⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2112 --field-trial-handle=1912,i,3672558924974045626,11753404157459730964,131072 /prefetch:85⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1912,i,3672558924974045626,11753404157459730964,131072 /prefetch:15⤵PID:5240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1912,i,3672558924974045626,11753404157459730964,131072 /prefetch:15⤵PID:5252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3956 --field-trial-handle=1912,i,3672558924974045626,11753404157459730964,131072 /prefetch:15⤵PID:5844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4404 --field-trial-handle=1912,i,3672558924974045626,11753404157459730964,131072 /prefetch:15⤵PID:5668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4408 --field-trial-handle=1912,i,3672558924974045626,11753404157459730964,131072 /prefetch:85⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1912,i,3672558924974045626,11753404157459730964,131072 /prefetch:85⤵
- Modifies registry class
PID:6120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4972 --field-trial-handle=1912,i,3672558924974045626,11753404157459730964,131072 /prefetch:85⤵PID:5124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1912,i,3672558924974045626,11753404157459730964,131072 /prefetch:85⤵PID:6568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3276 --field-trial-handle=1912,i,3672558924974045626,11753404157459730964,131072 /prefetch:85⤵PID:6296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=848 --field-trial-handle=1912,i,3672558924974045626,11753404157459730964,131072 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:6980
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5968
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6288
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1780
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:516
-
C:\ProgramData\xpjfsb\oidawq.exeC:\ProgramData\xpjfsb\oidawq.exe1⤵
- Executes dropped EXE
PID:5876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5df049ea95b9b735212f34f7f85b5f4a1
SHA179a1b117741c79c3b28389c96ee6a399b95fb4a3
SHA25601527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18
SHA512c35c2bccccc833106fa1003f0fb476395512e7546bebbc28e35b84ced957aa3fb50e9df06340892a53f0488a0bf7b4c788b691dd3790b72f51ddb172e3eab437
-
Filesize
336B
MD5a9e75ee71ea56eb28364dfc4b0d1e2dd
SHA1586ecf6617760344cc8f392373efc78d85b7746f
SHA256ad93755c102933207e60f09dd89eab86d340386c1ddb85a983116ae6bb6e74ed
SHA5126a631af3f1cf54c610b737db4fb60a88088809a4bb71d90bfb1f715c445f44a9f1fffcff80ec2a2dc2da981784ada7fd36f6c2696bbfe8a9fa5736bde408ed4f
-
Filesize
2KB
MD55a44003d9cf4bf7b814098f185b1bae6
SHA1ed43c2bbdc62661967ee462201b706927e9f7dd5
SHA2564b55e246ed886208d259cb1e1ff50899128a05b6af72ebceb67a33d212efcb28
SHA512fe2776d3110ec74981f5410843667596c9b64b3eaa4883b9507cbe716e88c05cc3b421d583888371cf9fabfcfc465a0b27ddbd0f08ad6d76a9f58f81db0ce365
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5ab1098b9b376c497db0ac6037f7ea27d
SHA138e26271c215d912e92ac98e3d788d5ecf1e7a87
SHA256c089db517fab76cb1afee020f27e70469e4cca5e662dd609097370877ee6d1a0
SHA5123c7e21e41a05a6b8bab9432dae70253ce83e3cef4af00c3b30f15cdbbcf812b6b716b60484eceb74baff44ed08d36283697159cbcd67cdabf1838dfdd29b341f
-
Filesize
356B
MD59082627b77d5cde1ab79f435276a2e12
SHA1da66d02cafe6f002fc976723e12320ea82900f05
SHA256d650ca7eb6697712ff78fd96f41d2c040c93a9bf2781cc5e5ebb9bfd15bdb1a5
SHA5122a071d252364d48403c9c408edcc33e1f610a7017bc803a1feb2b6ddabf3434bd4c6a32056ade35b2ebe03a3ce26d6c0048e1a4325eb866164169ba87f69125c
-
Filesize
356B
MD5b3b8f353ad8cb06e2b55176326d95b38
SHA10b9b735cea5ab5993c00a63ec6ad1165377f6356
SHA256bf258b17e8dcaacec13bf6fe0b77ca884a47c22e8c375c5febd29399912127f8
SHA512995789d8c4dd8bc57f7c648f1db83a67c381e7684bb5c06b8ee353c4e11ef9f3c45d61b2a5aa312d561250b005d38e7ad0341c2f870042dcec297eae3492d4e0
-
Filesize
7KB
MD5cbf6d48b78835c7ed6ede69a3562e36c
SHA14ea06a5c5288c8cc6d627e9dd7727d6590248deb
SHA256ba6022cb1cbc0ac97da3309ea7eb522e73d912e1b7335d86e0c71b65c267aac4
SHA51213b9af6a510d31a6de21c355dd738c9d19c6f734e8dcacc9c3f8aefaffe0dc359300bf3ca4e471e3dd33a52ada16a5e84d6bbaafe027971fa5cf11482813b3f6
-
Filesize
16KB
MD59a5e197c5d0bc76548be0ca9dfbe284a
SHA14546f2a2cab3fcc0154f6a4918e2f870ebd290f9
SHA256e1733923fb6835c15e49b293c3fa4fc7141035a040f0afe2c7650525a3344ecb
SHA512c468c22cebd573c40dbdf6e7f6eb27e59298abcf2e7ac23aec2ca566af0f1bcf5fd763cb6231cd1b41d9ed0d52dac0745bae96b1a02a7a8634fb04cbd54ef806
-
Filesize
138KB
MD5f8706d03ab40dcdbf64ffca624e0fed4
SHA11d97182b67534e8e98258860d121c0529910c8aa
SHA256a046f3c8528ddde5d13ce0142fbb7d25a3076e67d0e7c4d59a1a605752488490
SHA51256a60d6dc57e9d30c67984b94291c3401a7282245c6962b01ca905527b939e7e511b09f96ae26771043cc28c22affbf4e2ee87789619b83264e508d7248de825
-
Filesize
278KB
MD524af173588998651de7a4da17ca89d17
SHA1901b869d98b1336b3cd5ed19975abd2a77383aa6
SHA2562732a40dc816e98f91e310ecc8c202814437ae5f14632363d893640f2e53befd
SHA512b76cad364b05ed427e7717d640d70d90160e9c021877dd116b0caf1832ae73feec9cb7320c177fcba3b924c66ec267e64752b98d35520e4334897ad5dbb51398
-
Filesize
2.3MB
MD59b4a94b10bd40eb060487cf8b4866f54
SHA13b0c0f8db72d28b178ba9f9b050c917734fd70f9
SHA25691611d4eb0c89f565eec800730db04bc9ae4dca9d10e96548fe4875aadea11bb
SHA512087dacbec598324fc22ab9215972f9bdee44200d267a417c17c28e49f65cbd21d6a14e2c57d4644f6d4e984424747fae7c3cd2dbaf5117fd15a976bce77bd493
-
Filesize
2.3MB
MD532c6ec8245c171b6b9c6f903c3e6eb2c
SHA11069ebfda9b881a477eac524b110c74a0e6f1103
SHA256f17697e387d0900c7d8315587de0e39579d6a37e49d66790f9fba851084aec69
SHA5122a13eeb531ba30b8b7e392329276d2f3071fec880decab35c51502f635c79af86d25e6506fc4486f48405a8eb10614e784812963fe591a9ce4a41a4f8c02824e
-
Filesize
3.5MB
MD57e9e5a3bb475784e3fd62cd8ec68901b
SHA165d5cfc5dcadd1b216095ec0b0f2256351234485
SHA256997168ff6f969fd612eff93901e67726f13930bdfe473ecf1dc3ec1a1ab7ba21
SHA51297b672f8a99124263c844dd650ddca4b2f1adece23803c352d6619d3be73e29fd96150122669322502175cb657155052bd62f1ba607d40cc7877075c4866cf3b
-
Filesize
1.8MB
MD5babfaa8d0167b8d4752c6972df3d500e
SHA1b5715cb8937f820ca1a92918c730c7acf3477c1b
SHA256da14d6d03a94854f4fe09d1d676e57afb731fa49fe132987e9c82cb3baf2ef94
SHA512024f717ad0c7e21151a2f38331076784334f05bbb60d359f19605370d22e4cfe6ed23dfdb1a4d09c7bb08ff4e5766e001df13a8166d000067c4bd60dc932b9cb