Analysis
-
max time kernel
60s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 16:38
Static task
static1
Behavioral task
behavioral1
Sample
malicious.zip
Resource
win10v2004-20241007-en
General
-
Target
malicious.zip
-
Size
1.8MB
-
MD5
6e21499d32f36f93fa176f38fb4b9b77
-
SHA1
63136b30330cf86527a87f986c5eb5dffaba66f6
-
SHA256
4f39c7599a824ba6f9698eb2ccf780ee4aa30a427ea3b8acc4254916068e07d4
-
SHA512
5d665ce32e9fedc302c0487fc49c5f808f47e6fae7628926498931e50d98d03ff3d0ee5fb8cf0fa7c0c3a2b54e2f18d19a376ad9284b06433b9154b9d09dbe0c
-
SSDEEP
49152:R5BZHSCcUzdE+vpwuSXg3Hbr0ntqYHqcB:R57RniuSXQ7r0tqYKY
Malware Config
Extracted
redline
frant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1708-78-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral1/memory/1708-79-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral1/memory/1708-81-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3044-89-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Executes dropped EXE 9 IoCs
Processes:
malicious.exeYt8ge85.exeGY4IC43.exehE8Zq97.exe1Zn59od7.exe2PO9885.exe3FD62NB.exe4Ii975UD.exe5uR3lF9.exepid process 1768 malicious.exe 2776 Yt8ge85.exe 2332 GY4IC43.exe 5056 hE8Zq97.exe 4776 1Zn59od7.exe 2184 2PO9885.exe 1008 3FD62NB.exe 4500 4Ii975UD.exe 3336 5uR3lF9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
malicious.exeYt8ge85.exeGY4IC43.exehE8Zq97.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" malicious.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Yt8ge85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" GY4IC43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" hE8Zq97.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
1Zn59od7.exe2PO9885.exe3FD62NB.exe4Ii975UD.exedescription pid process target process PID 4776 set thread context of 2400 4776 1Zn59od7.exe AppLaunch.exe PID 2184 set thread context of 1708 2184 2PO9885.exe AppLaunch.exe PID 1008 set thread context of 2436 1008 3FD62NB.exe AppLaunch.exe PID 4500 set thread context of 3044 4500 4Ii975UD.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 388 4776 WerFault.exe 1Zn59od7.exe 1784 2184 WerFault.exe 2PO9885.exe 2364 1008 WerFault.exe 3FD62NB.exe 4944 4500 WerFault.exe 4Ii975UD.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3FD62NB.exeAppLaunch.exemalicious.exeGY4IC43.exehE8Zq97.exe1Zn59od7.exeAppLaunch.exe5uR3lF9.exeYt8ge85.exeAppLaunch.exe2PO9885.exe4Ii975UD.exeAppLaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3FD62NB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language malicious.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GY4IC43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hE8Zq97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Zn59od7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5uR3lF9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Yt8ge85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2PO9885.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4Ii975UD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
AppLaunch.exe7zFM.exemsedge.exemsedge.exemsedge.exeidentity_helper.exepid process 2400 AppLaunch.exe 2400 AppLaunch.exe 1124 7zFM.exe 1124 7zFM.exe 2924 msedge.exe 2924 msedge.exe 4352 msedge.exe 4352 msedge.exe 1628 msedge.exe 1628 msedge.exe 3040 identity_helper.exe 3040 identity_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 1124 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
7zFM.exeAppLaunch.exedescription pid process Token: SeRestorePrivilege 1124 7zFM.exe Token: 35 1124 7zFM.exe Token: SeSecurityPrivilege 1124 7zFM.exe Token: SeDebugPrivilege 2400 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
7zFM.exemsedge.exepid process 1124 7zFM.exe 1124 7zFM.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7zFM.exemalicious.exeYt8ge85.exeGY4IC43.exehE8Zq97.exe1Zn59od7.exe2PO9885.exe3FD62NB.exe4Ii975UD.exe5uR3lF9.execmd.exedescription pid process target process PID 1124 wrote to memory of 1768 1124 7zFM.exe malicious.exe PID 1124 wrote to memory of 1768 1124 7zFM.exe malicious.exe PID 1124 wrote to memory of 1768 1124 7zFM.exe malicious.exe PID 1768 wrote to memory of 2776 1768 malicious.exe Yt8ge85.exe PID 1768 wrote to memory of 2776 1768 malicious.exe Yt8ge85.exe PID 1768 wrote to memory of 2776 1768 malicious.exe Yt8ge85.exe PID 2776 wrote to memory of 2332 2776 Yt8ge85.exe GY4IC43.exe PID 2776 wrote to memory of 2332 2776 Yt8ge85.exe GY4IC43.exe PID 2776 wrote to memory of 2332 2776 Yt8ge85.exe GY4IC43.exe PID 2332 wrote to memory of 5056 2332 GY4IC43.exe hE8Zq97.exe PID 2332 wrote to memory of 5056 2332 GY4IC43.exe hE8Zq97.exe PID 2332 wrote to memory of 5056 2332 GY4IC43.exe hE8Zq97.exe PID 5056 wrote to memory of 4776 5056 hE8Zq97.exe 1Zn59od7.exe PID 5056 wrote to memory of 4776 5056 hE8Zq97.exe 1Zn59od7.exe PID 5056 wrote to memory of 4776 5056 hE8Zq97.exe 1Zn59od7.exe PID 4776 wrote to memory of 2400 4776 1Zn59od7.exe AppLaunch.exe PID 4776 wrote to memory of 2400 4776 1Zn59od7.exe AppLaunch.exe PID 4776 wrote to memory of 2400 4776 1Zn59od7.exe AppLaunch.exe PID 4776 wrote to memory of 2400 4776 1Zn59od7.exe AppLaunch.exe PID 4776 wrote to memory of 2400 4776 1Zn59od7.exe AppLaunch.exe PID 4776 wrote to memory of 2400 4776 1Zn59od7.exe AppLaunch.exe PID 4776 wrote to memory of 2400 4776 1Zn59od7.exe AppLaunch.exe PID 4776 wrote to memory of 2400 4776 1Zn59od7.exe AppLaunch.exe PID 4776 wrote to memory of 2400 4776 1Zn59od7.exe AppLaunch.exe PID 5056 wrote to memory of 2184 5056 hE8Zq97.exe 2PO9885.exe PID 5056 wrote to memory of 2184 5056 hE8Zq97.exe 2PO9885.exe PID 5056 wrote to memory of 2184 5056 hE8Zq97.exe 2PO9885.exe PID 2184 wrote to memory of 1708 2184 2PO9885.exe AppLaunch.exe PID 2184 wrote to memory of 1708 2184 2PO9885.exe AppLaunch.exe PID 2184 wrote to memory of 1708 2184 2PO9885.exe AppLaunch.exe PID 2184 wrote to memory of 1708 2184 2PO9885.exe AppLaunch.exe PID 2184 wrote to memory of 1708 2184 2PO9885.exe AppLaunch.exe PID 2184 wrote to memory of 1708 2184 2PO9885.exe AppLaunch.exe PID 2184 wrote to memory of 1708 2184 2PO9885.exe AppLaunch.exe PID 2184 wrote to memory of 1708 2184 2PO9885.exe AppLaunch.exe PID 2184 wrote to memory of 1708 2184 2PO9885.exe AppLaunch.exe PID 2184 wrote to memory of 1708 2184 2PO9885.exe AppLaunch.exe PID 2332 wrote to memory of 1008 2332 GY4IC43.exe 3FD62NB.exe PID 2332 wrote to memory of 1008 2332 GY4IC43.exe 3FD62NB.exe PID 2332 wrote to memory of 1008 2332 GY4IC43.exe 3FD62NB.exe PID 1008 wrote to memory of 2436 1008 3FD62NB.exe AppLaunch.exe PID 1008 wrote to memory of 2436 1008 3FD62NB.exe AppLaunch.exe PID 1008 wrote to memory of 2436 1008 3FD62NB.exe AppLaunch.exe PID 1008 wrote to memory of 2436 1008 3FD62NB.exe AppLaunch.exe PID 1008 wrote to memory of 2436 1008 3FD62NB.exe AppLaunch.exe PID 1008 wrote to memory of 2436 1008 3FD62NB.exe AppLaunch.exe PID 2776 wrote to memory of 4500 2776 Yt8ge85.exe 4Ii975UD.exe PID 2776 wrote to memory of 4500 2776 Yt8ge85.exe 4Ii975UD.exe PID 2776 wrote to memory of 4500 2776 Yt8ge85.exe 4Ii975UD.exe PID 4500 wrote to memory of 3044 4500 4Ii975UD.exe AppLaunch.exe PID 4500 wrote to memory of 3044 4500 4Ii975UD.exe AppLaunch.exe PID 4500 wrote to memory of 3044 4500 4Ii975UD.exe AppLaunch.exe PID 4500 wrote to memory of 3044 4500 4Ii975UD.exe AppLaunch.exe PID 4500 wrote to memory of 3044 4500 4Ii975UD.exe AppLaunch.exe PID 4500 wrote to memory of 3044 4500 4Ii975UD.exe AppLaunch.exe PID 4500 wrote to memory of 3044 4500 4Ii975UD.exe AppLaunch.exe PID 4500 wrote to memory of 3044 4500 4Ii975UD.exe AppLaunch.exe PID 1768 wrote to memory of 3336 1768 malicious.exe 5uR3lF9.exe PID 1768 wrote to memory of 3336 1768 malicious.exe 5uR3lF9.exe PID 1768 wrote to memory of 3336 1768 malicious.exe 5uR3lF9.exe PID 3336 wrote to memory of 1316 3336 5uR3lF9.exe cmd.exe PID 3336 wrote to memory of 1316 3336 5uR3lF9.exe cmd.exe PID 1316 wrote to memory of 4352 1316 cmd.exe msedge.exe PID 1316 wrote to memory of 4352 1316 cmd.exe msedge.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\malicious.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\7zO464BB487\malicious.exe"C:\Users\Admin\AppData\Local\Temp\7zO464BB487\malicious.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yt8ge85.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yt8ge85.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\GY4IC43.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\GY4IC43.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hE8Zq97.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hE8Zq97.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Zn59od7.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Zn59od7.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 5687⤵
- Program crash
PID:388
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2PO9885.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2PO9885.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- System Location Discovery: System Language Discovery
PID:1708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 5727⤵
- Program crash
PID:1784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3FD62NB.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3FD62NB.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 5726⤵
- Program crash
PID:2364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Ii975UD.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Ii975UD.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 5725⤵
- Program crash
PID:4944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5uR3lF9.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5uR3lF9.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\CF17.tmp\CF18.tmp\CF19.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5uR3lF9.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ffc4aa546f8,0x7ffc4aa54708,0x7ffc4aa547186⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10300868976074028170,8094080799945751290,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:26⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,10300868976074028170,8094080799945751290,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,10300868976074028170,8094080799945751290,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:86⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10300868976074028170,8094080799945751290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:16⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10300868976074028170,8094080799945751290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:16⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10300868976074028170,8094080799945751290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:16⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10300868976074028170,8094080799945751290,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:86⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10300868976074028170,8094080799945751290,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10300868976074028170,8094080799945751290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:16⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10300868976074028170,8094080799945751290,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:16⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10300868976074028170,8094080799945751290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:16⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10300868976074028170,8094080799945751290,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:16⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10300868976074028170,8094080799945751290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:16⤵PID:5528
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/5⤵PID:1760
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ffc4aa546f8,0x7ffc4aa54708,0x7ffc4aa547186⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,12948396920698149316,14117713604200478652,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1968 /prefetch:26⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,12948396920698149316,14117713604200478652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4776 -ip 47761⤵PID:4688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2184 -ip 21841⤵PID:4288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1008 -ip 10081⤵PID:2480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4500 -ip 45001⤵PID:4088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4516
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5aa757290889ff5595d693331328b6d70
SHA14c3a35ed07e3c74f5d6a8a6bec6fb4ecee55cc8f
SHA25646cda2e97d92cadad5c784c60d86edc7ab0e06a1ccad8bbc711b1914f40b57de
SHA51255d350fbc7b41564a18b70151038d20ed4f1ab29bfb35956cf040fedd59b69d1a0220d66dce413b4f461133aa48919102d71f69106651ca376216d8d625c287a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5e1f96b94c97e82834c2c018c6aeb2859
SHA1a467acae0e74f0d1892db3d46d7e39e86e919fcb
SHA256b504c8c581a4f7e16dec633fc91c4e34e2f0d2d5f2496377d8e8838f0e33c6bd
SHA51206b17e19b720ec22421383df479435b73d960810b9270a6315c31af5b9c71228a2e7a17793cb1ba72f3d44ac56f8cb5871d675c6ae870cd90bb5a8a6fa680781
-
Filesize
7KB
MD598580889c708b73fb99f4c858e4aac6f
SHA16920825700957abfd1a185e928a104002e4ccf17
SHA2565ce82d9173333d2c49dcafccbf74464bb8814a035e8d3cf1fb25b2711d711ebe
SHA512dfdf9eb6100ec0083f5783b1da841bedcb2295a564529e99a768f8bd72df289715294dd7c5d093af8c82793de7669385fb106850281a3a38b6241bd6e620f1d1
-
Filesize
6KB
MD542db591bde9cf72559296ec3ec152b89
SHA10b54b97dd89db77b6e62bee86f3741c269ccfe1e
SHA256d2f4ac92b75f93cce778ef597e3738062c89a1f46b4df8fcc64ad6b484017312
SHA5123c513e271fc3d512ba41c25c8ce7720376912803edce88af976cb382d4289a4c7f807ef19a05e0b1d88d1ca18a3f5aef033e5cac251535644947d08a6f0ea5b9
-
Filesize
864B
MD59ca07175a4e5e3d99f2936ba41567db8
SHA1c21935bf0f1709f2d80d27a9271550453055d525
SHA2564a1e1daef4b629dc918a9aa1339854501603767650711819562dd4e928f02244
SHA512e5b01a96ada299efd3cfdadac1788ac6fbf5a4221e8160c70454b9da143b35e6faa61388fb19b05f80b46f165d81e1673c113b7b662ea2bf06eba38e156fb277
-
Filesize
864B
MD59f46a4b06f5b00063e11b6b315f74b6e
SHA151df7f0e16364092ab253f3228fc4db5e50ef853
SHA2562ff51f71df0ad576fccc81ae771f9c92e0c115166011ecba970b184d0532d08d
SHA512bd7a805f5a6baac7a5319a3ff83b5898a3921827933f7680ce0443d670d4326f6309fea6e49563881c3b5190627a165bde4a7cde8bcfdd5a260df5a545dc5fda
-
Filesize
862B
MD5ae9d0b3dc7ccd29a23ca8d8b70e96bae
SHA17a2a5274a4127bbd864e3110ca734e8ab38ec62e
SHA2565f6e3c65d1d64bb67354657221701ff739ee108c5a7aba9774eb4202af6a03fe
SHA512f7f0aaa396b653dab3416fbe9ed9fbec8c1861e562d4da3794a89f6490638111e38604d527dd51e6db54cac99e5b1dd972da10be220db1a56fb32d4a45939b6f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ad511c49468b96efbf613749e0f4977f
SHA18c0387e44b6f248f1c792885e620140896c7d420
SHA2567bea159a8acbf36c75e7be2965f8d93c16f8341e0ea969d702a64f7309722a95
SHA5128d56419fd095e114c6be970144f2beca8bcaa2599441a1b1de6308200501589305c6efbc6aba3471ba3e23f6b85a1013b7d470aa1c8d9f705196e996f38f32c0
-
Filesize
8KB
MD50d42a68607cb044c959d44ae42380324
SHA11827f49e87ddc450630fc0c830f256fa757029d3
SHA256d29b9b889b092ea86e0822c5d0b6ccd61416c06ed477009447038a4048a4fd1e
SHA512d2905ed71cf0bc0b5da50400755776be51f8e0a59898a54caeb34fee06ab3487323bde39067abe00ae08a5fb19cc10e090aa8155ce92b8c1ade3e5cd66208400
-
Filesize
1.8MB
MD518cbe55c3b28754916f1cbf4dfc95cf9
SHA17ccfb7678c34d6a2bedc040da04e2b5201be453b
SHA256248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b
SHA512e1d4a7ab164a7e4176a3e4e915480e5c60efe7680d99f0f0bcbd834a4bec1798b951c49ef5c0cca6bea3c2577b475de3c51b2ef1ae70b525d046eb06591f7110
-
Filesize
90B
MD55a115a88ca30a9f57fdbb545490c2043
SHA167e90f37fc4c1ada2745052c612818588a5595f4
SHA25652c4113e7f308faa933ae6e8ff5d1b955ba62d1edac0eb7c972caa26e1ae4e2d
SHA51217c399dad7b7343d5b16156e4d83de78ff5755d12add358bd2987ed4216dd13d24cfec9ecdb92d9d6723bb1d20d8874c0bad969dbec69eed95beb7a2817eb4fe
-
Filesize
100KB
MD5e0f8b21b36fee4e7738a6b5a1ab83673
SHA1e305d55d4d47bfa62eae5f8e6f34e5b133a6f40b
SHA256c567d825d19e24343647ed36c77033fb1f46f420384745a9734618684cb7d384
SHA512716e6624ff87c859d08e2bbcda1137a2386d30b5b9ef545daf2c6585bc3366561773b9ad6c719a1ad99f1bacb219544ae4556629b355250e2234a7f87d24e238
-
Filesize
1.7MB
MD5847ee3021803e4adaefcc00aa8283017
SHA187644df0985b5ef9791c72ce79f423350629659e
SHA2564611614d9c95b0d0e4bf4aa486cc700db6e49dbef7fa2726b20f165e6798a9f7
SHA5121aaea476c061160439439d2dadc05e451166faa5614ccf8960b592df6933d07c867ab8813c08026b8b2c35b20b03dc0d26641e228fe06cff8c4938367e515b38
-
Filesize
1.8MB
MD5cfbb3be155b12d0cc69e3d932fbb81eb
SHA1fb5ed48a80131043c4dd2e4ac69b4b38578f9753
SHA256fd37c07f519f522eb717a372299525f667439b8b0d1aaffb670a011dbbcd58f2
SHA51238aadedee5bd57c7f475e96d74abbb0e671bca462c2c700b7a034e2d1513bd8aebc30b7b75bf1e8cd7b7e3a831e69d5dd0ceaee3d18ed296a2cb3d1b051164cc
-
Filesize
1.2MB
MD5252043d1805587b0e65a07f885d6719e
SHA12210de44be60ba496ea5d4068e715c1308066989
SHA25666839bc22b9c9f717198cf8faa64146fe95dff51dfbb8c0f61982f2e50e89557
SHA512dbcdb0b6fe37cf2c733b6683c2e245008400c84b59450f34a794e513955aaf392982e20f2eb2fce696eec2574fe15f699841748a21fce6a1e20a4381fd52f950
-
Filesize
1.6MB
MD57d377f5e1ba6597ff2cfe4f92639367d
SHA1188ab803c9926ff3448c458030f418099ea03407
SHA256c705efd2888dfbede96714b58aede50a28b3da45aba83a909cb104ce34dc735e
SHA5122adad69f3a358ad955b00c8d7826c396feef9d583407d4c7d53ce3e16ed760f148f553f49df5bbcd6c5c68b87bcf7e1472d3c789946b23dab7ae94b4036540e6
-
Filesize
725KB
MD5403a939a04b4384204d35dbc659bf772
SHA1a5424bc4b18c00fd261d71861fad75502a963397
SHA25675d5ae4d95b66cb33ccb1b8c39adda5b287ab6c44b11aa42b8f3351024fce1fc
SHA512860d17990d95694bd7e799b22e6af6fd93a20276439829e945f9aff079b6c708851e8b3e55200b8ef97d41d91608911a414b4a69c26e5593b9b4ca8a134ddbe8
-
Filesize
1.8MB
MD5ca7a5693b5b0e8b54d6dad6a5b1b86b5
SHA149da08ec9be5e002b0d22dd630182c3a905c76c7
SHA2562d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12
SHA51268ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158
-
Filesize
1.7MB
MD5144dc3c0a5275a93ff86f00b5c61b9ec
SHA1784168ab3c4711737656ca13dc4cb59ca267fa45
SHA256179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787
SHA5129af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e