Analysis
-
max time kernel
132s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 23:28
Behavioral task
behavioral1
Sample
a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
a71c0e5f4c76062235112dbeb17596df
-
SHA1
8f16d952c45773cb02e9d3819ce8db53ef4fe31f
-
SHA256
f4d9522e0a5e41be0ecd43628726b9a04516bc6cb258329bf5212e8c85621b36
-
SHA512
a789d590a20bd44de05eccad429d237aee969338e7b58a3dedb948e66ea8fd84232b25056be94d80ee639355a32d721c18b804d939184aaac77053752180e055
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZW:0UzeyQMS4DqodCnoe+iitjWwwC
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 3288 explorer.exe 2952 explorer.exe 1164 spoolsv.exe 5100 spoolsv.exe 752 spoolsv.exe 5072 spoolsv.exe 4200 spoolsv.exe 3900 spoolsv.exe 2440 spoolsv.exe 452 spoolsv.exe 3408 spoolsv.exe 4660 spoolsv.exe 5088 spoolsv.exe 4656 spoolsv.exe 3212 spoolsv.exe 1216 spoolsv.exe 4396 spoolsv.exe 4560 spoolsv.exe 2884 spoolsv.exe 1324 spoolsv.exe 4108 spoolsv.exe 5092 spoolsv.exe 2856 spoolsv.exe 4828 spoolsv.exe 748 spoolsv.exe 4556 spoolsv.exe 5032 spoolsv.exe 4440 spoolsv.exe 4844 spoolsv.exe 1384 spoolsv.exe 4060 spoolsv.exe 4184 spoolsv.exe 4512 spoolsv.exe 3088 spoolsv.exe 3708 spoolsv.exe 816 explorer.exe 3452 spoolsv.exe 4412 spoolsv.exe 1328 spoolsv.exe 5040 spoolsv.exe 208 spoolsv.exe 2088 spoolsv.exe 3848 spoolsv.exe 2060 spoolsv.exe 208 explorer.exe 1692 spoolsv.exe 2480 spoolsv.exe 1584 spoolsv.exe 2692 spoolsv.exe 4628 spoolsv.exe 3296 spoolsv.exe 1344 explorer.exe 4268 spoolsv.exe 3604 spoolsv.exe 2548 spoolsv.exe 3268 spoolsv.exe 2412 spoolsv.exe 888 spoolsv.exe 3068 explorer.exe 4732 spoolsv.exe 4936 spoolsv.exe 4040 spoolsv.exe 624 spoolsv.exe 4048 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 42 IoCs
description pid Process procid_target PID 1760 set thread context of 4572 1760 a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe 86 PID 3288 set thread context of 2952 3288 explorer.exe 91 PID 1164 set thread context of 3708 1164 spoolsv.exe 124 PID 5100 set thread context of 3452 5100 spoolsv.exe 126 PID 752 set thread context of 4412 752 spoolsv.exe 127 PID 5072 set thread context of 1328 5072 spoolsv.exe 128 PID 4200 set thread context of 5040 4200 spoolsv.exe 129 PID 3900 set thread context of 208 3900 spoolsv.exe 134 PID 2440 set thread context of 2088 2440 spoolsv.exe 131 PID 452 set thread context of 2060 452 spoolsv.exe 133 PID 3408 set thread context of 1692 3408 spoolsv.exe 135 PID 4660 set thread context of 2480 4660 spoolsv.exe 136 PID 5088 set thread context of 1584 5088 spoolsv.exe 137 PID 4656 set thread context of 2692 4656 spoolsv.exe 138 PID 3212 set thread context of 3296 3212 spoolsv.exe 140 PID 1216 set thread context of 4268 1216 spoolsv.exe 142 PID 4396 set thread context of 3604 4396 spoolsv.exe 143 PID 4560 set thread context of 2548 4560 spoolsv.exe 144 PID 2884 set thread context of 2412 2884 spoolsv.exe 146 PID 1324 set thread context of 888 1324 spoolsv.exe 147 PID 4108 set thread context of 4732 4108 spoolsv.exe 149 PID 5092 set thread context of 4936 5092 spoolsv.exe 150 PID 2856 set thread context of 624 2856 spoolsv.exe 152 PID 4828 set thread context of 4048 4828 spoolsv.exe 153 PID 748 set thread context of 212 748 spoolsv.exe 155 PID 4556 set thread context of 1408 4556 spoolsv.exe 156 PID 5032 set thread context of 1832 5032 spoolsv.exe 158 PID 4440 set thread context of 3876 4440 spoolsv.exe 159 PID 4844 set thread context of 3680 4844 spoolsv.exe 162 PID 1384 set thread context of 4824 1384 spoolsv.exe 163 PID 4060 set thread context of 924 4060 spoolsv.exe 166 PID 4184 set thread context of 4856 4184 spoolsv.exe 167 PID 4512 set thread context of 1508 4512 spoolsv.exe 169 PID 3088 set thread context of 3300 3088 spoolsv.exe 175 PID 816 set thread context of 4472 816 explorer.exe 177 PID 3848 set thread context of 3132 3848 spoolsv.exe 182 PID 4628 set thread context of 4944 4628 spoolsv.exe 188 PID 1344 set thread context of 4452 1344 explorer.exe 190 PID 3268 set thread context of 4180 3268 spoolsv.exe 193 PID 3068 set thread context of 3768 3068 explorer.exe 195 PID 4040 set thread context of 4968 4040 spoolsv.exe 198 PID 4604 set thread context of 4480 4604 explorer.exe 200 -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe File opened for modification \??\c:\windows\system\explorer.exe a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4572 a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe 4572 a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2952 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4572 a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe 4572 a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 3708 spoolsv.exe 3708 spoolsv.exe 3452 spoolsv.exe 3452 spoolsv.exe 4412 spoolsv.exe 4412 spoolsv.exe 1328 spoolsv.exe 1328 spoolsv.exe 5040 spoolsv.exe 5040 spoolsv.exe 2088 spoolsv.exe 2088 spoolsv.exe 2060 spoolsv.exe 2060 spoolsv.exe 1692 spoolsv.exe 1692 spoolsv.exe 2480 spoolsv.exe 2480 spoolsv.exe 1584 spoolsv.exe 1584 spoolsv.exe 2692 spoolsv.exe 2692 spoolsv.exe 3296 spoolsv.exe 3296 spoolsv.exe 4268 spoolsv.exe 4268 spoolsv.exe 3604 spoolsv.exe 3604 spoolsv.exe 2548 spoolsv.exe 2548 spoolsv.exe 2412 spoolsv.exe 2412 spoolsv.exe 888 spoolsv.exe 888 spoolsv.exe 4732 spoolsv.exe 4732 spoolsv.exe 4936 spoolsv.exe 4936 spoolsv.exe 624 spoolsv.exe 624 spoolsv.exe 4048 spoolsv.exe 4048 spoolsv.exe 212 spoolsv.exe 212 spoolsv.exe 1408 spoolsv.exe 1408 spoolsv.exe 1832 spoolsv.exe 1832 spoolsv.exe 3876 spoolsv.exe 3876 spoolsv.exe 3680 spoolsv.exe 3680 spoolsv.exe 4824 spoolsv.exe 4824 spoolsv.exe 924 spoolsv.exe 924 spoolsv.exe 4856 spoolsv.exe 4856 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1760 wrote to memory of 4796 1760 a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe 81 PID 1760 wrote to memory of 4796 1760 a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe 81 PID 1760 wrote to memory of 4572 1760 a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe 86 PID 1760 wrote to memory of 4572 1760 a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe 86 PID 1760 wrote to memory of 4572 1760 a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe 86 PID 1760 wrote to memory of 4572 1760 a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe 86 PID 1760 wrote to memory of 4572 1760 a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe 86 PID 4572 wrote to memory of 3288 4572 a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe 87 PID 4572 wrote to memory of 3288 4572 a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe 87 PID 4572 wrote to memory of 3288 4572 a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe 87 PID 3288 wrote to memory of 2952 3288 explorer.exe 91 PID 3288 wrote to memory of 2952 3288 explorer.exe 91 PID 3288 wrote to memory of 2952 3288 explorer.exe 91 PID 3288 wrote to memory of 2952 3288 explorer.exe 91 PID 3288 wrote to memory of 2952 3288 explorer.exe 91 PID 2952 wrote to memory of 1164 2952 explorer.exe 92 PID 2952 wrote to memory of 1164 2952 explorer.exe 92 PID 2952 wrote to memory of 1164 2952 explorer.exe 92 PID 2952 wrote to memory of 5100 2952 explorer.exe 93 PID 2952 wrote to memory of 5100 2952 explorer.exe 93 PID 2952 wrote to memory of 5100 2952 explorer.exe 93 PID 2952 wrote to memory of 752 2952 explorer.exe 94 PID 2952 wrote to memory of 752 2952 explorer.exe 94 PID 2952 wrote to memory of 752 2952 explorer.exe 94 PID 2952 wrote to memory of 5072 2952 explorer.exe 95 PID 2952 wrote to memory of 5072 2952 explorer.exe 95 PID 2952 wrote to memory of 5072 2952 explorer.exe 95 PID 2952 wrote to memory of 4200 2952 explorer.exe 96 PID 2952 wrote to memory of 4200 2952 explorer.exe 96 PID 2952 wrote to memory of 4200 2952 explorer.exe 96 PID 2952 wrote to memory of 3900 2952 explorer.exe 97 PID 2952 wrote to memory of 3900 2952 explorer.exe 97 PID 2952 wrote to memory of 3900 2952 explorer.exe 97 PID 2952 wrote to memory of 2440 2952 explorer.exe 98 PID 2952 wrote to memory of 2440 2952 explorer.exe 98 PID 2952 wrote to memory of 2440 2952 explorer.exe 98 PID 2952 wrote to memory of 452 2952 explorer.exe 99 PID 2952 wrote to memory of 452 2952 explorer.exe 99 PID 2952 wrote to memory of 452 2952 explorer.exe 99 PID 2952 wrote to memory of 3408 2952 explorer.exe 100 PID 2952 wrote to memory of 3408 2952 explorer.exe 100 PID 2952 wrote to memory of 3408 2952 explorer.exe 100 PID 2952 wrote to memory of 4660 2952 explorer.exe 101 PID 2952 wrote to memory of 4660 2952 explorer.exe 101 PID 2952 wrote to memory of 4660 2952 explorer.exe 101 PID 2952 wrote to memory of 5088 2952 explorer.exe 102 PID 2952 wrote to memory of 5088 2952 explorer.exe 102 PID 2952 wrote to memory of 5088 2952 explorer.exe 102 PID 2952 wrote to memory of 4656 2952 explorer.exe 103 PID 2952 wrote to memory of 4656 2952 explorer.exe 103 PID 2952 wrote to memory of 4656 2952 explorer.exe 103 PID 2952 wrote to memory of 3212 2952 explorer.exe 104 PID 2952 wrote to memory of 3212 2952 explorer.exe 104 PID 2952 wrote to memory of 3212 2952 explorer.exe 104 PID 2952 wrote to memory of 1216 2952 explorer.exe 105 PID 2952 wrote to memory of 1216 2952 explorer.exe 105 PID 2952 wrote to memory of 1216 2952 explorer.exe 105 PID 2952 wrote to memory of 4396 2952 explorer.exe 106 PID 2952 wrote to memory of 4396 2952 explorer.exe 106 PID 2952 wrote to memory of 4396 2952 explorer.exe 106 PID 2952 wrote to memory of 4560 2952 explorer.exe 107 PID 2952 wrote to memory of 4560 2952 explorer.exe 107 PID 2952 wrote to memory of 4560 2952 explorer.exe 107 PID 2952 wrote to memory of 2884 2952 explorer.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a71c0e5f4c76062235112dbeb17596df_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4572 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3288 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1164 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3708 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:816 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4472
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5100 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3452
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:752 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4412
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5072 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1328
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4200 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5040
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3900 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
PID:208
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2440 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2088
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:452 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2060 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
PID:208 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4912
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3408 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1692
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4660 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2480
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5088 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1584
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4656 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3212 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3296 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1344 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4452
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1216 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4268
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4396 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3604
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4560 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2884 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2412
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1324 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:888 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3068 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3768
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4108 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4732
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5092 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4936
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2856 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:624
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4828 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4048 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4604 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4480
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:748 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:212
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4556 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1408
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5032 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1832
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4440 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3876 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:1064 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:548
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4844 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3680
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1384 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4824 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:1328 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3244
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4060 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:924
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4184 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4856
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4512 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1508
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:396 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3276
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3088 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3300
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3400 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4064
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3848 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3132
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4340
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2588
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4628 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4944
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:1252
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3268 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4180
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3308
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4040 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4968
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3292
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4804 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2544
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4908
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1200 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:928
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3716
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:448 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3724
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4188 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3504
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4284
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1232 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1948
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3616 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4940
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1880 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3208
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4264
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2404 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1092
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2196
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3348 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1148
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4004 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4832
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3812
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2912
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4692 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4836
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2624
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:468 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1300
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4076
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1732
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3740
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3448
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:392
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:232
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4948
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2916
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1940
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:412
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3984
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:512
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4652
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2560
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4520
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4428
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:3040
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD547c77ebff9bba3fcbde382832ca07105
SHA155ec78dd0e582bcc754f55a27ad629ba41724297
SHA2566132411a8704d381d0fa6ccff72eb083978f9ed6567d35d42a9b24083973d726
SHA5127c1ebfd5bf4e41617b1d91fe6bfd84aabf3bbf6500873a24dd8ab9f97bfb8e733e4c9a778d0841c743278657ed3c3199aebf4df4a44e5fc5f83ae211cc6c2d73
-
Filesize
2.2MB
MD5bb2d84fbc010d89bd89d2fd690f79a34
SHA1ceaf395f813934d971d1a72baeef19aa35b080b7
SHA25665c7fada977876606e8189b52129636289bdcf126dc975c8905e25f44ce07570
SHA512e51e28c68637593d21906ba1de9c7861c39b199d5db321ffb6bae2e28317498dc7ea5e29d78f777276f92b12c9e91796569f955db0bca8003eeb1764d7ae2468