Analysis
-
max time kernel
44s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 15:11
Static task
static1
Behavioral task
behavioral1
Sample
1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe
Resource
win10v2004-20240508-en
General
-
Target
1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe
-
Size
573KB
-
MD5
503f112e243519a1b9e0344499561908
-
SHA1
8d635ca131d8aa20971744dcb30a9e2e1f8cd1be
-
SHA256
1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc
-
SHA512
71da9efbc24bf3428f7efd08f47e6dc698cdae769a918800de72ab4945fb79c2f5b92d21a839d9e13e700b3cfd6ae365073c32a6f368e43830c6ccba3322d00e
-
SSDEEP
12288:BV0qnXKTH2P6rxTcQpXDHgswvodgnAdA:BV0EMm6rxTcQjos
Malware Config
Extracted
C:\MSOCache\All Users\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 2096 powershell.exe 29 -
Renames multiple (8628) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell command to delete shadowcopy.
pid Process 1692 powershell.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 47 IoCs
description ioc Process File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Music\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\ETDEICXK\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\JS013387\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Videos\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Music\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\7SR48CNP\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Links\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Documents\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\44A7T1ZV\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\zh-TW.pak 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\MSB1STAR.DLL 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\msinfo32.exe.mui 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_s.png 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\mip.exe.mui 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\org-netbeans-modules-profiler-attach.jar 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\settings.css 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0106958.WMF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00190_.WMF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-image-mask.png 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.repository.nl_zh_4.4.0.v20140623020002.jar 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SlateBlue.css 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\WindowsMedia.mpp 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rss_headline_glow_docked.png 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CANYON\THMBNAIL.PNG 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107514.WMF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199483.WMF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_h.png 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\vlc.mo 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01751_.GIF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files\Microsoft Games\Chess\it-IT\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD19986_.WMF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL00286_.WMF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Equity.thmx 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\AddToViewArrow.jpg 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\access-bridge-64.jar 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\gadget.xml 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382950.JPG 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02262_.WMF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsHomePageScript.js 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\boot.jar 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\vlc.mo 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14982_.GIF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\ACWZUSR12.ACCDU 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\THMBNAIL.PNG 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0313965.JPG 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SMIMEE.CFG 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\help.gif 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\weather.html 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Windows Media Player\es-ES\WMPDMCCore.dll.mui 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\delete_over.png 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\CST6 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+1 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\1.0\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\vlc.mo 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\weather.js 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGAD.DPV 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\IPSEventLogMsg.dll.mui 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00276_.WMF 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Equity.xml 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\calendar.js 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Kiev 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\timeZones.js 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_SlateBlue.gif 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_close_up.png 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File created C:\Program Files\Common Files\Microsoft Shared\Filters\akira_readme.txt 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\fr.pak 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 1692 powershell.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe 2032 1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1692 powershell.exe Token: SeBackupPrivilege 2700 vssvc.exe Token: SeRestorePrivilege 2700 vssvc.exe Token: SeAuditPrivilege 2700 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe"C:\Users\Admin\AppData\Local\Temp\1b6af2fbbc636180dd7bae825486ccc45e42aefbb304d5f83fafca4d637c13cc.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5de49e2e3eeb866fc517949893ed74bed
SHA13b503e6776a34f026f77ba7fea719dec182575e6
SHA256994010aaf2f723b06ace4f35eba28068160c38714fda8d62205b3b2e7b96b07e
SHA512f4c59b0f90ff8f6e05106c47160c239da0b5598845316a5a8705bde5f47378596fead491db828f4ab35ec84f796a22907210b51729d4c023c7ace68dccc1f9b8
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.akira
Filesize28KB
MD56e0dc3ff5dcd596e8e2a4d641c99dded
SHA1ed1813b8c347e725f604e04798572f61738d47de
SHA256b03f08656edf5e110798cbce446884ba5f89234c1efdc577ddca93de30e7085c
SHA51265b93ed63a31c138df1b207c99258cf1e03b257357961eaea655724ef4a19f7beaca92ea3ef07f1b9a7bb7833f73db6c4e13233b7e8e264e0f3507513aab7dc7
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF.akira
Filesize875B
MD599dbe252440e9690706230a3e64a9073
SHA12fd712cfd09593d07b61f486db78eaa26828d5e0
SHA2563871c52ef466c694cb90b8da9a27625f7b2fd01adaeb37f95cd06430c3267c32
SHA5123ae98ab4310e835cc5047f7f53b1c69fcc21d1c232ac80cb947d06c7f4b83c5cb3c084141f0a612abeb71c906a7263551139e561a2e966d810b5cfc78175c7df
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF.akira
Filesize756B
MD558df9b3851443a54a4c3d73f51c385a1
SHA1266482a3d9c04c7ad31ee7c8544caccbe306abb1
SHA25609170504669934a9a429012e261bee143eba7cbd2fe7762859a252d7eb61dc03
SHA512840b7a736bd2fefa644f3bb5014652c30818000a27f8561ac0602bb6b41e2246fc71f2298aaba35747e77299801895125e72c27dcb563f586ba3d2d0af782e4f
-
Filesize
648B
MD5d2dc247102d45e8cb3332973ecaaae84
SHA10ca72a2e66aa80ef46e4d33547e4c634e45c5f51
SHA256ec64d0b9968c6172ff262f448c046419c34ab9330160379d62b3e3c99bf3f6d9
SHA512a211e55cac82f6bd9d342f5bedd770a91da517293f8e2650a7f37e3e06b44cce04a97a6abaa94bc7124db427f6b87e7d9120cc32505ca7ce793d20b0d533d505
-
Filesize
647B
MD5d6f437aa6864e6c50a3880a17f7957b1
SHA18ba0ab6f2e1a02a9ff5b179c8176ea8c20aaefc5
SHA25660a7d1a523bdff5e73e4925d727564541f8735eb73c0264a3a543fadf8ae5086
SHA5124577738edfcfc7903988627a2c7ac1216b48b24353f071bd3ee09cfde7019d73cf1e9451f1cd2d0e3dfa76f1cdd24cf82b1eab760cf5e453e570712153a36d0e
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\BUTTON.GIF.akira
Filesize719B
MD5f0db580875b77370c7d81495aae41288
SHA176b531c843b1db1dba27a8b5e96d4a795ff2e64b
SHA256263e985a6a1791f884af91e02042fa5e367fdb921eb100417eca203c131e2ed4
SHA512fa905f31da1f40d6a5784f06547e880fe813313c56b21f0a745df566a1c553d8e999bbacb8212f614f725d143ec863a388ebc6311589049d7933f45ed2c8795c
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.akira
Filesize1KB
MD538e55e2805ff7a3f62e39d4e6254fb0e
SHA1c6f92c2d7cfb26907d811f2a3d32fd55dded45f4
SHA25624497848ab79950aa472d2a816caa45e0db884d115a1592aab237c20844f24c3
SHA512cb31a2c13b0729d34ef30a062540197428cde8ce2e4aa71e0ae3a65877153ca7bffc9753d8385d2c15e2eaf1ac63f990ce8f189049e41f8e2be093628ab64fe7
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.akira
Filesize1KB
MD5afc0351e360c5a8cfc21b985f9d9fa27
SHA1990cbc5dcb534efb04679155578eadeb26b5bae5
SHA256b404ac912418d0e1de4e1670b5b8607998b01fd9f72efe81e18651018cff586f
SHA51240b2f1b835f41a7d46dd80dec8294ebf89da9ad7ce5dc64759620831213189e5cb2f6bc460d2ab3ceb0268ba95d7d2716c8cc64973e4f9496042c6d523438b23
-
Filesize
1KB
MD501e4578043756a10802e00e1dce2ffd3
SHA158f09f466503e6f70c6705ceea3a5b95dd18c286
SHA256ff1b3d367aa1b73603c49e72a72d943d86eaf5d77365a3752f2c03dcda18cb96
SHA512f2494c8631732249144b3a85a75edc010f8b9cb83b91f4d48123c761967b7a16f734113f7d659e68841a45162ddd8ddbad7ee646bbaab6ed2a8554daf96ace69
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html.akira
Filesize12KB
MD5897feb0a8a44aec4d73f479b42a33a35
SHA173a04349bd00ddb95f49b54ab6ca08111a0dcc10
SHA256535f3bf194cce501012dd8028b155f0d4c5ddf448807df321742297b102053c8
SHA512a82e2fb684ce8f37a5c6cf5d6cff36ba36a0db22f83b4434ca37da28fd24a45a50b14f1413d6e4bec8dbdfce30ac7a3e5f2e831cbf2cb96a0b3532925b9652a6
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html.akira
Filesize9KB
MD5143ca48765f118f1d79581e58a0f0690
SHA13add758f4023d45b1b08bb349dd9ef4da4f15a84
SHA2569c2ac765cc0c7267baa90dd97b7dde1d74aeb2fc7ad26b576916778c762212ba
SHA512b702f5e01846a1d20f48855c348b00c82d8ce6e1e6fa0ad84b58e1073b4de8a720d652ca8735ed91fdab38c446a705bb815f04cc73f0bb93f4e51fbd45a2f2d5
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf.akira
Filesize591B
MD5bb92c0c3e8f102521600e613c5fd852d
SHA1c2e560eb833070bb1bed8c5ca15f48f5bfe7f788
SHA256901d3645acdd6b504b4dad179c640246d8b9cac49b4313d7616695aac054fae0
SHA5127ab7b566a4689923130917525dcda29305f511118a4f3064d63ab937886f0ed94dd3479bf7145aeadc20126bde8efd9259167b4712e3d9801231d16c2fcef4b2
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA.akira
Filesize8KB
MD5eace46e4771c8b59b3b33be926c00ecf
SHA144f870bc2d699141a77ee92feadd0a2b3ddaea9e
SHA2561a1e7cbcb909de7cb613b15891b7a8e20e250289939245968ccfc008ee67381e
SHA512f7a44f2750ad2c5086e5ed781b9a63f6b8d4eb5a3595d2f1b38aade5786531e050b33ced3683a3a7647d9393defc1b7af8ff3b7cbbfd7b7ef1e534f7bd1e40e5
-
Filesize
687B
MD569b9d581c4620b0b9e64790238eafc1e
SHA148409eca7fab14d8d1814205b5eef23d70eea20d
SHA2569e2b4c5e9227a3d9f40ff316abc6ac3b78838d4c5a971d0781d3d6ea12a1cd0a
SHA5127eaeee8b98600be6faa63426142e4593bee6301c3071e9ac59a61c55eb541d765fe7fe9cae9935f3839ff9bbae71f2317b15357c2334931be20451e500b02ab6
-
Filesize
561B
MD572640df17b81ef3f778d0eb757d5e584
SHA17210357c6ee3eb1a99c3a293f3b41ede195a07f7
SHA256e1cc836538acfff10785994194c423f523f7266daf5ab14625daf5fee65a0925
SHA51275fab306cb791856af625b55e67885781a621dbc574c673e42cebd252269b3d13dfbe9f44fb755bce06084f28413a1941e60249ca568c5cd185f6f908fa693bd
-
Filesize
561B
MD5e0f1b192906ac88c06e35b1a90a2ab38
SHA1e68d4e7315f20955ea43e0c732057d2bbf82a664
SHA256e65f73448cb7778080d6c045819161c5244011e86e9630885a5bc8c90f1fd3af
SHA5129bf44d33971068540c3f0ffc1ec46c793a900c56b8712e0ad58cc11fcf6b6c06888ba6587e7db096edd25c303b3ed2dd8fabba5ed531c2c0bd40ecbc67e6ebba
-
Filesize
561B
MD5639d4f099ab8be1aeb6f061be3c69bb2
SHA1505364caae83c76aec54e27b9b625b031448b07c
SHA2560d93bf800c892e4dcc37026debe341d1e36bccc8cb889674e597c61492242bd4
SHA51277e8ce31bed8602debb8a28ed13f7b1e51d3093ca8db49a82977d9b0a1c4dbfff0106121de80710d2046b500137468553da0465e85d5bde349fec8df2b7e757f
-
Filesize
561B
MD5687f81ff8148b6add511f7804f401547
SHA1c02974f7cbdaa17371d8b5622c4861b5bf44edcd
SHA256c902ba98444453568806756a305996a768218ce8363a8983f815fcb4a9c425f0
SHA512ce956a16cb88eee19abd4c336033258b4e44fdbbece5bed92a9ba1f89c5deb42b391e5c11d9f4eb51a83437a8c6ae7d0a0c85714bdf2dcf0e33de85f8c461325
-
Filesize
831KB
MD516b6a2cffa12e4a9bdc3b4bdda710df2
SHA152753c443139e8e88770543fb6a74738ddc2eee9
SHA2566f663e7c79da91a791755ecf93fa29a2102ab0853c06b3d7a5c441d3f0c872bc
SHA512d9586c00c6e76cdc89521d95eb61805d69bc0c0bcd50caaccc822729291570a03458e7a3b617793925e232b129e72807bc6a0ea1f4a9e0985c5490a01be7d5cf
-
Filesize
550B
MD5e69667b2d480e488a5b8fe3af61251b0
SHA1d56dbf5d7ee68ac996bb028279c0683d2f065461
SHA256deec2c5963d54ec339f7d776ef54e0a7bf8051afd2575dd74fd8611716afb999
SHA512d1c0ae1e3ddf95f6ee617bbd6112c69f52f7faff3db0657d5c2d39072eaf324278c36834fdea0127c3b88c2bb6d4376999900dfa881a0919f4d6072977c8e875
-
Filesize
601B
MD5027d33b40fc61825e69645161649a41d
SHA1a3a84ea125f6d77465811a7a3abc6677e74a2551
SHA256694d30538514d85d067bb9cb2b2b2f0c73c831e96b5d9a5745b570e28625d653
SHA51224844a42678499e313409d41cd348db24b4eef0b4bca56fc82c570f1b8ad21522d274328a263c6e559080264fc36dd82aef511a23c824341485e1a743707afec
-
Filesize
28KB
MD5eb5d6ef9bb5c9dd90841f753446f35d2
SHA18cef3f6ee1442d97fb9d78787021e6d0032ef387
SHA256ed473761b3fe75be6ce56179d026f08f61fb354bdc8a3474d62ca0daf7fddad7
SHA5121f91844e7f97673aa6082e96aa5f23ea8465650c1004b77f5a59b373ba7d4bef4825ced81a7655a77993ab11d5b2e87937b66ce54d837f6370aefc9de31fa229
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ckqup08y.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.akira
Filesize48KB
MD58dbc8b446543469a737559b7d3a444b0
SHA1a189d3ee5fe9e5db2b7d9ac694b410da469e72fa
SHA256a2ea9f52d930e40d4f91dd4ba9173117cb8b4a8b4385b389603c31a9cc2978d8
SHA5129104657a0485897523d864c31158907e04dcb685dd750921dfc0c30f64a786612eb1e07f8bfdb0755cdd98cc886ed29364b049ddc3853406515725dc8497043d