Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17-01-2024 12:28
Static task
static1
Behavioral task
behavioral1
Sample
629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe
Resource
win7-20231129-en
General
-
Target
629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe
-
Size
4.4MB
-
MD5
d8d52a95b809c586afe1bbf5373edfc4
-
SHA1
4081f7d0211614df482969ba5af1f29e5ab2bee7
-
SHA256
629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb
-
SHA512
ad743b537b5886ff6a685d8f9666d66aac955765c531a7d82adb72425754d762b9580491382f5e9d123e03d169f931ca91d6c6df44009a219ddcd17469b80c15
-
SSDEEP
98304:0krpkIVlEVn3yUHYqLc4WAzBDCmzMVVCW8RaU5R089E8z:5dTiCIYqLc4WABetVVrER0Alz
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdpo
-
offline_id
Bn3q97hwLouKbhkQRNO4SeV07gjdEQVm8NKhg0t1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-FCWSCsjEWS Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0844OSkw
Extracted
amadey
4.12
http://185.172.128.19
-
install_dir
cd1f156d67
-
install_file
Utsysc.exe
-
strings_key
0dd3e5ee91b367c60c9e575983554b30
-
url_paths
/ghsdh39s/index.php
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/692-310-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 behavioral1/memory/692-315-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 behavioral1/memory/2372-314-0x00000000001C0000-0x00000000001EB000-memory.dmp family_vidar_v6 -
Detected Djvu ransomware 13 IoCs
resource yara_rule behavioral1/memory/1736-188-0x0000000002130000-0x000000000224B000-memory.dmp family_djvu behavioral1/memory/3016-190-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3016-194-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3016-193-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3016-219-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1472-232-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1472-275-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1472-276-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1472-285-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1472-289-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1472-291-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1472-294-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1472-326-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\Geo\Nation 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe -
Executes dropped EXE 18 IoCs
pid Process 1092 bSBQdT92NrvBostThpTHtuFn.exe 884 toolspub1.exe 916 bSBQdT92NrvBostThpTHtuFn.exe 1988 CE66.exe 1736 EED3.exe 3016 EED3.exe 2592 EED3.exe 1472 EED3.exe 2772 bSBQdT92NrvBostThpTHtuFn.exe 2820 iarrjiw 2372 build2.exe 692 build2.exe 1816 build3.exe 2496 build3.exe 2764 F1EF.exe 1164 mstsca.exe 2536 bSBQdT92NrvBostThpTHtuFn.exe 2620 mstsca.exe -
Loads dropped DLL 14 IoCs
pid Process 1092 bSBQdT92NrvBostThpTHtuFn.exe 1092 bSBQdT92NrvBostThpTHtuFn.exe 1736 EED3.exe 3016 EED3.exe 3016 EED3.exe 2592 EED3.exe 1472 EED3.exe 1472 EED3.exe 1472 EED3.exe 1472 EED3.exe 2080 WerFault.exe 2080 WerFault.exe 2080 WerFault.exe 2080 WerFault.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2984 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\04dce59b-56d9-4296-aa1f-5c39b20cc650\\EED3.exe\" --AutoStart" EED3.exe -
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 47 api.2ip.ua 4 api.myip.com 5 api.myip.com 11 ipinfo.io 12 ipinfo.io 42 api.2ip.ua 43 api.2ip.ua -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1736 set thread context of 3016 1736 EED3.exe 41 PID 2592 set thread context of 1472 2592 EED3.exe 44 PID 2372 set thread context of 692 2372 build2.exe 49 PID 1816 set thread context of 2496 1816 build3.exe 52 PID 1164 set thread context of 2620 1164 mstsca.exe 61 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2080 692 WerFault.exe 49 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CE66.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iarrjiw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iarrjiw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CE66.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CE66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iarrjiw -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2148 schtasks.exe 816 schtasks.exe 1364 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 0f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d090000000100000068000000306606082b0601050507030106082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030806082b06010505070309060a2b0601040182370a030406082b0601050507030606082b0601050507030706082b060105050802025300000001000000230000003021301f06092b06010401a032010130123010060a2b0601040182373c0101030200c00b000000010000001600000047006c006f00620061006c005300690067006e000000140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b1d00000001000000100000006ee7f3b060d10e90a31ba3471b999236030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 EED3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 190000000100000010000000a823b4a20180beb460cab955c24d7e21030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c1d00000001000000100000006ee7f3b060d10e90a31ba3471b999236140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b0b000000010000001600000047006c006f00620061006c005300690067006e0000005300000001000000230000003021301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0090000000100000068000000306606082b0601050507030106082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030806082b06010505070309060a2b0601040182370a030406082b0601050507030606082b0601050507030706082b060105050802020f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C EED3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2368 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe 2368 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe 884 toolspub1.exe 884 toolspub1.exe 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 884 toolspub1.exe 1988 CE66.exe 2820 iarrjiw -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1376 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1092 2368 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe 30 PID 2368 wrote to memory of 1092 2368 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe 30 PID 2368 wrote to memory of 1092 2368 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe 30 PID 2368 wrote to memory of 1092 2368 629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe 30 PID 1092 wrote to memory of 2148 1092 bSBQdT92NrvBostThpTHtuFn.exe 32 PID 1092 wrote to memory of 2148 1092 bSBQdT92NrvBostThpTHtuFn.exe 32 PID 1092 wrote to memory of 2148 1092 bSBQdT92NrvBostThpTHtuFn.exe 32 PID 1092 wrote to memory of 2148 1092 bSBQdT92NrvBostThpTHtuFn.exe 32 PID 1092 wrote to memory of 884 1092 bSBQdT92NrvBostThpTHtuFn.exe 34 PID 1092 wrote to memory of 884 1092 bSBQdT92NrvBostThpTHtuFn.exe 34 PID 1092 wrote to memory of 884 1092 bSBQdT92NrvBostThpTHtuFn.exe 34 PID 1092 wrote to memory of 884 1092 bSBQdT92NrvBostThpTHtuFn.exe 34 PID 1568 wrote to memory of 916 1568 taskeng.exe 36 PID 1568 wrote to memory of 916 1568 taskeng.exe 36 PID 1568 wrote to memory of 916 1568 taskeng.exe 36 PID 1568 wrote to memory of 916 1568 taskeng.exe 36 PID 1376 wrote to memory of 1988 1376 Process not Found 39 PID 1376 wrote to memory of 1988 1376 Process not Found 39 PID 1376 wrote to memory of 1988 1376 Process not Found 39 PID 1376 wrote to memory of 1988 1376 Process not Found 39 PID 1376 wrote to memory of 1736 1376 Process not Found 40 PID 1376 wrote to memory of 1736 1376 Process not Found 40 PID 1376 wrote to memory of 1736 1376 Process not Found 40 PID 1376 wrote to memory of 1736 1376 Process not Found 40 PID 1736 wrote to memory of 3016 1736 EED3.exe 41 PID 1736 wrote to memory of 3016 1736 EED3.exe 41 PID 1736 wrote to memory of 3016 1736 EED3.exe 41 PID 1736 wrote to memory of 3016 1736 EED3.exe 41 PID 1736 wrote to memory of 3016 1736 EED3.exe 41 PID 1736 wrote to memory of 3016 1736 EED3.exe 41 PID 1736 wrote to memory of 3016 1736 EED3.exe 41 PID 1736 wrote to memory of 3016 1736 EED3.exe 41 PID 1736 wrote to memory of 3016 1736 EED3.exe 41 PID 1736 wrote to memory of 3016 1736 EED3.exe 41 PID 1736 wrote to memory of 3016 1736 EED3.exe 41 PID 3016 wrote to memory of 2984 3016 EED3.exe 43 PID 3016 wrote to memory of 2984 3016 EED3.exe 43 PID 3016 wrote to memory of 2984 3016 EED3.exe 43 PID 3016 wrote to memory of 2984 3016 EED3.exe 43 PID 3016 wrote to memory of 2592 3016 EED3.exe 42 PID 3016 wrote to memory of 2592 3016 EED3.exe 42 PID 3016 wrote to memory of 2592 3016 EED3.exe 42 PID 3016 wrote to memory of 2592 3016 EED3.exe 42 PID 2592 wrote to memory of 1472 2592 EED3.exe 44 PID 2592 wrote to memory of 1472 2592 EED3.exe 44 PID 2592 wrote to memory of 1472 2592 EED3.exe 44 PID 2592 wrote to memory of 1472 2592 EED3.exe 44 PID 2592 wrote to memory of 1472 2592 EED3.exe 44 PID 2592 wrote to memory of 1472 2592 EED3.exe 44 PID 2592 wrote to memory of 1472 2592 EED3.exe 44 PID 2592 wrote to memory of 1472 2592 EED3.exe 44 PID 2592 wrote to memory of 1472 2592 EED3.exe 44 PID 2592 wrote to memory of 1472 2592 EED3.exe 44 PID 2592 wrote to memory of 1472 2592 EED3.exe 44 PID 1568 wrote to memory of 2772 1568 taskeng.exe 47 PID 1568 wrote to memory of 2772 1568 taskeng.exe 47 PID 1568 wrote to memory of 2772 1568 taskeng.exe 47 PID 1568 wrote to memory of 2772 1568 taskeng.exe 47 PID 1568 wrote to memory of 2820 1568 taskeng.exe 46 PID 1568 wrote to memory of 2820 1568 taskeng.exe 46 PID 1568 wrote to memory of 2820 1568 taskeng.exe 46 PID 1568 wrote to memory of 2820 1568 taskeng.exe 46 PID 1472 wrote to memory of 2372 1472 EED3.exe 48 PID 1472 wrote to memory of 2372 1472 EED3.exe 48 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe"C:\Users\Admin\AppData\Local\Temp\629e031747e94b66f85f83711433a1c3d084ac0a57fbcc58f970be04de2d48cb.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\Documents\GuardFox\bSBQdT92NrvBostThpTHtuFn.exe"C:\Users\Admin\Documents\GuardFox\bSBQdT92NrvBostThpTHtuFn.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN bSBQdT92NrvBostThpTHtuFn.exe /TR "C:\Users\Admin\Documents\GuardFox\bSBQdT92NrvBostThpTHtuFn.exe" /F3⤵
- Creates scheduled task(s)
PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\1000102001\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\1000102001\toolspub1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:884
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {8DB6DF04-66D4-44B9-9702-749FB1F9E461} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\Documents\GuardFox\bSBQdT92NrvBostThpTHtuFn.exeC:\Users\Admin\Documents\GuardFox\bSBQdT92NrvBostThpTHtuFn.exe2⤵
- Executes dropped EXE
PID:916
-
-
C:\Users\Admin\AppData\Roaming\iarrjiwC:\Users\Admin\AppData\Roaming\iarrjiw2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2820
-
-
C:\Users\Admin\Documents\GuardFox\bSBQdT92NrvBostThpTHtuFn.exeC:\Users\Admin\Documents\GuardFox\bSBQdT92NrvBostThpTHtuFn.exe2⤵
- Executes dropped EXE
PID:2772
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1164 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:2620 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"4⤵
- Creates scheduled task(s)
PID:1364
-
-
-
-
C:\Users\Admin\Documents\GuardFox\bSBQdT92NrvBostThpTHtuFn.exeC:\Users\Admin\Documents\GuardFox\bSBQdT92NrvBostThpTHtuFn.exe2⤵
- Executes dropped EXE
PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\CE66.exeC:\Users\Admin\AppData\Local\Temp\CE66.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1988
-
C:\Users\Admin\AppData\Local\Temp\EED3.exeC:\Users\Admin\AppData\Local\Temp\EED3.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\EED3.exeC:\Users\Admin\AppData\Local\Temp\EED3.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\EED3.exe"C:\Users\Admin\AppData\Local\Temp\EED3.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\EED3.exe"C:\Users\Admin\AppData\Local\Temp\EED3.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\e054e9bf-b5a6-4e7e-b690-d96b24f6d75f\build2.exe"C:\Users\Admin\AppData\Local\e054e9bf-b5a6-4e7e-b690-d96b24f6d75f\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2372 -
C:\Users\Admin\AppData\Local\e054e9bf-b5a6-4e7e-b690-d96b24f6d75f\build2.exe"C:\Users\Admin\AppData\Local\e054e9bf-b5a6-4e7e-b690-d96b24f6d75f\build2.exe"6⤵
- Executes dropped EXE
- Modifies system certificate store
PID:692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 14167⤵
- Loads dropped DLL
- Program crash
PID:2080
-
-
-
-
C:\Users\Admin\AppData\Local\e054e9bf-b5a6-4e7e-b690-d96b24f6d75f\build3.exe"C:\Users\Admin\AppData\Local\e054e9bf-b5a6-4e7e-b690-d96b24f6d75f\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1816 -
C:\Users\Admin\AppData\Local\e054e9bf-b5a6-4e7e-b690-d96b24f6d75f\build3.exe"C:\Users\Admin\AppData\Local\e054e9bf-b5a6-4e7e-b690-d96b24f6d75f\build3.exe"6⤵
- Executes dropped EXE
PID:2496 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:816
-
-
-
-
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\04dce59b-56d9-4296-aa1f-5c39b20cc650" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2984
-
-
-
C:\Users\Admin\AppData\Local\Temp\F1EF.exeC:\Users\Admin\AppData\Local\Temp\F1EF.exe1⤵
- Executes dropped EXE
PID:2764
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /D /T1⤵PID:2236
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5dd7e3da1d133e94af705bbd57f79eca4
SHA135043ecc3a409cf9c44eab292fa808cef1f44fe4
SHA256f9ffcbfbc4bdc6d9dd3c3f47c719106663ecdc75f21a0b64bc4225ed8ac156ae
SHA5125741a19c10cf876aa432ba8b2ff092c67e903abef03ab595bb59b9344e4e624266777858e9bb6e2a9f823e5667f01555837c8eb29fd1675b7cf10a82b263433b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD55961950eaf4c1d4880ca3547f3a8a291
SHA1c9c854a29d10b50b1a82813b56bf4387f5e3cc17
SHA256d02578e945c9c77bcc2c902b5baf08bebaf0357cdc1f059d3dd9d7c36a982f2e
SHA512c02c969dc7b33eb67877d0fecb3bdb3a42dd9eb4578eefea25d245bb2e774cf074936a274a55d2b5ac51d96b4c3206adace8018c9fff9233af9217ff2e1a4bf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ef32bd76963a463d1d130c6a89cc857
SHA1829ff7642b09a07b1e03d40248a1714f7b3e634b
SHA256878a1c5a30156f31231253795137eb185947d046b33094a084e5527065c5d5c0
SHA51228b927688f641b7f9a4ed165e0aca18b6013800971e3f159f7cf4054c4e6db54cbbbe651331678eae28a445111047d0068d9527e63cfbbd84a37337c01ab5ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f61940c49c232b168bba9ceac3f4cf9
SHA16f76eb85c9f21920a20ada2bcfb9d264b29a976a
SHA256db44eeba6bad8e750afc0bfa8cc186c509818dbce8d8823885ce1d188ac57c05
SHA512f00ec8ccb46e772cec35fc19acc72f5de1cd2a6f4eb32be6b830eac8c9295c253489dacd3867badabbe746f85979a33f5535662abf266c5347a540e4c9a1213b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5cfd653a5d4c2a8df6f7895c112974cdb
SHA16270736b5b683714b20f1e4291c5557cc96c8adf
SHA2568bda330175f3cb8c143f290017062067a3fe38c0d8cc2fae75148015974f4f66
SHA51293dbf6fe2825d28eec7fd96007bc99f7f1112ade61da0484a4375d9f876529cf6b4a8ca4153114471556e3148d601ac902507e2dfdabb6cac1a85e79b285c478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD577a9f225835c3d6baae00f3eebe08168
SHA1d767ec79adeb1fe264feb0b680f5b8e37799911d
SHA256dd9f81aacb28725b8c5f27a34809dad35eda36b6c8eb13be9f02566036a05bab
SHA51209a21feddce9047ce729634d635d4c7bda07cef336e0b5dabd661b40a8d22ea74bb44be5d4e78274ca0f8e95ebeb7649f70886da4d18450313d82d4b2e09afa3
-
Filesize
282KB
MD552923217955895998395d99d2695d28d
SHA1b200b6937364aa4eeedf5872e7e463ae18cc97ce
SHA256528b2ebcf74a05f0028566dce1e88eec0e810177d4ed7f43f58974e78aa8d4f8
SHA512d256d38ff88f0a1abbd9149c9fbbab924973446a1b11d8466ac667b798d4df8aec67c4152c84b764723790669eb1ffff1d8030232153bdfbb016a7e13d01aad7
-
Filesize
780KB
MD58e81ca6c15a40c86e38756e15604b834
SHA1a1fb84f9bf161d22c7bc91dd24bebdaae9879d22
SHA256c4027637b43d07aeb72ab9ce712bf3d3fcb54d3d1200fe54abd82422753d3062
SHA512d82fd0245964d29d0a15b8a8d04f19a06bb2100379556a2164818bdfd2643478f9c7f2ba83c34be324675f43c20b28497f359af3425beed76cabe9d012076718
-
Filesize
3.0MB
MD5f5650e38e93a162eb6c21d37b092b135
SHA1a9b5fea9850a665399b38e7d498885144a77c0bd
SHA256a5aa040950eab03d16bc841a7fc85e29e38c64c144b0218d68248454dffc812b
SHA51236a2bd06728e9b3b14dc857835937b6edc819310fc4a9d63b231a8ea4267fe34edcc63763e5cb6d1e862ae6bc981d0b239b08fd0a876052b69664eaa8a18111b
-
Filesize
2.8MB
MD57feb03227ad7f02226da190fc8d07cc4
SHA1f2cf40b6dea0f012ee05e19fccfb5617c5d2d382
SHA256ae6c294454224040dc8d27f7aa4b88ad1e2fe5faf8706554568285bbd9ce9299
SHA5129d5d92561bca93a9d6448d98ebf8d4b7d27d1e1ec2aa05c50eb0f053c9e6ebd32bf0ebbbf6a122b6246ba59165aadfbb17970c38d220cb93a2383f8ea8bb032f
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
278KB
MD5d04d2f1ecbe2f4491d811c8b9afc477e
SHA19ce75cc8c7de520cb07767ad429223fa9ad23f6e
SHA256e3d16f3f69fa0857f966022387ee6f9408385ddf389d09ffe7dc44acc8ac1ad5
SHA512357322814852a60e7ebb7ff9d2bbbb346d52c7fd6b1f1fc43a265b229fe683f0403e1963d7ad054ced2cec3ddc3bf986ba997c9827d0f513f188b6e80d4673b4
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
Filesize
234KB
MD52b2f865a0c82f4580d76cae2b383ade5
SHA1470cfb1ea17b22e5c7cafe91d8f6af8860b2728d
SHA2568115142efa8170e8f609b2cc8740e1e9cbf8633bff2651fd9d8b2eb1be11d034
SHA5124cd89cf4ff79a713d1b8dbb84cd34065e12ba8906e36ac260a92df9edeb917c6fd3ee761f3dc9e4cf60b5802b3731df7cd045502820b89d740fc37d627f40aa3
-
Filesize
320KB
MD52d65492ea6b38bd6fc8ee8a64bef1524
SHA147bd0cacd3a668f593b762d92374946e03e7829f
SHA2566280b0782a483d381de0bc671f603c9af4975d6e5e7d2793bc5c857c2bdfded5
SHA512152686ee7c268e53c371461e68475687c95bd4a0fda9c3e9d54086ab53b8cb3135a0ecbbe1febc94b0da6470fe512dc0f7d425870123df3ef72c3feb22dc66b6
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
64KB
MD5b625cd81e75793990d000387da3d2018
SHA1d4aa9992ab928758a61a72f9e5032258149e8134
SHA256c909a4003834634a29c7f35a1a0ee6e84953493f83e97e8b01b073ab17fc0b7a
SHA512324205bacee37519e295f0b69a6ef5ef385bc0a80f45f5af563a1a355790fcf77d8c6f83f02f79e8c25bbcfb1dfe43cd1fe1040e246c1c333f0a8626e77edc34