Overview
overview
10Static
static
10Malware-1-master.zip
windows10-2004-x64
1Malware-1-...30.exe
windows10-2004-x64
10Malware-1-...40.exe
windows10-2004-x64
10Malware-1-...32.exe
windows10-2004-x64
10Malware-1-.../5.exe
windows10-2004-x64
10Malware-1-...91.exe
windows10-2004-x64
10Malware-1-...ey.exe
windows10-2004-x64
7Malware-1-....0.zip
windows10-2004-x64
1Malware-1-...ad.exe
windows10-2004-x64
3Malware-1-...ti.exe
windows10-2004-x64
5Malware-1-...an.bat
windows10-2004-x64
7Malware-1-...an.exe
windows10-2004-x64
3Malware-1-...ve.bat
windows10-2004-x64
7Malware-1-...ve.exe
windows10-2004-x64
7Malware-1-...ya.exe
windows10-2004-x64
Malware-1-...re.exe
windows10-2004-x64
10Malware-1-...ry.exe
windows10-2004-x64
10Malware-1-...ck.exe
windows10-2004-x64
3Malware-1-...he.exe
windows10-2004-x64
10Malware-1-...op.exe
windows10-2004-x64
7Malware-1-...rb.exe
windows10-2004-x64
10Malware-1-...ue.exe
windows10-2004-x64
1Malware-1-...ng.exe
windows10-2004-x64
6Malware-1-...kt.bat
windows10-2004-x64
7Malware-1-...o3.exe
windows10-2004-x64
10Malware-1-...ey.exe
windows10-2004-x64
10Malware-1-.../m.exe
windows10-2004-x64
Malware-1-...o3.exe
windows10-2004-x64
9Malware-1-...dme.md
windows10-2004-x64
3Malware-1-...er.zip
windows10-2004-x64
1Malware-1-...ic.exe
windows10-2004-x64
3Malware-1-...in.exe
windows10-2004-x64
10Resubmissions
17-01-2025 20:14
250117-yz7h3s1qfw 1017-01-2025 20:12
250117-yy9l2sslcr 1017-01-2025 17:25
250117-vy9p9sxpez 1017-01-2025 17:21
250117-vw8eesyjfp 1017-01-2025 14:16
250117-rk9ass1rhk 1017-01-2025 14:12
250117-rhv1ds1lds 1016-01-2025 12:52
250116-p4et7a1mez 1016-01-2025 12:50
250116-p29xjssjep 1016-01-2025 12:49
250116-p2cbaasjam 1013-01-2025 04:35
250113-e7x5tswlfz 10Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 15:57
Behavioral task
behavioral1
Sample
Malware-1-master.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Malware-1-master/2530.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Malware-1-master/2887140.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Malware-1-master/32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Malware-1-master/5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
Malware-1-master/96591.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Malware-1-master/Amadey.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
Malware-1-master/Blocked-v1.0.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Malware-1-master/Download.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
Malware-1-master/Illuminati.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Malware-1-master/MEMZ-Clean.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
Malware-1-master/MEMZ-Clean.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Malware-1-master/MEMZ-Destructive.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
Malware-1-master/MEMZ-Destructive.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Malware-1-master/Petya.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
Malware-1-master/Software.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Malware-1-master/WannaCry.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
Malware-1-master/Win32.EvilClusterFuck.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Malware-1-master/apache.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
Malware-1-master/butterflyondesktop.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Malware-1-master/crb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
Malware-1-master/eternalblue.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Malware-1-master/fear.png.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
Malware-1-master/getr3kt.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Malware-1-master/iimo3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
Malware-1-master/jey.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Malware-1-master/m.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
Malware-1-master/mo3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Malware-1-master/readme.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
Malware-1-master/wannakey-master.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Malware-1-master/wintonic.exe
Resource
win10v2004-20241007-en
General
-
Target
Malware-1-master/getr3kt.bat
-
Size
13KB
-
MD5
4e2a7f369378a76d1df4d8c448f712af
-
SHA1
1192b4d01254a8704e6d6ae17dc2ec28a7ad5a49
-
SHA256
5e2cd213ff47b7657abd9167c38ffd8b53c13261fe22adddea92b5a2d9e320ad
-
SHA512
90e6eedca424e2ee37c78e0c0380db490c049b0378541812734c134510c40c6e4c48c4e213f395339ed99ff337ef087b6056ac5aafb246c1789ca6082dcabd2e
-
SSDEEP
192:AOyUySl0UaDz2gWsIzlmj+BxZ3yqueWQx0lZicyC8Sh31xcjBzyxwn7AVhllz3:AVODaDSHMql3yqlxy5L1xcjwrlz3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation MEMZ.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation MEMZ.exe -
Executes dropped EXE 7 IoCs
pid Process 4816 MEMZ.exe 1692 MEMZ.exe 764 MEMZ.exe 2960 MEMZ.exe 4396 MEMZ.exe 2136 MEMZ.exe 2296 MEMZ.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings calc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1692 MEMZ.exe 764 MEMZ.exe 1692 MEMZ.exe 764 MEMZ.exe 1692 MEMZ.exe 1692 MEMZ.exe 764 MEMZ.exe 764 MEMZ.exe 1692 MEMZ.exe 2960 MEMZ.exe 1692 MEMZ.exe 2960 MEMZ.exe 764 MEMZ.exe 764 MEMZ.exe 764 MEMZ.exe 764 MEMZ.exe 2960 MEMZ.exe 1692 MEMZ.exe 2960 MEMZ.exe 1692 MEMZ.exe 2136 MEMZ.exe 2136 MEMZ.exe 4396 MEMZ.exe 4396 MEMZ.exe 2136 MEMZ.exe 2136 MEMZ.exe 1692 MEMZ.exe 1692 MEMZ.exe 2960 MEMZ.exe 2960 MEMZ.exe 764 MEMZ.exe 764 MEMZ.exe 764 MEMZ.exe 764 MEMZ.exe 2960 MEMZ.exe 2960 MEMZ.exe 1692 MEMZ.exe 1692 MEMZ.exe 2136 MEMZ.exe 2136 MEMZ.exe 4396 MEMZ.exe 4396 MEMZ.exe 1692 MEMZ.exe 1692 MEMZ.exe 2960 MEMZ.exe 2960 MEMZ.exe 764 MEMZ.exe 764 MEMZ.exe 764 MEMZ.exe 764 MEMZ.exe 2960 MEMZ.exe 2960 MEMZ.exe 1692 MEMZ.exe 1692 MEMZ.exe 4396 MEMZ.exe 4396 MEMZ.exe 2136 MEMZ.exe 2136 MEMZ.exe 2136 MEMZ.exe 2136 MEMZ.exe 4396 MEMZ.exe 4396 MEMZ.exe 1692 MEMZ.exe 1692 MEMZ.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 6100 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 6100 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2296 MEMZ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2244 2056 cmd.exe 82 PID 2056 wrote to memory of 2244 2056 cmd.exe 82 PID 2056 wrote to memory of 4816 2056 cmd.exe 83 PID 2056 wrote to memory of 4816 2056 cmd.exe 83 PID 2056 wrote to memory of 4816 2056 cmd.exe 83 PID 4816 wrote to memory of 1692 4816 MEMZ.exe 84 PID 4816 wrote to memory of 1692 4816 MEMZ.exe 84 PID 4816 wrote to memory of 1692 4816 MEMZ.exe 84 PID 4816 wrote to memory of 764 4816 MEMZ.exe 85 PID 4816 wrote to memory of 764 4816 MEMZ.exe 85 PID 4816 wrote to memory of 764 4816 MEMZ.exe 85 PID 4816 wrote to memory of 2960 4816 MEMZ.exe 86 PID 4816 wrote to memory of 2960 4816 MEMZ.exe 86 PID 4816 wrote to memory of 2960 4816 MEMZ.exe 86 PID 4816 wrote to memory of 4396 4816 MEMZ.exe 87 PID 4816 wrote to memory of 4396 4816 MEMZ.exe 87 PID 4816 wrote to memory of 4396 4816 MEMZ.exe 87 PID 4816 wrote to memory of 2136 4816 MEMZ.exe 88 PID 4816 wrote to memory of 2136 4816 MEMZ.exe 88 PID 4816 wrote to memory of 2136 4816 MEMZ.exe 88 PID 4816 wrote to memory of 2296 4816 MEMZ.exe 89 PID 4816 wrote to memory of 2296 4816 MEMZ.exe 89 PID 4816 wrote to memory of 2296 4816 MEMZ.exe 89 PID 2296 wrote to memory of 3528 2296 MEMZ.exe 91 PID 2296 wrote to memory of 3528 2296 MEMZ.exe 91 PID 2296 wrote to memory of 3528 2296 MEMZ.exe 91 PID 2296 wrote to memory of 4672 2296 MEMZ.exe 106 PID 2296 wrote to memory of 4672 2296 MEMZ.exe 106 PID 4672 wrote to memory of 3920 4672 msedge.exe 107 PID 4672 wrote to memory of 3920 4672 msedge.exe 107 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108 PID 4672 wrote to memory of 5100 4672 msedge.exe 108
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Malware-1-master\getr3kt.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\system32\cscript.execscript x.js2⤵PID:2244
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:764
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /main3⤵
- Checks computer location settings
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt4⤵
- System Location Discovery: System Language Discovery
PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=facebook+hacking+tool+free+download+no+virus+working+20164⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffbf5a246f8,0x7ffbf5a24708,0x7ffbf5a247185⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:25⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:35⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:85⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:15⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:15⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:15⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:15⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:85⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:85⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:15⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:15⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:15⤵PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:15⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:15⤵PID:5568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:15⤵PID:5680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1820 /prefetch:15⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:15⤵PID:6004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6580 /prefetch:15⤵PID:6092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:15⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3836 /prefetch:15⤵PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,6025263045294138589,16241978091207898965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6856 /prefetch:15⤵PID:4676
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://motherboard.vice.com/read/watch-this-malware-turn-a-computer-into-a-digital-hellscape4⤵PID:5504
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffbf5a246f8,0x7ffbf5a24708,0x7ffbf5a247185⤵PID:5516
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=my+computer+is+doing+weird+things+wtf+is+happenin+plz+halp4⤵PID:5964
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffbf5a246f8,0x7ffbf5a24708,0x7ffbf5a247185⤵PID:5980
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=the+memz+are+real4⤵PID:3388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffbf5a246f8,0x7ffbf5a24708,0x7ffbf5a247185⤵PID:1124
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4412
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1164
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2244
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f8 0x4901⤵
- Suspicious use of AdjustPrivilegeToken
PID:6100
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:2004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD567700254167901a32f3aadeadb35a4fe
SHA110f216e1a0fb588858e7c1112b9888dbf59d0a3b
SHA2569953def2aa8cde57ab156a80d1d45b90bc49b2e5b21ed4e3f4cb9744c1f70bbc
SHA51243f2dbd4f95b4c9354a6946e6eb80c84569ec36cf52cf425d175fa8231f129482459f1ee6c0969f1b4e2a40345167e1f70b728b915a81aff8842695706409e01
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD530821225b2311743642548639bb9c0f8
SHA1242259c7479e4d19dc767a991ea437899b4299b7
SHA256401a484dcb43441e5e129931a9fdcf40c870e94f3d450704336c1d2fae92dea6
SHA512caa10c2d6534272be96ba19b4e474f6911bf71c5b9900aa0097d66ba70696cba9ad589fcae1bc1d108c38edc73684cef8d68a7f669a0d014b1fe1b0522425ac9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5cd64e433ad3230602742c45ef15c1862
SHA17ed320710fde9897b1148590842ff0aeb69b29f8
SHA2569493b5990c0bd090faada16cfb245a799fe5a29011f3e19c221382171504fdf0
SHA5124e9d7c76cc28bf3ddf7111b278c000bdeaf134835e987b96d5bfcec749c2efd01cd777ec3fe571192430c66d8c463d0fee3edb839331dd767d4fedeec8f4db90
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5019bb2983af1235f41c46ba3d61345a5
SHA159a7cb471d3685fdfeb6450f47ce730c393e9fff
SHA256853d75dc067f5b28da8f7ea6051d54b8c798b5dc9cb6031c74008b791cdbf95b
SHA512794e02900b85f20398ee6811ecb47e3b568e4ccd7201dd1fe8edd59b5990bf84ab19a8c7e6f6196484e17866e2542b7f0d2eb520fb8b5bb9a4d1011500fdcb2d
-
Filesize
6KB
MD54c51fc6fb845d6922228a0778c6aa8e6
SHA1329de62bbac52b2a05cd3b2ffe2d6105ffef4df6
SHA256bd3122c1f50037bdeee6f0fc3d2017f6bc3efa5ba51efda6db7497275ee4ff4a
SHA512dd759f44f59654ada3b7a4137ae8410aeffc5be918d38242459918a179264a9f1709a6047003a40903f4c04c31117b5d87f98de6526cc9026c8a1b8f8f971da5
-
Filesize
10KB
MD52b3c6dcd583f28bb2bc4a9eaa410ed1e
SHA18266b65e8af54e27c911b8ac193c0827092a2249
SHA256cd7c59d1fd9d21e8b01ae35b1d4f8a73933474613013cbc696782a0f6025c556
SHA512a833808750a0fe083a336c6a5f7b711dc6c032379907a899eb0527c476e725413f66fbdde076ab055fabd15356cf689abe5cf3023a3b421f5c7ae3d0f800001a
-
Filesize
10KB
MD57885d6e4136859a51081c3bb642e2a84
SHA1463db1a4e81b588ee1f88fa894a4ed7e96df20ff
SHA256a9c9f7a924c838ebb59ada84c4afe6c9cea533f582a0390cf07811d9b813b535
SHA51284efcc4a823fa89de8fd94004a7e5a450a1ac0e4ac63c43b184f6d339c09a90e5520cf31a6e1f0bf3cfd4078f7e49bdd7341936bad65de7b1086f2c6237a4445
-
Filesize
5KB
MD56254d0d1d2988bdaeebd7c0369d0e4d3
SHA13868a4f59b6fa5d965aa2a808f9fae03ab47103d
SHA2567edbea0ec296a280ce22e4842097277842dd80f2672004cd756025575ab2da5f
SHA51252a32d95d972f26379c06f9260bf9fd32545db747f51e0add293ffae81b81003bbd6b993cb1e9530e446e55ba8e7f7cf8cb314d6098f4532c2dd9e74d877a340
-
Filesize
9KB
MD5f94083b92012f88d7f8965bf6cef7de8
SHA1ea89f325343ae75502aab23f673f362c3773a323
SHA256e45a98830474ae813fd7e94b0fdcc1d3ab49d5a6aa3dbfe7b4e50e003443a32a
SHA51246853e56663462bd866cf56762c518d2db33acc9e4f9e94e26a24bc18d450c851b35edb571ec62604bdea9a32ea616da9425623571c86f723a5fa9030b902a07
-
Filesize
6KB
MD55ff1383e41d1c9b245fb785a14e806a5
SHA1000c0cd13196dd5e37eb695272410048754a177f
SHA2568e581dcca31b7b1910c30d682604d8c991392f267066430a909e82f05a3dbc46
SHA51248006dc6d292d895f1bdcfb3ba0419a92a77a0e96b55e38c31753692afa58701973be7b0e95f3ef7cc7f2f60577bbfc80c9710b882f51f6783dc3a556ef9ee22
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5beedc30c70238d088f90ad2cbf5a0443
SHA1cded30603736ad9391f681dd9d5801cbf398119d
SHA2568e0fb0a68ce7f5491ea9d0afed9076886842f6e4cb07f93c9d509e6df53e371c
SHA512516ad21f6b761387050df19a5cc78f22efde171e336dcd7802e0352bfe8c503e01669b760c800fb4fbfcba2f431b6055095e0f3f98c747b3fb35f3592a894046
-
Filesize
11KB
MD51882f3dd051e401349f1af58d55b0a37
SHA16b0875f9e3164f3a9f21c1ec36748a7243515b47
SHA2563c8cea1a86f07b018e637a1ea2649d907573f78c7e4025ef7e514362d09ff6c0
SHA512fec96d873997b5c6c82a94f8796c88fc2dd38739277c517b8129277dcbda02576851f1e27bdb2fbb7255281077d5b9ba867f6dfe66bedfc859c59fdd3bbffacf
-
Filesize
4KB
MD5214f98cb6a54654a4ca5c456f16aed0a
SHA12229090d2f6a1814ba648e5b5a5ae26389cba5a0
SHA25645f18ccd8df88c127304a7855a608661b52b0ca813e87e06d87da15259c45037
SHA5125f058b05f166e2688df7b3960e135ada25bbcdfbb62a11da3cf9e70c08c51e5589a1e6ca2250318a694d27197f2c5ba1028c443831c43fba2171ca8e072e9873
-
Filesize
448B
MD58eec8704d2a7bc80b95b7460c06f4854
SHA11b34585c1fa7ec0bd0505478ac9dbb8b8d19f326
SHA256aa01b8864b43e92077a106ed3d4656a511f3ba1910fba40c78a32ee6a621d596
SHA512e274b92810e9a30627a65f87448d784967a2fcfbf49858cbe6ccb841f09e0f53fde253ecc1ea0c7de491d8cc56a6cf8c79d1b7c657e72928cfb0479d11035210
-
Filesize
8KB
MD563ee4412b95d7ad64c54b4ba673470a7
SHA11cf423c6c2c6299e68e1927305a3057af9b3ce06
SHA25644c1857b1c4894b3dfbaccbe04905652e634283dcf6b06c25a74b17021e2a268
SHA5127ff153826bd5fed0a410f6d15a54787b79eba927d5b573c8a7f23f4ecef7bb223d79fd29fe8c2754fbf5b4c77ab7c41598f2989b6f4c7b2aa2f579ef4af06ee7
-
Filesize
14KB
MD519dbec50735b5f2a72d4199c4e184960
SHA16fed7732f7cb6f59743795b2ab154a3676f4c822
SHA256a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d
SHA512aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf