Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 22:54
Static task
static1
Behavioral task
behavioral1
Sample
5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d.exe
Resource
win10v2004-20241007-en
General
-
Target
5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d.exe
-
Size
1.4MB
-
MD5
8b56e049371d0ad4667839b19abad608
-
SHA1
3b1f8dd9568dd6a905d2b0aa65f6886970649cde
-
SHA256
5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d
-
SHA512
ca59335f0cd508c201011e61a8ae653aec989922afe4c85e403ea77d56608fecc1b7e0727be2c06fed0ad95477aace7d1a3dfc813f8285de0ce1bd6be0b1a191
-
SSDEEP
24576:h+SFQyRru2P6TW+/OMiFhTCRQwG6F5/xsSSBl76xPbdHURIcNTKarBI:NZubTWLb33s/xkl76FZUKaKarB
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\KHnRU7qmM8\ImagePath = "\\??\\C:\\Windows\\KHnRU7qmM8Q.sys" 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000019643-64.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe -
Loads dropped DLL 3 IoCs
pid Process 2304 5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\GcPyolA\osCBhBY.dll 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe File created C:\Windows\SysWOW64\GcPyolA\wuVmTpJR.dll 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe File created C:\Windows\SysWOW64\dQUVhOX\AfYWIRYN.dll 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe File created C:\Windows\SysWOW64\dQUVhOX\xaRRMRU.tmp 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe File created C:\Windows\SysWOW64\dQUVhOX\jSIambXmH.dll 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe File created C:\Windows\SysWOW64\dQUVhOX\mtVuEYBPy.dll 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe File created C:\Windows\SysWOW64\dQUVhOX\CbXOay.dll 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe File created C:\Windows\SysWOW64\dQUVhOX\AStlNLrJ.dll 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe File opened for modification C:\Windows\SysWOW64\dQUVhOX\AStlNLrJ.dll 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe -
resource yara_rule behavioral1/memory/2860-72-0x00000000746B0000-0x0000000074739000-memory.dmp upx behavioral1/files/0x0007000000019643-64.dat upx -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\vJTTgH\gygKyU.dll 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe File created C:\Windows\PUSqoAN.dll 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe File opened for modification C:\Windows\vJTTgH\gygKyU.dll 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe File created C:\Windows\iPUKQwLq\qHjYvL.dll 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe File created C:\Windows\iPUKQwLq\hHgkHX.dll 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe File created C:\Windows\14.txt 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe File opened for modification C:\Windows\14.txt 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe File created C:\Windows\KHnRU7qmM8Q.sys 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe File created C:\Windows\XiXexQfE.dll 5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe -
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{2670000A-7350-4f3c-8081-5663EE0C6C49} 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe Key deleted \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TypedURLs 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe Token: SeLoadDriverPrivilege 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2860 2304 5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 29 PID 2304 wrote to memory of 2860 2304 5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 29 PID 2304 wrote to memory of 2860 2304 5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 29 PID 2304 wrote to memory of 2860 2304 5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 29 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20 PID 2860 wrote to memory of 1192 2860 5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d.exe"C:\Users\Admin\AppData\Local\Temp\5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\eFtBIJL\5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe"C:\Users\Admin\AppData\Local\eFtBIJL\5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe"3⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\eFtBIJL\5a87a704d0e2e7bc2213db0e698f125c080c468ed8ea3680d7d7e2ecf626a9d.exe
Filesize1.4MB
MD54575be35ccaa6af66b5cf6152edfc3c7
SHA1901db5770299a4c2a17696596bf482d2d1af9af8
SHA256d02b817f1bd72f424c458cf7188435670d2cfb0f5e3e7a5af3d2eaa342a6eb6a
SHA512e5c48f860846e8923e92da9d9fdc671e6cbdca526a06b595ccd7ccbc219b7d9f65e9637de79dff141ccd778941bc0968b9bb498e28e16ce21e63dc3587a6ea19
-
Filesize
866KB
MD5036a3acea0dc31d58c41f6f8c312b086
SHA152164e5f60de837c50368b65e5bfad5c7947c162
SHA256b8a0ce3d7700ccba6bc187c11f8186ab169e0652b8e7fa4437c8ebb61c5c4aec
SHA51272167c01033f2b19a6a4349d2c28aec0a85c8fa847b3d176bfe2471ed968f57239eca2250710b3ceaa7f10f3cf0c84273d1192c323d1fa0472c4b7b7b075aba8
-
Filesize
483KB
MD588c4820aa1ecfa3017963db6a60952a0
SHA195aeaa84e38c62059a703c6a8ce8712df9c990f9
SHA256bb3c682d5bbe59a63dd8fad19466f8c9f770df15acdbed580012be7cea62acbd
SHA512bde8c85f4232f24f415289e1aab61ce090cbd06442d774908a86ede135e74834e4c964c1a584df7a8d37fb56559126de24ff42c8497df7602534cb5d6100f5ee