Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 18:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe
Resource
win7-20240729-en
General
-
Target
2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe
-
Size
3.0MB
-
MD5
7091ef9191eae2ef9fba1acd659f916d
-
SHA1
3d2cd6a23c64fb57b07e517d00854bbde43bf0ea
-
SHA256
7f68f7239f7f8ea8d9be6de86e869a508096d6da0c2e02f57520f0959018930c
-
SHA512
faac00de734b6d85150570c648e29057b3e80811e3415732b7d65c039109a6bb5cb0b68bb345ae32f6f510ae2d283094879b9a10a5c99eaba456bf318c4c3437
-
SSDEEP
49152:oQZAdVyVT9n/Gg0P+WhognG/wNCYnTC+vOuCsJwJ2k+s9pk+mcnG/wVUNQ3u:BGdVyVT9nOgmhvnG/wNbTC+vipJ2bsQr
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4680-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4680-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4680-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4868-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4868-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4868-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4868-27-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3004-30-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3004-31-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3004-32-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3004-35-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3004-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 13 IoCs
resource yara_rule behavioral2/memory/4680-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4680-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4680-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4868-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/files/0x000a000000023b7b-23.dat family_gh0strat behavioral2/memory/4868-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4868-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4868-27-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3004-30-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3004-31-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3004-32-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3004-35-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3004-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\240620421.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation HD_msedge.exe -
Executes dropped EXE 24 IoCs
pid Process 4680 svchost.exe 4868 TXPlatforn.exe 4828 svchos.exe 3004 TXPlatforn.exe 876 HD_2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 4232 msedge.exe 1580 svchost.exe 1044 TXPlatforn.exe 3200 svchos.exe 3148 TXPlatforn.exe 1752 HD_msedge.exe 3532 HD_msedge.exe 2576 HD_msedge.exe 2620 HD_msedge.exe 1476 HD_msedge.exe 884 HD_msedge.exe 220 HD_msedge.exe 4056 HD_msedge.exe 512 HD_msedge.exe 4000 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe 388 HD_msedge.exe 5104 HD_msedge.exe 3108 HD_msedge.exe 1220 HD_msedge.exe -
Loads dropped DLL 4 IoCs
pid Process 4828 svchos.exe 3200 svchos.exe 228 svchost.exe 4000 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA HD_msedge.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer HD_msedge.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName HD_msedge.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\240613218.txt svchos.exe File created C:\Windows\SysWOW64\240620421.txt svchos.exe File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe -
resource yara_rule behavioral2/memory/4680-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4680-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4680-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4680-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4868-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4868-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4868-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4868-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4868-27-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3004-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3004-30-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3004-31-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3004-32-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3004-35-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3004-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in Program Files directory 7 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe msedge.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2328 4828 WerFault.exe 85 1404 4828 WerFault.exe 85 3248 4828 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatforn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msedge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatforn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4188 cmd.exe 724 PING.EXE 820 PING.EXE 208 cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS HD_msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer HD_msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName HD_msedge.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 724 PING.EXE 820 PING.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4740 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 4740 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 4232 msedge.exe 4232 msedge.exe 2620 HD_msedge.exe 2620 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 2832 identity_helper.exe 2832 identity_helper.exe 1220 HD_msedge.exe 1220 HD_msedge.exe 1220 HD_msedge.exe 1220 HD_msedge.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 3004 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4680 svchost.exe Token: SeLoadDriverPrivilege 3004 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 1580 svchost.exe Token: 33 3004 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 3004 TXPlatforn.exe Token: 33 3004 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 3004 TXPlatforn.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe 1752 HD_msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4740 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 4740 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 4232 msedge.exe 4232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4740 wrote to memory of 4680 4740 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 82 PID 4740 wrote to memory of 4680 4740 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 82 PID 4740 wrote to memory of 4680 4740 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 82 PID 4680 wrote to memory of 208 4680 svchost.exe 84 PID 4680 wrote to memory of 208 4680 svchost.exe 84 PID 4680 wrote to memory of 208 4680 svchost.exe 84 PID 4740 wrote to memory of 4828 4740 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 85 PID 4740 wrote to memory of 4828 4740 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 85 PID 4740 wrote to memory of 4828 4740 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 85 PID 4868 wrote to memory of 3004 4868 TXPlatforn.exe 86 PID 4868 wrote to memory of 3004 4868 TXPlatforn.exe 86 PID 4868 wrote to memory of 3004 4868 TXPlatforn.exe 86 PID 208 wrote to memory of 820 208 cmd.exe 90 PID 208 wrote to memory of 820 208 cmd.exe 90 PID 208 wrote to memory of 820 208 cmd.exe 90 PID 4740 wrote to memory of 876 4740 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 96 PID 4740 wrote to memory of 876 4740 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 96 PID 4740 wrote to memory of 876 4740 2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 96 PID 876 wrote to memory of 4232 876 HD_2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 97 PID 876 wrote to memory of 4232 876 HD_2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 97 PID 876 wrote to memory of 4232 876 HD_2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe 97 PID 4232 wrote to memory of 1580 4232 msedge.exe 98 PID 4232 wrote to memory of 1580 4232 msedge.exe 98 PID 4232 wrote to memory of 1580 4232 msedge.exe 98 PID 1580 wrote to memory of 4188 1580 svchost.exe 100 PID 1580 wrote to memory of 4188 1580 svchost.exe 100 PID 1580 wrote to memory of 4188 1580 svchost.exe 100 PID 1044 wrote to memory of 3148 1044 TXPlatforn.exe 102 PID 1044 wrote to memory of 3148 1044 TXPlatforn.exe 102 PID 1044 wrote to memory of 3148 1044 TXPlatforn.exe 102 PID 4232 wrote to memory of 3200 4232 msedge.exe 101 PID 4232 wrote to memory of 3200 4232 msedge.exe 101 PID 4232 wrote to memory of 3200 4232 msedge.exe 101 PID 4232 wrote to memory of 1752 4232 msedge.exe 106 PID 4232 wrote to memory of 1752 4232 msedge.exe 106 PID 4188 wrote to memory of 724 4188 cmd.exe 107 PID 4188 wrote to memory of 724 4188 cmd.exe 107 PID 4188 wrote to memory of 724 4188 cmd.exe 107 PID 1752 wrote to memory of 3532 1752 HD_msedge.exe 108 PID 1752 wrote to memory of 3532 1752 HD_msedge.exe 108 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 PID 1752 wrote to memory of 2576 1752 HD_msedge.exe 109 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection HD_msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:820
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 4763⤵
- Program crash
PID:2328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 4603⤵
- Program crash
PID:1404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 3843⤵
- Program crash
PID:3248
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exeC:\Users\Admin\AppData\Local\Temp\HD_2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://uu.163.com/3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.16⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Checks system information in the registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1752 -
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa4d5946f8,0x7ffa4d594708,0x7ffa4d5947185⤵
- Executes dropped EXE
PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=gpu-process --field-trial-handle=1984,9207699081755475530,4491568333605567971,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:25⤵
- Executes dropped EXE
PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,9207699081755475530,4491568333605567971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,9207699081755475530,4491568333605567971,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:85⤵
- Executes dropped EXE
PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=1984,9207699081755475530,4491568333605567971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=1984,9207699081755475530,4491568333605567971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=1984,9207699081755475530,4491568333605567971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=1984,9207699081755475530,4491568333605567971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,9207699081755475530,4491568333605567971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:85⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,9207699081755475530,4491568333605567971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=1984,9207699081755475530,4491568333605567971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=1984,9207699081755475530,4491568333605567971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=1984,9207699081755475530,4491568333605567971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=gpu-process --field-trial-handle=1984,9207699081755475530,4491568333605567971,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
-
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4828 -ip 48281⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4828 -ip 48281⤵PID:2212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4828 -ip 48281⤵PID:3836
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Executes dropped EXE
PID:3148
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:3136
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:228 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\240620421.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2280
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5ad8536c7440638d40156e883ac25086e
SHA1fa9e8b7fb10473a01b8925c4c5b0888924a1147c
SHA25673d84d249f16b943d1d3f9dd9e516fadd323e70939c29b4a640693eb8818ee9a
SHA512b5f368be8853aa142dba614dcca7e021aba92b337fe36cfc186714092a4dab1c7a2181954cd737923edd351149980182a090dbde91081c81d83f471ff18888fe
-
Filesize
4.5MB
MD5697617425733ed9a6a15042d32d6da12
SHA1746ff10a1a8cba31f6ce2952a3210ee5ff5b4609
SHA256cc8d88024ea3937f400515aabdf4720d7bcb05cd294efbb8993bc8e4c1d193f6
SHA512a62e453b1b789cde4e5de70f29e384bd41ef5a86d9a5a67c7421eaff8c0a601ff0943cf7a97385a87759d7a5a25b358cd67c3cd29b3921b3996403a1897f0b8f
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
5KB
MD58f34c5881da9741ca0092fb525547c60
SHA15ead947bc9840c02cc356c29561460548db4ba56
SHA25678a4ec44991c280cbde27af54a479c37fa66a20979485061bb7bd16df6c4e091
SHA512b5f00a3a8b95b364426b7af8de8e56e138218f303ccb19137b3e76d70a17e8cc3a53d1b06ae20c8c163bb006057165fe4ee2aef8fb9dd4ae6b57c5e1c68e940f
-
Filesize
6KB
MD5bed918ef0d6a7be9921ab896570d81b9
SHA149599b55dcb2769e25e35979884fa51d5c9d603b
SHA2563f05cec3f688ef90da9e1eba66e1d71e68ca0ecbaa80ec384bfde269cc682fc8
SHA512ead2eeb83dd6d469da48b91f5603272bce09d2152e65cbc7aa3686ac7d9829a24a70e494775afe2bd46a6ed4d48e98ad7dec36c432db0a038fac619cce7173fb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e27a2547c2ab627d0853dbd3596f648d
SHA16aa8f4db4c4c4dec541307f575070ae4cc5d1bf3
SHA25602508294a789a7c430fd5d36acaf00c3de7367d03f661a27a80a4d050a551940
SHA51293d3eaacc9cf881f9f465c4ea35ad9de697c766e46b7c744a5d66299bc5e5bd127f0caa3e6ce1204fd7116a92ced935537c8d3ef3195b75053079ac82b27a2e0
-
C:\Users\Admin\AppData\Local\Temp\HD_2024-12-08_7091ef9191eae2ef9fba1acd659f916d_hijackloader_icedid.exe
Filesize1.7MB
MD541d1320b270d52fc54f88851b045fd4d
SHA1652b67083bcae6db3ce156a13e33657ce026a74f
SHA25698a3e9f2d4313e78bd7cab53070d2a26f292129edd53fa329394eb4e793c104a
SHA51203d5ecf5f3de36001fbf9cae283c7db474124ead885c4c45837400f0bc3d86f903417f92b5e1094fedfefcbaf82ace12104c7b6d8bfe9fd2527854f2808e9354
-
Filesize
1.3MB
MD5f220d9369aebfed8404cfeadd8f3a818
SHA186c0095799f2937a9296d030c5b00475424779de
SHA256c4af430a63b0c6576f38440dca4f25286ac0fc16f017c86701f31d10449c8e88
SHA5123937316c9279274eeefbd8aef410d3cd72c784d9cf4981319bdd91eca8ff37dcf69e266b1b99bf5dfd0b7b0a2ba582d07eff1e21f753590ebf25a03ec960a13e
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD580b032f655811be3b47aa4c3015b5ef7
SHA141ad6ea4432a15354d3a2bf7777139cbac813415
SHA25692867cfefc47ff44e2b9165e5548510a7e4f245f2c34fb7bcb6b9eb012157b44
SHA51283b43bc584aacb6e7a6d4fdae3f0c47cb6ca1711804ccd60b963d53a0c63fcae27cb568f7eb9f2a866cee54a9bed63435b7a6a75e79e743e382ae6e4dbc331d5
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641