Analysis
-
max time kernel
95s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 00:46
Behavioral task
behavioral1
Sample
a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe
Resource
win10v2004-20241007-en
General
-
Target
a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe
-
Size
2.6MB
-
MD5
6b0099a51ebff37e6be647f3fd42aa23
-
SHA1
6313a968fd05ae06f855c8a26dff26494a58970e
-
SHA256
a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9
-
SHA512
788448cca4432ec811c94c3c8d61630de030f22de2730acce9f787e3499556cae74899ee8d3e163863745155ba31c52e98d5b9c4bc7c53dcd097c89813ce4820
-
SSDEEP
49152:emi19AidDFahbHmYZuRJv0uEORfMDsSfFaMpDsrmcY4+:et9zFahbHmR5GOZQL1
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 51 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2152 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4180 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1688 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3712 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3608 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2488 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4288 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2556 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2632 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3620 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3900 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1292 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4720 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3516 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4940 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3248 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3992 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3344 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1784 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4212 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 636 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 404 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5008 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2584 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5016 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 372 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3984 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4656 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 888 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2136 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2412 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4480 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1776 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 776 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3468 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3788 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2124 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2204 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4652 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 916 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3976 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2752 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2668 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4884 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2228 4564 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 540 4564 schtasks.exe 84 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe -
resource yara_rule behavioral2/memory/4996-1-0x0000000000370000-0x0000000000616000-memory.dmp dcrat behavioral2/files/0x0007000000023c72-29.dat dcrat behavioral2/files/0x000e000000023c9b-104.dat dcrat behavioral2/files/0x0008000000023c9c-127.dat dcrat behavioral2/files/0x0009000000023c75-138.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe -
Executes dropped EXE 1 IoCs
pid Process 4204 dllhost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\Updates\Download\5940a34987c991 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File created C:\Program Files\WindowsPowerShell\Modules\9e8d7a4ca61bd9 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File created C:\Program Files\7-Zip\Lang\121e5b5079f7c0 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Program Files\Microsoft Office\Updates\Download\RCX9DCB.tmp a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\RCX9FE0.tmp a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\RCXA000.tmp a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\RCXADE7.tmp a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File created C:\Program Files\Microsoft Office\Updates\Download\dllhost.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\66fc9ff0ee96c2 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\5940a34987c991 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File created C:\Program Files\WindowsPowerShell\Modules\RuntimeBroker.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Program Files\Microsoft Office\Updates\Download\dllhost.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\RuntimeBroker.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Program Files\7-Zip\Lang\RCXB069.tmp a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\sihost.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Program Files\Microsoft Office\Updates\Download\RCX9DBB.tmp a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File created C:\Program Files\7-Zip\Lang\sysmon.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\sihost.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Program Files (x86)\Internet Explorer\es-ES\RCXA214.tmp a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Program Files (x86)\Internet Explorer\es-ES\RCXA292.tmp a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Program Files (x86)\Internet Explorer\es-ES\dllhost.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\RCXADE6.tmp a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Program Files\7-Zip\Lang\RCXB068.tmp a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\dllhost.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Program Files\7-Zip\Lang\sysmon.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe -
Drops file in Windows directory 16 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\AppPatch64\RCXABD2.tmp a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Windows\Migration\WTR\dllhost.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File created C:\Windows\apppatch\AppPatch64\explorer.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File created C:\Windows\apppatch\AppPatch64\7a0fd90576e088 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File created C:\Windows\RemotePackages\RemoteDesktops\RuntimeBroker.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File created C:\Windows\CSC\Idle.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Windows\RemotePackages\RemoteDesktops\RCXA4B7.tmp a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Windows\RemotePackages\RemoteDesktops\RuntimeBroker.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Windows\apppatch\AppPatch64\RCXABD1.tmp a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Windows\apppatch\AppPatch64\explorer.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Windows\Migration\WTR\RCXB28E.tmp a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File created C:\Windows\Migration\WTR\dllhost.exe a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Windows\RemotePackages\RemoteDesktops\RCXA4B6.tmp a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File opened for modification C:\Windows\Migration\WTR\RCXB27E.tmp a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File created C:\Windows\RemotePackages\RemoteDesktops\9e8d7a4ca61bd9 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe File created C:\Windows\Migration\WTR\5940a34987c991 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 51 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2752 schtasks.exe 4884 schtasks.exe 540 schtasks.exe 2620 schtasks.exe 4288 schtasks.exe 3900 schtasks.exe 372 schtasks.exe 4656 schtasks.exe 3976 schtasks.exe 2556 schtasks.exe 1292 schtasks.exe 3248 schtasks.exe 2124 schtasks.exe 4652 schtasks.exe 4720 schtasks.exe 1784 schtasks.exe 2604 schtasks.exe 2412 schtasks.exe 776 schtasks.exe 2152 schtasks.exe 2384 schtasks.exe 3608 schtasks.exe 1992 schtasks.exe 2204 schtasks.exe 4940 schtasks.exe 636 schtasks.exe 5008 schtasks.exe 2136 schtasks.exe 1776 schtasks.exe 4180 schtasks.exe 3516 schtasks.exe 3984 schtasks.exe 2228 schtasks.exe 2584 schtasks.exe 1688 schtasks.exe 3712 schtasks.exe 2488 schtasks.exe 4212 schtasks.exe 404 schtasks.exe 5016 schtasks.exe 888 schtasks.exe 4480 schtasks.exe 2632 schtasks.exe 3620 schtasks.exe 3992 schtasks.exe 3344 schtasks.exe 3052 schtasks.exe 3468 schtasks.exe 3788 schtasks.exe 916 schtasks.exe 2668 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 4204 dllhost.exe 4204 dllhost.exe 4204 dllhost.exe 4204 dllhost.exe 4204 dllhost.exe 4204 dllhost.exe 4204 dllhost.exe 4204 dllhost.exe 4204 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4204 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe Token: SeDebugPrivilege 4204 dllhost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4996 wrote to memory of 2328 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 149 PID 4996 wrote to memory of 2328 4996 a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe 149 PID 2328 wrote to memory of 2012 2328 cmd.exe 151 PID 2328 wrote to memory of 2012 2328 cmd.exe 151 PID 2328 wrote to memory of 4204 2328 cmd.exe 153 PID 2328 wrote to memory of 4204 2328 cmd.exe 153 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe"C:\Users\Admin\AppData\Local\Temp\a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4996 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\QmztffGewF.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2012
-
-
C:\Windows\Migration\WTR\dllhost.exe"C:\Windows\Migration\WTR\dllhost.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4204
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Desktop\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Public\Desktop\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Desktop\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files\Microsoft Office\Updates\Download\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Updates\Download\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Office\Updates\Download\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 11 /tr "'C:\Program Files\WindowsPowerShell\Modules\PSReadline\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Modules\PSReadline\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Program Files\WindowsPowerShell\Modules\PSReadline\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Internet Explorer\es-ES\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\es-ES\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Internet Explorer\es-ES\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Windows\RemotePackages\RemoteDesktops\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\RemotePackages\RemoteDesktops\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Windows\RemotePackages\RemoteDesktops\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Default User\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Windows\apppatch\AppPatch64\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\apppatch\AppPatch64\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Windows\apppatch\AppPatch64\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\WindowsPowerShell\Modules\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Modules\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files\WindowsPowerShell\Modules\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 7 /tr "'C:\Program Files\7-Zip\Lang\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 6 /tr "'C:\Program Files\7-Zip\Lang\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\Migration\WTR\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Migration\WTR\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\Migration\WTR\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 9 /tr "'C:\Users\Default\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Users\Default\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 7 /tr "'C:\Users\Default\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:540
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD570bc0ba47f8af62d1aaa21748d36d17c
SHA16906e3dfea4acf1c8f1505d3cb82c9219015a42c
SHA256efbed709d8570ea9d6492bce06bc70d0ce44bb6b161d52e08c1531afdbba54b0
SHA512966dc15e2c43c760ec4f5f44f19e6f979c7b8ff6d318cc2dcb8b912c71b12a54e839e017c68548a809f4bf66b2f57d887a043651f8f349a7ebb34ea60d2c2630
-
Filesize
2.6MB
MD55663fadb5826e554e4567f190831a1d9
SHA1bb862984a349afbbf250a6c5790c077748318af7
SHA256eaaa8a06a1b604d8335a3165e18ae00c061df124d72823944fa7c74100211f7a
SHA512a94e9486f268e82e08a9cbfce775b7252b8e39f0b9b68d95674af3f6d67cda780c9381f477a029c81f11d7aa0fb1144b4765cff6dcca429739b5fa6a1ea700db
-
Filesize
201B
MD545e94582168d130ff16fd6b40425f06d
SHA12b119710f7a16edd120aed50c45368c3013db3b5
SHA25608db2cafef20cd632e1a5fb7ffcaef6e31376a635fcd5c7f2ef5e99a173251a9
SHA512505dc20d17748bfbd0adc2a08c5fd0581b861d6b4d5520310ac6bef17b766447ff1220caefdc5b5cfa5baef61bd2878f74bfcda552534df298f430b34762b777
-
Filesize
2.6MB
MD59b37a23fefaba25c7a80ac6bf9d128b0
SHA1a9f910a08d3808a961c934c8f80fb4b2f5266035
SHA2561eee4cf291a57d5a967d0b41ae74a7fdd4a86e03366e7bd4c7934cd68115e0b2
SHA5127eacbdffb2cd48a0f9087a2af869a5c2adef0a0794ec46f169e2d3d8908009c838b1ac298b6a0916a4d11eb2700a304dbcb468f6ceda24effcb86f51c777f3fb
-
Filesize
2.6MB
MD56b0099a51ebff37e6be647f3fd42aa23
SHA16313a968fd05ae06f855c8a26dff26494a58970e
SHA256a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9
SHA512788448cca4432ec811c94c3c8d61630de030f22de2730acce9f787e3499556cae74899ee8d3e163863745155ba31c52e98d5b9c4bc7c53dcd097c89813ce4820