Analysis
-
max time kernel
133s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 23:35
Behavioral task
behavioral1
Sample
a72162d2131539f25700649b1df97759_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
a72162d2131539f25700649b1df97759_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
a72162d2131539f25700649b1df97759
-
SHA1
1dc7be19eafc68c52a31b320903fae68ff80d56e
-
SHA256
d50a64456ef12e278f14f5d0c1298fe4d073039fc4e5ad73b82b262544f1a150
-
SHA512
a9f248b186d71428fe039f66d33a2dff4639c813057c833b57e06fa72e0503bc98fea79a5a5d1bad93be6f4407acf688c6d784932de66fbe38b09bcbd9506bec
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZA:0UzeyQMS4DqodCnoe+iitjWwwk
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a72162d2131539f25700649b1df97759_JaffaCakes118.exe a72162d2131539f25700649b1df97759_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a72162d2131539f25700649b1df97759_JaffaCakes118.exe a72162d2131539f25700649b1df97759_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 3976 explorer.exe 2104 explorer.exe 4272 spoolsv.exe 1140 spoolsv.exe 4684 spoolsv.exe 2928 spoolsv.exe 532 spoolsv.exe 3020 spoolsv.exe 2768 spoolsv.exe 3600 spoolsv.exe 1556 spoolsv.exe 3008 spoolsv.exe 1568 spoolsv.exe 2540 spoolsv.exe 4408 spoolsv.exe 4696 spoolsv.exe 1576 spoolsv.exe 4816 spoolsv.exe 4652 spoolsv.exe 3656 spoolsv.exe 2752 spoolsv.exe 916 spoolsv.exe 3312 spoolsv.exe 4988 spoolsv.exe 2836 spoolsv.exe 2160 spoolsv.exe 2724 spoolsv.exe 3308 spoolsv.exe 872 spoolsv.exe 2112 spoolsv.exe 1056 spoolsv.exe 2460 spoolsv.exe 3492 spoolsv.exe 1708 spoolsv.exe 5168 spoolsv.exe 5264 spoolsv.exe 5300 explorer.exe 5372 spoolsv.exe 5592 spoolsv.exe 5784 spoolsv.exe 5884 spoolsv.exe 5948 spoolsv.exe 6016 spoolsv.exe 6088 spoolsv.exe 5128 spoolsv.exe 768 spoolsv.exe 4484 spoolsv.exe 5452 explorer.exe 5532 spoolsv.exe 5660 spoolsv.exe 5840 spoolsv.exe 5888 spoolsv.exe 5960 spoolsv.exe 1652 spoolsv.exe 4656 explorer.exe 4728 spoolsv.exe 5376 spoolsv.exe 5716 spoolsv.exe 5728 spoolsv.exe 6120 spoolsv.exe 4112 spoolsv.exe 2364 explorer.exe 5248 spoolsv.exe 5224 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 45 IoCs
description pid Process procid_target PID 1960 set thread context of 2308 1960 a72162d2131539f25700649b1df97759_JaffaCakes118.exe 95 PID 3976 set thread context of 2104 3976 explorer.exe 100 PID 4272 set thread context of 5264 4272 spoolsv.exe 134 PID 1140 set thread context of 5372 1140 spoolsv.exe 136 PID 4684 set thread context of 5592 4684 spoolsv.exe 137 PID 2928 set thread context of 5884 2928 spoolsv.exe 139 PID 532 set thread context of 5948 532 spoolsv.exe 140 PID 3020 set thread context of 6016 3020 spoolsv.exe 141 PID 2768 set thread context of 6088 2768 spoolsv.exe 142 PID 3600 set thread context of 5128 3600 spoolsv.exe 143 PID 1556 set thread context of 768 1556 spoolsv.exe 144 PID 3008 set thread context of 4484 3008 spoolsv.exe 145 PID 1568 set thread context of 5532 1568 spoolsv.exe 147 PID 2540 set thread context of 5660 2540 spoolsv.exe 148 PID 4408 set thread context of 5888 4408 spoolsv.exe 150 PID 4696 set thread context of 5960 4696 spoolsv.exe 151 PID 1576 set thread context of 1652 1576 spoolsv.exe 152 PID 4816 set thread context of 5376 4816 spoolsv.exe 155 PID 4652 set thread context of 5716 4652 spoolsv.exe 156 PID 3656 set thread context of 5728 3656 spoolsv.exe 157 PID 2752 set thread context of 4112 2752 spoolsv.exe 159 PID 916 set thread context of 5248 916 spoolsv.exe 161 PID 3312 set thread context of 5224 3312 spoolsv.exe 162 PID 4988 set thread context of 5928 4988 spoolsv.exe 164 PID 2836 set thread context of 6004 2836 spoolsv.exe 166 PID 2160 set thread context of 6036 2160 spoolsv.exe 167 PID 2724 set thread context of 6104 2724 spoolsv.exe 168 PID 3308 set thread context of 512 3308 spoolsv.exe 169 PID 872 set thread context of 5124 872 spoolsv.exe 170 PID 2112 set thread context of 2688 2112 spoolsv.exe 172 PID 1056 set thread context of 3440 1056 spoolsv.exe 174 PID 2460 set thread context of 4184 2460 spoolsv.exe 175 PID 3492 set thread context of 5900 3492 spoolsv.exe 176 PID 1708 set thread context of 5296 1708 spoolsv.exe 178 PID 5168 set thread context of 5136 5168 spoolsv.exe 183 PID 5300 set thread context of 4004 5300 explorer.exe 188 PID 5784 set thread context of 756 5784 spoolsv.exe 191 PID 5452 set thread context of 4276 5452 explorer.exe 195 PID 5840 set thread context of 5380 5840 spoolsv.exe 196 PID 4656 set thread context of 3848 4656 explorer.exe 200 PID 4728 set thread context of 4240 4728 spoolsv.exe 201 PID 2364 set thread context of 3756 2364 explorer.exe 205 PID 6120 set thread context of 4100 6120 spoolsv.exe 207 PID 4492 set thread context of 5460 4492 explorer.exe 211 PID 4932 set thread context of 5156 4932 spoolsv.exe 212 -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini a72162d2131539f25700649b1df97759_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe a72162d2131539f25700649b1df97759_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2308 a72162d2131539f25700649b1df97759_JaffaCakes118.exe 2308 a72162d2131539f25700649b1df97759_JaffaCakes118.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2104 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2308 a72162d2131539f25700649b1df97759_JaffaCakes118.exe 2308 a72162d2131539f25700649b1df97759_JaffaCakes118.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 5264 spoolsv.exe 5264 spoolsv.exe 5372 spoolsv.exe 5372 spoolsv.exe 5592 spoolsv.exe 5592 spoolsv.exe 5884 spoolsv.exe 5884 spoolsv.exe 5948 spoolsv.exe 5948 spoolsv.exe 6016 spoolsv.exe 6016 spoolsv.exe 6088 spoolsv.exe 6088 spoolsv.exe 5128 spoolsv.exe 5128 spoolsv.exe 768 spoolsv.exe 768 spoolsv.exe 4484 spoolsv.exe 4484 spoolsv.exe 5532 spoolsv.exe 5532 spoolsv.exe 5660 spoolsv.exe 5660 spoolsv.exe 5888 spoolsv.exe 5888 spoolsv.exe 5960 spoolsv.exe 5960 spoolsv.exe 1652 spoolsv.exe 1652 spoolsv.exe 5376 spoolsv.exe 5376 spoolsv.exe 5716 spoolsv.exe 5716 spoolsv.exe 5728 spoolsv.exe 5728 spoolsv.exe 4112 spoolsv.exe 4112 spoolsv.exe 5248 spoolsv.exe 5248 spoolsv.exe 5224 spoolsv.exe 5224 spoolsv.exe 5928 spoolsv.exe 5928 spoolsv.exe 6004 spoolsv.exe 6004 spoolsv.exe 6036 spoolsv.exe 6036 spoolsv.exe 6104 spoolsv.exe 6104 spoolsv.exe 512 spoolsv.exe 512 spoolsv.exe 5124 spoolsv.exe 5124 spoolsv.exe 2688 spoolsv.exe 2688 spoolsv.exe 3440 spoolsv.exe 3440 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2576 1960 a72162d2131539f25700649b1df97759_JaffaCakes118.exe 89 PID 1960 wrote to memory of 2576 1960 a72162d2131539f25700649b1df97759_JaffaCakes118.exe 89 PID 1960 wrote to memory of 2308 1960 a72162d2131539f25700649b1df97759_JaffaCakes118.exe 95 PID 1960 wrote to memory of 2308 1960 a72162d2131539f25700649b1df97759_JaffaCakes118.exe 95 PID 1960 wrote to memory of 2308 1960 a72162d2131539f25700649b1df97759_JaffaCakes118.exe 95 PID 1960 wrote to memory of 2308 1960 a72162d2131539f25700649b1df97759_JaffaCakes118.exe 95 PID 1960 wrote to memory of 2308 1960 a72162d2131539f25700649b1df97759_JaffaCakes118.exe 95 PID 2308 wrote to memory of 3976 2308 a72162d2131539f25700649b1df97759_JaffaCakes118.exe 96 PID 2308 wrote to memory of 3976 2308 a72162d2131539f25700649b1df97759_JaffaCakes118.exe 96 PID 2308 wrote to memory of 3976 2308 a72162d2131539f25700649b1df97759_JaffaCakes118.exe 96 PID 3976 wrote to memory of 2104 3976 explorer.exe 100 PID 3976 wrote to memory of 2104 3976 explorer.exe 100 PID 3976 wrote to memory of 2104 3976 explorer.exe 100 PID 3976 wrote to memory of 2104 3976 explorer.exe 100 PID 3976 wrote to memory of 2104 3976 explorer.exe 100 PID 2104 wrote to memory of 4272 2104 explorer.exe 101 PID 2104 wrote to memory of 4272 2104 explorer.exe 101 PID 2104 wrote to memory of 4272 2104 explorer.exe 101 PID 2104 wrote to memory of 1140 2104 explorer.exe 102 PID 2104 wrote to memory of 1140 2104 explorer.exe 102 PID 2104 wrote to memory of 1140 2104 explorer.exe 102 PID 2104 wrote to memory of 4684 2104 explorer.exe 103 PID 2104 wrote to memory of 4684 2104 explorer.exe 103 PID 2104 wrote to memory of 4684 2104 explorer.exe 103 PID 2104 wrote to memory of 2928 2104 explorer.exe 104 PID 2104 wrote to memory of 2928 2104 explorer.exe 104 PID 2104 wrote to memory of 2928 2104 explorer.exe 104 PID 2104 wrote to memory of 532 2104 explorer.exe 105 PID 2104 wrote to memory of 532 2104 explorer.exe 105 PID 2104 wrote to memory of 532 2104 explorer.exe 105 PID 2104 wrote to memory of 3020 2104 explorer.exe 106 PID 2104 wrote to memory of 3020 2104 explorer.exe 106 PID 2104 wrote to memory of 3020 2104 explorer.exe 106 PID 2104 wrote to memory of 2768 2104 explorer.exe 107 PID 2104 wrote to memory of 2768 2104 explorer.exe 107 PID 2104 wrote to memory of 2768 2104 explorer.exe 107 PID 2104 wrote to memory of 3600 2104 explorer.exe 108 PID 2104 wrote to memory of 3600 2104 explorer.exe 108 PID 2104 wrote to memory of 3600 2104 explorer.exe 108 PID 2104 wrote to memory of 1556 2104 explorer.exe 109 PID 2104 wrote to memory of 1556 2104 explorer.exe 109 PID 2104 wrote to memory of 1556 2104 explorer.exe 109 PID 2104 wrote to memory of 3008 2104 explorer.exe 110 PID 2104 wrote to memory of 3008 2104 explorer.exe 110 PID 2104 wrote to memory of 3008 2104 explorer.exe 110 PID 2104 wrote to memory of 1568 2104 explorer.exe 111 PID 2104 wrote to memory of 1568 2104 explorer.exe 111 PID 2104 wrote to memory of 1568 2104 explorer.exe 111 PID 2104 wrote to memory of 2540 2104 explorer.exe 112 PID 2104 wrote to memory of 2540 2104 explorer.exe 112 PID 2104 wrote to memory of 2540 2104 explorer.exe 112 PID 2104 wrote to memory of 4408 2104 explorer.exe 113 PID 2104 wrote to memory of 4408 2104 explorer.exe 113 PID 2104 wrote to memory of 4408 2104 explorer.exe 113 PID 2104 wrote to memory of 4696 2104 explorer.exe 114 PID 2104 wrote to memory of 4696 2104 explorer.exe 114 PID 2104 wrote to memory of 4696 2104 explorer.exe 114 PID 2104 wrote to memory of 1576 2104 explorer.exe 115 PID 2104 wrote to memory of 1576 2104 explorer.exe 115 PID 2104 wrote to memory of 1576 2104 explorer.exe 115 PID 2104 wrote to memory of 4816 2104 explorer.exe 116 PID 2104 wrote to memory of 4816 2104 explorer.exe 116 PID 2104 wrote to memory of 4816 2104 explorer.exe 116 PID 2104 wrote to memory of 4652 2104 explorer.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\a72162d2131539f25700649b1df97759_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a72162d2131539f25700649b1df97759_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\a72162d2131539f25700649b1df97759_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a72162d2131539f25700649b1df97759_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3976 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4272 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5264 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5300 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4004
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1140 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5372
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4684 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5592
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2928 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5884
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:532 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5948
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3020 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6016
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2768 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6088
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3600 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5128
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1556 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:768
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3008 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4484 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5452 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4276
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1568 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5532
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2540 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5660
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4408 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5888
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4696 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5960
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1576 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1652 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4656 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3848
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4816 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5376
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4652 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5716
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3656 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5728
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2752 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4112 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2364 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3756
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:916 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5248
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3312 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5224
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4988 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5928 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4492 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5460
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2836 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:6004
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2160 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:6036
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2724 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:6104
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3308 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:512
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:872 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5124
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2112 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2688 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:5652 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5052
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1056 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3440
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2460 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4184
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3492 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5900
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1708 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5296
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:116 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4556
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5168 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5136
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:2444 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2024
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5784 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:756
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:5816 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:344
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5840 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5380
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5468
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4728 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4240
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:2996
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6120 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4100
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5516
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4932 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5156
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3148
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5440 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5932
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:844
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1704 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1852
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5132 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3944
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4012 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:6000
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4752 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2376
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2760 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2388
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3216 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5148
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4572
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5232 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1020
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5112 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5916
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:988
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4036 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5680
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2396 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4936
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5304 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1272
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5396
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5576
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6064
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2032
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5064
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5172
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2684
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4380
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3472
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1060
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5244
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4836
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6116
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1900
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2888
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4156,i,3144109701624127473,12586215149656995128,262144 --variations-seed-version --mojo-platform-channel-handle=1740 /prefetch:81⤵PID:1936
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD57edfa641cb85026e70e8f06054c1d639
SHA1513eebd3f0ae9f10b566366443c5800775ccc17e
SHA256410f8216f521debb5d01847a43ff9c81863a76a16fbb50e89a2432abc80a172f
SHA512fa741f70bd55b6d022455f47233b42ab95eba5b2048a21a0bbd68a919ea8a0e5ad011d0f525bcfce546ea5e7ee58932a4999f27769a019f6020eff4152713922
-
Filesize
2.2MB
MD501c2a09f0a0357a3e1811f4202ce2a27
SHA18f8ab51363352b108ae94740aebd423bd2f338e5
SHA256cb77a93f84ae054685ed4a2643ac1ad2501c5aeecf14620e391e7304c5ccf52b
SHA512943a92e7fbf5cabcfc125522cb7e0d268098861627bd45d714138ecaf455aa2b26a1e31aaddf0df47587590f1d870b7cab4515b37bb6d361660d6aea825ba480