Analysis
-
max time kernel
104s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2025, 07:12
Static task
static1
Behavioral task
behavioral1
Sample
Factura Honorarios_ 2025-04-9.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
General
-
Target
Factura Honorarios_ 2025-04-9.exe
-
Size
545KB
-
MD5
0d6525a23326e202d8e6bf3796a2bc58
-
SHA1
4e4848828aa50fd6075f52fb47ff9a39e537da1f
-
SHA256
9c610dc246159235ce291264cf8f46ec080b74cdd27d0d5d23241c89792df5ad
-
SHA512
5c3b1fbe21ebeaeef6958336e7d42ac59b80823885f1fe9fbeb9917cb418b3a1287ebf6e78c82a3cfe7ad674799513a64286181feee1a5a19533448bf6b00583
-
SSDEEP
12288:T227fJXAg9x8ghMOEvFJ9eJ1rmRZ4L5vluMyiAL0L2c8QuUw:TT7lpx8uMX/4J1rMZ4tFrA7cZe
Malware Config
Extracted
Protocol: smtp- Host:
aacrianca.pt - Port:
587 - Username:
[email protected] - Password:
ec98ret4
Extracted
stealerium
https://api.telegram.org/bot8148338634:AAFvLNrhxaF7bMPzQMLbUnueRMJvDIi5kcU/sendMessage?chat_id=
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Uses browser remote debugging 2 TTPs 3 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5764 msedge.exe 1884 msedge.exe 2800 msedge.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation Factura Honorarios_ 2025-04-9.exe -
Loads dropped DLL 2 IoCs
pid Process 1984 Factura Honorarios_ 2025-04-9.exe 1984 Factura Honorarios_ 2025-04-9.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Factura Honorarios_ 2025-04-9.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Factura Honorarios_ 2025-04-9.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Factura Honorarios_ 2025-04-9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 26 drive.google.com 27 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 176 icanhazip.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sive\dickered.ini Factura Honorarios_ 2025-04-9.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 5688 Factura Honorarios_ 2025-04-9.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1984 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Factura Honorarios_ 2025-04-9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Factura Honorarios_ 2025-04-9.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4800 cmd.exe 64 netsh.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Factura Honorarios_ 2025-04-9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Factura Honorarios_ 2025-04-9.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4712 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 1 IoCs
pid Process 3552 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe 5688 Factura Honorarios_ 2025-04-9.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1984 Factura Honorarios_ 2025-04-9.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5764 msedge.exe 5764 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5688 Factura Honorarios_ 2025-04-9.exe Token: SeSecurityPrivilege 5792 msiexec.exe Token: SeDebugPrivilege 3552 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 5688 1984 Factura Honorarios_ 2025-04-9.exe 95 PID 1984 wrote to memory of 5688 1984 Factura Honorarios_ 2025-04-9.exe 95 PID 1984 wrote to memory of 5688 1984 Factura Honorarios_ 2025-04-9.exe 95 PID 1984 wrote to memory of 5688 1984 Factura Honorarios_ 2025-04-9.exe 95 PID 5688 wrote to memory of 5764 5688 Factura Honorarios_ 2025-04-9.exe 109 PID 5688 wrote to memory of 5764 5688 Factura Honorarios_ 2025-04-9.exe 109 PID 5764 wrote to memory of 2612 5764 msedge.exe 110 PID 5764 wrote to memory of 2612 5764 msedge.exe 110 PID 5764 wrote to memory of 4768 5764 msedge.exe 113 PID 5764 wrote to memory of 4768 5764 msedge.exe 113 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 4928 5764 msedge.exe 114 PID 5764 wrote to memory of 5676 5764 msedge.exe 115 PID 5764 wrote to memory of 5676 5764 msedge.exe 115 PID 5764 wrote to memory of 5676 5764 msedge.exe 115 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Factura Honorarios_ 2025-04-9.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Factura Honorarios_ 2025-04-9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Factura Honorarios_ 2025-04-9.exe"C:\Users\Admin\AppData\Local\Temp\Factura Honorarios_ 2025-04-9.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\Factura Honorarios_ 2025-04-9.exe"C:\Users\Admin\AppData\Local\Temp\Factura Honorarios_ 2025-04-9.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:5688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging3⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x264,0x7ff9901bf208,0x7ff9901bf214,0x7ff9901bf2204⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2872,i,15060414473882471963,7988232089043177454,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2868 /prefetch:34⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2840,i,15060414473882471963,7988232089043177454,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2832 /prefetch:24⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2908,i,15060414473882471963,7988232089043177454,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2900 /prefetch:84⤵PID:5676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3384,i,15060414473882471963,7988232089043177454,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3380 /prefetch:14⤵
- Uses browser remote debugging
PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3412,i,15060414473882471963,7988232089043177454,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3400 /prefetch:14⤵
- Uses browser remote debugging
PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5392,i,15060414473882471963,7988232089043177454,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5388 /prefetch:84⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5404,i,15060414473882471963,7988232089043177454,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5400 /prefetch:84⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5816,i,15060414473882471963,7988232089043177454,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5812 /prefetch:84⤵PID:4392
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4800 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:4840
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:64
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:3608
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:3748
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4240
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\054d8a7a-333e-4cc9-b2cb-a91618d85531.bat"3⤵
- System Location Discovery: System Language Discovery
PID:3192 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:4388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 56884⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\SysWOW64\timeout.exetimeout /T 2 /NOBREAK4⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4712
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5792
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:400
Network
MITRE ATT&CK Enterprise v16
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5998db8a9f40f71e2f3d9e19aac4db4a9
SHA1dade0e68faef54a59d68ae8cb3b8314b6947b6d7
SHA2561b28744565eb600485d9800703f2fb635ecf4187036c12d47f86bbd1e078e06b
SHA5120e66fd26a11507f78fb1b173fd50555dbd95b0d330e095cdd93206757c6af2780ece914a11a23cd4c840636a59470f44c6db35fa392303fb583806264e652016
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize327B
MD5341f10ef464f738cd5cec5411f306025
SHA1b2aea65d7756ea4836b43b1cd5797d9d6227069d
SHA256b9b5356bdc24c7e21c6a0b614dd4acc960001f229da7200a30c9e60cb5b0bffd
SHA5120413c1fb56700e9b5c33e14320881be6e5eabd4e58401b35017deba8b74975ea67869710da86e944cd478830a58984740a9c0badc8888d5596d0477f9744e583
-
Filesize
228KB
MD5acf5726318a39df8efc6defccaa57ffe
SHA1e60c8029fcb5780d490b19875333a897d642bb59
SHA2561d1fd8b3dd278cf8cc5ec9a56aff25fb80b6812923c95c1beb23a53d02895795
SHA512dc8fd7ffca3abba14f17470059284c712f1c67736e4602a85614a56ff6a6ab6b5dedda56da5ea26a6fa1fedf5db0d781c9b72adfe9a8de2a4dc25f29a02499ec
-
Filesize
40KB
MD531bfcf780e701333d32b83bf3dc932a1
SHA1873be7a99bb571b03f5c7ac302087e12670b8018
SHA2566ec92f93ec576c6461f8a132dfd368616f4db59900294930c2690edf2ca55938
SHA5120ab6c5dd0c1655253ca42357dec4488bd8c0541a81e4a0d12ce7af184d6bfb2fb932192530e2f763a9f930b935d80ad298464a013905e5c575a14afd79070982
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD56571680e4e951f65fa3bff86c2c338d1
SHA1e9fb25364f4419cedd2652860f9e679a3ebc6aa2
SHA256d0895af2f960ef79ad10d48085dfdedf4d5a51d9c83111873269cefc9132e0ba
SHA512ca9c72db432b325af5ef18adbe9509abebebe291d84f90cb0bed3c402550c21a76c3126aa20892d02feb2a9a01f5018c435885a7856445ed3770f509068804bc
-
Filesize
152B
MD5a201ecba5daa4a3ee3f11bf8c6bbe65e
SHA169f687e0ce43c62bfadb613eab4cfdd6179cc84b
SHA25668783c2f6f6e9568f1f3b760d9f9bfbea6bd5486b90ebb164efe385365cd9ec2
SHA5126218f97b74fe49d5219d3fbaaa5e07e0ca724ed6baad9c8586482da1645e9bcea443ce2a7d73ac0df965536acc622618f0bdf7d346c82b232584ec8184ff39bc
-
Filesize
11KB
MD575ed96254fbf894e42058062b4b4f0d1
SHA1996503f1383b49021eb3427bc28d13b5bbd11977
SHA256a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
SHA51258174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4
-
Filesize
11B
MD5cda05fedfd1133dfc6439e441829b6ba
SHA1e0dfbcfe83a13922d365506312212928871f9c0b
SHA25627fad7aa07fb564d9f9e0cbaf6515fe34bb0f8647cd200fee1eaad0167523099
SHA5121180a5fac7c9c8ce445b5966b45bda7d38bb65d2ae2b1bb096d01e09476622bb0bf745dfed3104cd7b5da766322653bb14720b3394e2cb87950191a66b94efaf
-
Filesize
15B
MD564c34dda0003aa56030f5cef66dd8616
SHA18f3f9e66c5b9d35715b3c6d8aa800450f6db95fb
SHA256a3f3ef6dbcdd25537eb2d093b42fcb85c2e84522ae1aab7bf924dc00eb3ef870
SHA5120f01df79160393b6e7c6ea2d302bd9c1613a269ca0cb09d300d6c98dbff12e0aa3456e89c16842de77353c32edb4df565ac0709a66dc48375088f8dbba3b277f
-
Filesize
22B
MD57b892b8ac25286dbfdf8fc8817a3e958
SHA1240e4a574136f73209bdcc9010d20ce1be4ff364
SHA256dbb3bd7c79c96328be8974b16eaa4cdd93c9bd923c968a36d45474b9f1f93cff
SHA512a0d65c29e0256655382aa18fcd192b357c02d4c2b7047377e7fc45815c8b3961fbcb90c334a32255a53574751679f0030602147efa43d02633ce09e7b3e8f038
-
Filesize
56B
MD50b521409ce6a756432812fc5d7869c40
SHA1c1466e82f0f61c51535cbbcab9205e1eae515c70
SHA256c86e8542db3ea3d60386c9e39256b80b4d8a80f66e6de1f3b377c2f71cc478df
SHA51232b8e5fe4c25d42eee784bd63881b629dc157dcfb0e5dc8f5688071ccc923bba19c520c5306b73f436f9b029c943450157e5facecf707e07a8086eabefb45282
-
Filesize
4B
MD5cde63b34c142af0a38cbe83791c964f8
SHA1ece2b194b486118b40ad12c1f0e9425dd0672424
SHA25665e2d70166c9a802b7ad2a87129b8945f083e5f268878790a9d1f1c03f47938d
SHA5120559d3d34ad64ccc27e685431c24fc6ead0f645db14fa0e125a64fb67dbd158c15432c1fc5407811aac8a3486090dfbcfcbc3c6bf5aa0ec73f979ef62d14853c
-
Filesize
6B
MD550484c19f1afdaf3841a0d821ed393d2
SHA1c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b
SHA2566923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c
SHA512d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b
-
Filesize
7B
MD567cfa7364c4cf265b047d87ff2e673ae
SHA156e27889277981a9b63fcf5b218744a125bbc2fa
SHA256639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA51217f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b
-
Filesize
8B
MD5c3cb69218b85c3260387fb582cb518dd
SHA1961c892ded09a4cbb5392097bb845ccba65902ad
SHA2561c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101
SHA5122402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422
-
Filesize
34B
MD52a9c98ea1aa7a05604ab51073fcd45c7
SHA13f970ebeb4f5ef40f8bb1e16d64ab410c3af3962
SHA256ba493b1e2704c417662224230bffa2effae24f9fbf8c56a7bcb93ac02bc2abd9
SHA512fe999f6186c4bb20113cfdddba193cf777941a9ce223f0c6d8f85dc5e2668df6f820922d7b75f255ec2d5355f1881f3867686363f4c5f630ffa8b48b079d7647
-
Filesize
45B
MD534d32f9b446e46883ec3157794403748
SHA1e797e81a28e395ea751871b21e638e43d62d0f61
SHA256a66d886953526d5601da515e1aa53a3f8cbc829aedd557cdf4d0f9573793486e
SHA51248b0f49ca3604f5a21cb2b850ac19771a17e0fa03cf0b3d6e616e330f136c71dcc623ac36b5b801c4fda203327290b8e3f5ec01a0ea546a87c2ae89a88b74ed1
-
Filesize
46B
MD50553e87a8f74189e757bfada8ab0ab9e
SHA1f4c99fe7e957926b88a46ae93d2f02b855f6d88f
SHA2562ccb8084cb357c920cad749dcb3a4c25339f530c9947dfc8e1f1d54cb7b0ce24
SHA5128df3168e8f53b40ddf4b2e83d4e3cad2c88edfb484292e263ee5264d7992af6f1aa8a3618f5e90a02082a3642a894bfae43853b35abaef833a8aa5b590fc70fc
-
Filesize
48B
MD5040cc34b899dd5230d5113b5156ec5d4
SHA160a49c8b3e3f33b38c1780e8826e50d9672c5bcf
SHA256454a97bbcd88c00fd8617e38fec2ebc855a608adbb751ad5ce4355f6bd171c32
SHA512e6d441445f20c73e6e23203323dd5ff68ac2a74767fa69aac7c2c1b05e7bd981cf461b66c9d516dc53b4bbc32117c12e103187cfca891846b9d42ee2aa2c423d
-
Filesize
52B
MD55d04a35d3950677049c7a0cf17e37125
SHA1cafdd49a953864f83d387774b39b2657a253470f
SHA256a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266
SHA512c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b
-
Filesize
29B
MD5494d0d159b1e574f09fe79bda72f9c7c
SHA1257a74558f794976d51b62a2af3b8e8e0bf8d999
SHA256aafe3e506b4a9cdc77a876716f2ca016314e4529646d588cd6ee1b8573bbcd28
SHA51293adc30e04f5d3f5f6e0372c77d20c148322717d53ca923145d2428ee960158eafed406e9af4996ce969c69b5b690c1758a3857891fb74e27c2f1685aa4ba0a6
-
Filesize
2B
MD525bc6654798eb508fa0b6343212a74fe
SHA115d5e1d3b948fd5986aaff7d9419b5e52c75fc93
SHA2568e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc
SHA5125868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898
-
Filesize
10B
MD59a53fc1d7126c5e7c81bb5c15b15537b
SHA1e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1
-
Filesize
14B
MD5588cf7cdaab7fececa39c175c806ac8a
SHA1c05dd1da9fe6f60c6480d5a7fe568bd231efcc01
SHA2568ffa16681c60f9e5ae447896f50bebc45c5d27cb31e6ca97eaf3def44a2701f7
SHA5127264057bad861cbfbf4aeb62c211b726c94540247e5a2282057ef2e583c4b6f1bc1c441217f68c6d280c7f4990ceaab6cd7fc34758375b3d89e3eae25d75e567
-
Filesize
21B
MD5cbebbb257a8311891f9bfccf5355e077
SHA1b92ad8024d7b255165e48c519e71ed780d928cda
SHA2564b53da02410254217ce2ca226b04cac355f795702acacee4695092b5c58af01a
SHA5129b775b4e202b152996e5b0cea8f2c410026d7a75a3d66168051bc86dde49ccd11f1d8e49ab87a2ce7608d32a832bb3ed2e56319cb27e6890355fc87cf910f295
-
Filesize
26B
MD5b42b894b52848a0731561b7d91665a86
SHA16c849620fa8de81e3ae792763ee16f8557422243
SHA25647c3200448acdbbc900646793f4e4bee95b3967eb7b2c1f5dfb5ced4277ba5fb
SHA51296b670288335d02c51606f39b3b8007780d34405ee7f2ef0ff977af15cd9031a9fa06383bbea2fffce915c34852ec698f3f3d1a18c64a0fdcfee97c09e70a49a
-
Filesize
39B
MD53907e75ccbfb31e9e185d12557f6fb86
SHA1b863c0bad35d75b867a148e6019c27d1bded316f
SHA256920097b9f2d988a779e88bdec6b94c826a1c09745e592572f81253e7f745c80a
SHA5122e8028e4105335519e5c986fecd58078f67461178e3974c4f9bda0e0bfdf0b694ba192f93b3b05043c5cc9b7baf7bede3edc848bac76fe1adc3cfbc843e1a090
-
Filesize
60B
MD535d5c0b61e3c0aa20966937a0964bc5e
SHA16e6c6035b03552d5bd664ae37a13bd63b7cfa729
SHA256504c507ce57a2aeaff97aa5a6c39614d40cf9fa70fdc7bb062e9410930b5416c
SHA5126ae1ca6750fbee20dd8e03e3e2b19059da008122a1658ab270dbd1767bab504ead7d301a3d7a6dfa9c922b71b9b6ba1a27fd5995a6d5c66f32711c6ff55b78dc
-
Filesize
31B
MD55e884655c8f5685c77e96ab751afcc46
SHA1438e7927bcb8633ab39b9e3b7dd7511e5806a93b
SHA256d12006a59b2bcda77dc8bb9ffb174cdfc818c355a30c8a42fb16d13c0558ad63
SHA51285c0174ee0d2bddc85d60fe340e409730825fd7b7d15a4456de500f8befcfbc6f47e6c84333f4649eef97d2ced0cc132d1395de744999117125b92abbf42b51b
-
Filesize
41B
MD59b63af13344f6ef82f01f463737f3a43
SHA18d8b471641cae2462b39fa096c26475167bbf274
SHA2568b0454c42dded71d9ee62354260d89e0565bb803a300bb2c49c9dd50fd2d1c4b
SHA512708585072fc9f56b68a2737726b580347861fc188d60b19e59d9b6b4a9fcd25e39a972254146f97d4aee32fc9502546c5da2803b027222f70de6d223e93db674
-
Filesize
55B
MD52598d3e10bec5798f73f49de505a8514
SHA14431b20a112e277250649a917f846a6627870a60
SHA25608643cfe1a514214ae4175809b7eadbc0bff209e07adf091e91748dccf9ca874
SHA51283687d6fb3238184b92f04cc70e54ede282d56e34f67781db6c4dfd9529cab30ba15d9ca3059b68f9d82eb87a8d6432e80ba0779d1438c1df861b0bb30905f24
-
Filesize
69B
MD53f9d86b820955195e9467112480c175c
SHA1c9b53af6ff79125000b5aee2afb33ce6575d4d31
SHA256ab4b36271e68b6e5b546158733c5450e775242021442a40bec4e42838eecca53
SHA512ed78bd4b7b9b953bf73b1156872864b68ba1b46b3c2e5d21c56766217ec8b70e6421796a9d31716a94d62d81cf7a2c9f83735ea7c229881d4845c70364b77a17
-
Filesize
18B
MD51a42166fa1e8a360271d4fb25c78fbda
SHA1f4d1ad6ecdc1202a2c08c03514ec814072b818d2
SHA256b271abd85535886a3753ee0a5e8957a1bf2e502c4a275d1d8f7f5ddf3b7de292
SHA512ee3342a9a407bfe56e7c65c1f1c0b15624fbffc60c88ff9e404a1dbebcfd606f42de8cb61624f992f57fca2e05d75a64611a78e508c7772ffaeb9c5924c87c0c
-
C:\Users\Admin\AppData\Local\f65452205f2f180ba55855cdb4899e56\Admin@ELDOIJJI_en-US\Browsers\Firefox\Bookmarks.txt
Filesize173B
MD570e1643c50773124c0e1dbf69c8be193
SHA10e2e6fd8d0b49dddf9ea59013a425d586cb4730c
SHA2564fe3f09cb4d635df136ea45a11c05f74200fc6e855a75f9a27c0a0d32a2f632a
SHA512664e5d9263c0137f841daeb3dff00010ffeb7291ed08ccf6d0483200cd6d6bd3c9d31ea7e67a9de6aac591397060d8f01e8469bbad67d8e2f1c3900ef24c3679
-
C:\Users\Admin\AppData\Local\f65452205f2f180ba55855cdb4899e56\Admin@ELDOIJJI_en-US\Browsers\Microsoft Edge\Cookies.txt
Filesize3KB
MD593654c0a7f4a2712729b2760cdff92ed
SHA1cf272549c774c53c6256ef777142ab55a9674e35
SHA256c325ee440ff22e39ceb09305fc3a51e600846b4cc3a499e7049f376d0ca593c3
SHA5128288ab41851f476b6485ee328b23dd5d623cf55b14b42687a0a9a24a99e0330b684801aebc625a3df43dbf9d0f49666b95d5911b5d4adf2e2568ac6d890acd6d
-
Filesize
6KB
MD5c9ab8b23eeab3423f8315aa32efb9f93
SHA1d42976e472f28b5ed3b8cfa608895fda4fd0e8f7
SHA2562318a56f5fc50fabed260f58e554109d75444dcb881ae413c7e7961ce27eaba9
SHA5122842b4f4b7d0221f86e341d6c5c0312467c2d7b86b6b49d63d6fb06e06cc2a05909d637bf976aedb39f96e141ea053485e29eabb7b98b034748baf342f8740ac
-
C:\Users\Admin\AppData\Local\f65452205f2f180ba55855cdb4899e56\Admin@ELDOIJJI_en-US\System\Process.txt
Filesize4KB
MD5977ff66aa88581bd01a8d784344509cd
SHA1a03ba039078c29eb5978591846ec63da5bc0bb8b
SHA256a97bb9c13222137a023b44932bee9429160f2c927f06d60596eb3adfc85f41e0
SHA512bf1b22cb68152b7416c916d7754ac044096fa6e8081f6feff85e0be37faa6175990ec1727a4883a745c743194630bb5f127c56ffe9981e8365399f3dcf4cd58d
-
Filesize
836B
MD50b1d6d912dac8befa67509a20a801834
SHA1422ac9324b9577ac5945c1879ca12bbf65bee56c
SHA25681b7cdd7d0dc90fda5fc57990a1e1c50730632c5c465c9a92b16db6c0343c488
SHA5126e3caf1d56d4549ae664d42ef93bce7306ffd2c264b22c3dc0330189feb1cb0cd3dac85b5418477759db5a1be44fffcea2005b97ab84707cf9321a722bd87c3d