Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe
Resource
win10v2004-20240709-en
General
-
Target
8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe
-
Size
211KB
-
MD5
7f3ca0c7b46e6b7a337e06a1235b880a
-
SHA1
0652be2245707c3146387c4a0ec4bd213ad04e10
-
SHA256
2665d11ebf0d5123e5df45b6b3fa0b67b07d3cfd6675fe0745fbc0501a8f860f
-
SHA512
b0257651d4c9bdba8de6317aa66e041c6b7cb049902e2b0d92ea44dc2ff2d8a59a6603907f690ae751775872644a6b0ee96c99a3cfefab0e927dac79eba3f7ab
-
SSDEEP
3072:owAJkyMS4a+RQ3dTmx0Tth+cySxE+s9WRhP6v8xZduYdwV:RAJeRQ3dT++GnOR/LGV
Malware Config
Extracted
C:\Program Files (x86)\readme.txt
Signatures
-
Renames multiple (8003) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\readme.txt 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 46 IoCs
description ioc Process File opened for modification C:\Users\Public\Desktop\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\GGQPDAP3\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\ALUNAOYI\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\Links\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Public\Documents\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Public\Videos\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\WO2S841R\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Public\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Public\Music\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\488LG1SI\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Admin\Music\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0212219.WMF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\RESUME.DPV 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\readme.txt 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\readme.txt 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSClientManifest.man 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm.html 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SECURS.ICO 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\readme.txt 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\license.html 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107152.WMF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199469.WMF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\validation.js 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-heapdump.xml 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01472_.WMF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File created C:\Program Files (x86)\Common Files\System\msadc\de-DE\readme.txt 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\flight_recorder.png 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Cave_Drawings.gif 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\EMAIL.DPV 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File created C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\readme.txt 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR3B.GIF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\WebToolImages16x16.jpg 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File created C:\Program Files\Common Files\System\readme.txt 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY00792_.WMF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSSP7ES.LEX 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21370_.GIF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.transport.ecf_1.1.0.v20140408-1354.jar 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help.ui_4.0.100.v20140401-0608.jar 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsPrintTemplate.html 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01145_.WMF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02431_.WMF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MOR6INT.REST.IDX_DLL 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME39.CSS 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\mosaic_window.html 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\usa03.ths 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01138_.WMF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\mr.pak 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-core-multiview.jar 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Urumqi 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\vlc.mo 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0106572.WMF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0216540.WMF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.MX.XML 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File created C:\Program Files (x86)\Internet Explorer\readme.txt 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.core.nl_zh_4.4.0.v20140623020002.jar 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\MTEXTRA.TTF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN00932_.WMF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\AddToViewArrowMask.bmp 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STRTEDGE\PREVIEW.GIF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21311_.GIF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR43B.GIF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.net_1.2.200.v20140124-2013.jar 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\Christmas 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GROOVE_COL.HXT 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\COMPASS.ELM 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\ICE.INF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02753U.BMP 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\readme.txt 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD10299_.GIF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0285444.WMF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\readme.txt 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\TAB_ON.GIF 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\VisualElements_150.png 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOffNotificationInAcrobat.gif 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\readme.txt 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 2672 vssvc.exe Token: SeRestorePrivilege 2672 vssvc.exe Token: SeAuditPrivilege 2672 vssvc.exe Token: SeIncreaseQuotaPrivilege 2576 WMIC.exe Token: SeSecurityPrivilege 2576 WMIC.exe Token: SeTakeOwnershipPrivilege 2576 WMIC.exe Token: SeLoadDriverPrivilege 2576 WMIC.exe Token: SeSystemProfilePrivilege 2576 WMIC.exe Token: SeSystemtimePrivilege 2576 WMIC.exe Token: SeProfSingleProcessPrivilege 2576 WMIC.exe Token: SeIncBasePriorityPrivilege 2576 WMIC.exe Token: SeCreatePagefilePrivilege 2576 WMIC.exe Token: SeBackupPrivilege 2576 WMIC.exe Token: SeRestorePrivilege 2576 WMIC.exe Token: SeShutdownPrivilege 2576 WMIC.exe Token: SeDebugPrivilege 2576 WMIC.exe Token: SeSystemEnvironmentPrivilege 2576 WMIC.exe Token: SeRemoteShutdownPrivilege 2576 WMIC.exe Token: SeUndockPrivilege 2576 WMIC.exe Token: SeManageVolumePrivilege 2576 WMIC.exe Token: 33 2576 WMIC.exe Token: 34 2576 WMIC.exe Token: 35 2576 WMIC.exe Token: SeIncreaseQuotaPrivilege 2576 WMIC.exe Token: SeSecurityPrivilege 2576 WMIC.exe Token: SeTakeOwnershipPrivilege 2576 WMIC.exe Token: SeLoadDriverPrivilege 2576 WMIC.exe Token: SeSystemProfilePrivilege 2576 WMIC.exe Token: SeSystemtimePrivilege 2576 WMIC.exe Token: SeProfSingleProcessPrivilege 2576 WMIC.exe Token: SeIncBasePriorityPrivilege 2576 WMIC.exe Token: SeCreatePagefilePrivilege 2576 WMIC.exe Token: SeBackupPrivilege 2576 WMIC.exe Token: SeRestorePrivilege 2576 WMIC.exe Token: SeShutdownPrivilege 2576 WMIC.exe Token: SeDebugPrivilege 2576 WMIC.exe Token: SeSystemEnvironmentPrivilege 2576 WMIC.exe Token: SeRemoteShutdownPrivilege 2576 WMIC.exe Token: SeUndockPrivilege 2576 WMIC.exe Token: SeManageVolumePrivilege 2576 WMIC.exe Token: 33 2576 WMIC.exe Token: 34 2576 WMIC.exe Token: 35 2576 WMIC.exe Token: SeIncreaseQuotaPrivilege 2020 WMIC.exe Token: SeSecurityPrivilege 2020 WMIC.exe Token: SeTakeOwnershipPrivilege 2020 WMIC.exe Token: SeLoadDriverPrivilege 2020 WMIC.exe Token: SeSystemProfilePrivilege 2020 WMIC.exe Token: SeSystemtimePrivilege 2020 WMIC.exe Token: SeProfSingleProcessPrivilege 2020 WMIC.exe Token: SeIncBasePriorityPrivilege 2020 WMIC.exe Token: SeCreatePagefilePrivilege 2020 WMIC.exe Token: SeBackupPrivilege 2020 WMIC.exe Token: SeRestorePrivilege 2020 WMIC.exe Token: SeShutdownPrivilege 2020 WMIC.exe Token: SeDebugPrivilege 2020 WMIC.exe Token: SeSystemEnvironmentPrivilege 2020 WMIC.exe Token: SeRemoteShutdownPrivilege 2020 WMIC.exe Token: SeUndockPrivilege 2020 WMIC.exe Token: SeManageVolumePrivilege 2020 WMIC.exe Token: 33 2020 WMIC.exe Token: 34 2020 WMIC.exe Token: 35 2020 WMIC.exe Token: SeIncreaseQuotaPrivilege 2020 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2556 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 33 PID 1972 wrote to memory of 2556 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 33 PID 1972 wrote to memory of 2556 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 33 PID 1972 wrote to memory of 2556 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 33 PID 2556 wrote to memory of 2576 2556 cmd.exe 35 PID 2556 wrote to memory of 2576 2556 cmd.exe 35 PID 2556 wrote to memory of 2576 2556 cmd.exe 35 PID 1972 wrote to memory of 2960 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 36 PID 1972 wrote to memory of 2960 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 36 PID 1972 wrote to memory of 2960 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 36 PID 1972 wrote to memory of 2960 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 36 PID 2960 wrote to memory of 2020 2960 cmd.exe 38 PID 2960 wrote to memory of 2020 2960 cmd.exe 38 PID 2960 wrote to memory of 2020 2960 cmd.exe 38 PID 1972 wrote to memory of 1848 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 39 PID 1972 wrote to memory of 1848 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 39 PID 1972 wrote to memory of 1848 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 39 PID 1972 wrote to memory of 1848 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 39 PID 1848 wrote to memory of 2244 1848 cmd.exe 41 PID 1848 wrote to memory of 2244 1848 cmd.exe 41 PID 1848 wrote to memory of 2244 1848 cmd.exe 41 PID 1972 wrote to memory of 1144 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 42 PID 1972 wrote to memory of 1144 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 42 PID 1972 wrote to memory of 1144 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 42 PID 1972 wrote to memory of 1144 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 42 PID 1144 wrote to memory of 1160 1144 cmd.exe 44 PID 1144 wrote to memory of 1160 1144 cmd.exe 44 PID 1144 wrote to memory of 1160 1144 cmd.exe 44 PID 1972 wrote to memory of 2540 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 45 PID 1972 wrote to memory of 2540 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 45 PID 1972 wrote to memory of 2540 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 45 PID 1972 wrote to memory of 2540 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 45 PID 2540 wrote to memory of 2916 2540 cmd.exe 47 PID 2540 wrote to memory of 2916 2540 cmd.exe 47 PID 2540 wrote to memory of 2916 2540 cmd.exe 47 PID 1972 wrote to memory of 2180 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 48 PID 1972 wrote to memory of 2180 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 48 PID 1972 wrote to memory of 2180 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 48 PID 1972 wrote to memory of 2180 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 48 PID 2180 wrote to memory of 336 2180 cmd.exe 50 PID 2180 wrote to memory of 336 2180 cmd.exe 50 PID 2180 wrote to memory of 336 2180 cmd.exe 50 PID 1972 wrote to memory of 2796 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 51 PID 1972 wrote to memory of 2796 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 51 PID 1972 wrote to memory of 2796 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 51 PID 1972 wrote to memory of 2796 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 51 PID 2796 wrote to memory of 2980 2796 cmd.exe 53 PID 2796 wrote to memory of 2980 2796 cmd.exe 53 PID 2796 wrote to memory of 2980 2796 cmd.exe 53 PID 1972 wrote to memory of 2196 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 54 PID 1972 wrote to memory of 2196 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 54 PID 1972 wrote to memory of 2196 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 54 PID 1972 wrote to memory of 2196 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 54 PID 2196 wrote to memory of 1644 2196 cmd.exe 56 PID 2196 wrote to memory of 1644 2196 cmd.exe 56 PID 2196 wrote to memory of 1644 2196 cmd.exe 56 PID 1972 wrote to memory of 784 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 57 PID 1972 wrote to memory of 784 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 57 PID 1972 wrote to memory of 784 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 57 PID 1972 wrote to memory of 784 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 57 PID 784 wrote to memory of 2376 784 cmd.exe 59 PID 784 wrote to memory of 2376 784 cmd.exe 59 PID 784 wrote to memory of 2376 784 cmd.exe 59 PID 1972 wrote to memory of 1476 1972 8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe 60 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe"C:\Users\Admin\AppData\Local\Temp\8c76b7d6-8b57-4c29-88c5-ceaf8f3b2271.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{114FEB11-1D2C-4EBD-9FE3-460FEDCE7D1C}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{114FEB11-1D2C-4EBD-9FE3-460FEDCE7D1C}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{DFB62530-39DF-4AF1-BA3F-5C49383B0D41}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{DFB62530-39DF-4AF1-BA3F-5C49383B0D41}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F2BDEC03-18F3-4EA9-ABD4-D53CDBF9E0AC}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F2BDEC03-18F3-4EA9-ABD4-D53CDBF9E0AC}'" delete3⤵PID:2244
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6F47B8E0-A76F-42B8-80C5-2B902F5E5749}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6F47B8E0-A76F-42B8-80C5-2B902F5E5749}'" delete3⤵PID:1160
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{021F038D-EF98-4277-807F-D9D2C31761FE}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{021F038D-EF98-4277-807F-D9D2C31761FE}'" delete3⤵PID:2916
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{522CFB70-E966-4631-B951-39079840FC86}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{522CFB70-E966-4631-B951-39079840FC86}'" delete3⤵PID:336
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{39A60542-2909-4674-A9B2-FCD89B71F373}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{39A60542-2909-4674-A9B2-FCD89B71F373}'" delete3⤵PID:2980
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{09D614CE-B995-49B2-AD78-718627D30B0D}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{09D614CE-B995-49B2-AD78-718627D30B0D}'" delete3⤵PID:1644
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{9A213CE1-2A1D-4404-85E9-A877A57FF56E}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{9A213CE1-2A1D-4404-85E9-A877A57FF56E}'" delete3⤵PID:2376
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{07126393-5C20-4FEC-84EB-08FDE444B0C2}'" delete2⤵PID:1476
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{07126393-5C20-4FEC-84EB-08FDE444B0C2}'" delete3⤵PID:600
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{569F095D-1CBC-4EAB-A3CC-4EDACD8A6278}'" delete2⤵PID:2000
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{569F095D-1CBC-4EAB-A3CC-4EDACD8A6278}'" delete3⤵PID:2172
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{25D60D36-2134-4703-B70F-C1E5670E2758}'" delete2⤵PID:2212
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{25D60D36-2134-4703-B70F-C1E5670E2758}'" delete3⤵PID:1840
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E62387E8-4164-4550-873D-246FB783FDA4}'" delete2⤵PID:2056
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E62387E8-4164-4550-873D-246FB783FDA4}'" delete3⤵PID:2892
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{EBF372D1-ABDA-4550-BCFA-E589781243CB}'" delete2⤵PID:1056
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{EBF372D1-ABDA-4550-BCFA-E589781243CB}'" delete3⤵PID:1356
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{223604F6-39C9-4351-83D1-90EEE67EC572}'" delete2⤵PID:1032
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{223604F6-39C9-4351-83D1-90EEE67EC572}'" delete3⤵PID:1508
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E3902E7F-7A32-4261-A3EE-B17FE1936361}'" delete2⤵PID:804
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E3902E7F-7A32-4261-A3EE-B17FE1936361}'" delete3⤵PID:1800
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7CD00F17-C743-4154-B479-2E288FF81CB4}'" delete2⤵PID:2500
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7CD00F17-C743-4154-B479-2E288FF81CB4}'" delete3⤵PID:1640
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{47BC8E53-5A59-4C7C-AEF0-C0F1C41CFCA7}'" delete2⤵PID:1936
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{47BC8E53-5A59-4C7C-AEF0-C0F1C41CFCA7}'" delete3⤵PID:1856
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5256e4513af0f928e5dd4ae305592b0a6
SHA12d8c8cd6a889b10a4c4c6bcd10c222287b3fc432
SHA256a662704fdde15c21a838efe54deb65ed905c1bfd47cdde74299253367adb7f42
SHA51271f8602f6cf2989552dafe5a9754e6117e4eaa8e8a6023f1cc34b91ea207174d60415c472d92579f0ce4360dd20ee377dafa1e048cf2e72581649f94db15da62