Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
HC2Setup.exe
Resource
win7-20240708-en
General
-
Target
HC2Setup.exe
-
Size
631KB
-
MD5
f96a73b23464366e4158620b10fa52c5
-
SHA1
1b048d127670ea9c113c3582c7d2bfde2bc4b32a
-
SHA256
6a06b2ba1a32b703d65f43d49ddaa8e74d8f5add21a8ab04aa0044937a5a50c5
-
SHA512
2639aa5b6b954d6492fb1116309f0810f68b758717f7b0158107296a515c1b326cdf166590e173a00a92d14dcc80e7aa2e9f4495806890f530b79d17e12ec6b3
-
SSDEEP
12288:qr3ZBIRB5Ij7QaClHwJFispW/tB7/x+irBvMb4AcKoUvTUfT2uk0pKBLMYN9UUvq:2ZB2B+j+wJF+/H7x+irBuocTvuPpKBAZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2624 HyCam2.exe -
Loads dropped DLL 7 IoCs
pid Process 1208 HC2Setup.exe 1208 HC2Setup.exe 2624 HyCam2.exe 2624 HyCam2.exe 2624 HyCam2.exe 2624 HyCam2.exe 2624 HyCam2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HC2Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HyCam2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000033ee9d951ac50fbd76b804eba5eb4b18b3530b37df0c7185507282e566678549000000000e80000000020000200000004b984c6955d10056f90160a8f7b2aec9b66f87f0b3cd0cb1dc5a0ad736157e9d200000007e190584bbbd4df33d1ae1bd2e7bd4d92d19c16788a4ef2a4dfde4cce4eb4e4640000000d8ddeb03a46d2923a32d626a381f1323f78a191836c4393e605fc4414ce4a7694db4f683064e59457ee9b9d2e7778420b63de96285491f27944dd767476bc135 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1E36C51-50F7-11EF-B707-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLs\url3 = "https://login.aliexpress.com/" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLs\url4 = "https://signin.ebay.com/ws/ebayisapi.dll" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLs\url6 = "https://twitter.com/" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809f799b04e5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url3 = 0000000000000000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLs\url5 = "https://login.live.com/" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLs iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url2 = 0000000000000000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000001e143791b8be496d20fc0629e578f0d6ca9faeb7bd9ff49949ed8e89082d2fd0000000000e8000000002000020000000d29d71ab941b20909e227e3a309baea961b31f06929a6a1993c4051ee5436cce900000004747d6d2efae23a8b8c87094c710fe03f7d22d2428b6512898fd6e77b20f4590f8be09d2cc5d123cfe42cd082ba0f287437657883c24e6d99ff997af016ef6266584e546257aa4f446e90309aae4cd4a79684b12d1634cfea39b22c7e853845bbc55a9c913644580872966dead8df26f9cea777e9aac15f675b9af2cc2791bf648b3d70a5a5d096094f56756c97b426040000000ee9b10b17affe1cbefb6959322749bc7b17b286ab06455537c1465506f39de30f11b8ad2d405cf9d31a754aa44036ee58845795ae3c22d7f8449ae0100223c4c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url5 = 0000000000000000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLsTime iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url1 = 908f868904e5da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLs\url2 = "https://www.facebook.com/" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLs\url1 = "http://roblox.com/" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url6 = 0000000000000000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url4 = 0000000000000000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2524 chrome.exe 2524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2624 HyCam2.exe Token: SeBackupPrivilege 2624 HyCam2.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 1600 iexplore.exe 2932 SndVol.exe 2932 SndVol.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2932 SndVol.exe 2932 SndVol.exe 2932 SndVol.exe 2932 SndVol.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2624 HyCam2.exe 1600 iexplore.exe 1600 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 1600 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1208 wrote to memory of 2624 1208 HC2Setup.exe 31 PID 1208 wrote to memory of 2624 1208 HC2Setup.exe 31 PID 1208 wrote to memory of 2624 1208 HC2Setup.exe 31 PID 1208 wrote to memory of 2624 1208 HC2Setup.exe 31 PID 1208 wrote to memory of 2624 1208 HC2Setup.exe 31 PID 1208 wrote to memory of 2624 1208 HC2Setup.exe 31 PID 1208 wrote to memory of 2624 1208 HC2Setup.exe 31 PID 2524 wrote to memory of 2024 2524 chrome.exe 33 PID 2524 wrote to memory of 2024 2524 chrome.exe 33 PID 2524 wrote to memory of 2024 2524 chrome.exe 33 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 1628 2524 chrome.exe 35 PID 2524 wrote to memory of 828 2524 chrome.exe 36 PID 2524 wrote to memory of 828 2524 chrome.exe 36 PID 2524 wrote to memory of 828 2524 chrome.exe 36 PID 2524 wrote to memory of 1964 2524 chrome.exe 37 PID 2524 wrote to memory of 1964 2524 chrome.exe 37 PID 2524 wrote to memory of 1964 2524 chrome.exe 37 PID 2524 wrote to memory of 1964 2524 chrome.exe 37 PID 2524 wrote to memory of 1964 2524 chrome.exe 37 PID 2524 wrote to memory of 1964 2524 chrome.exe 37 PID 2524 wrote to memory of 1964 2524 chrome.exe 37 PID 2524 wrote to memory of 1964 2524 chrome.exe 37 PID 2524 wrote to memory of 1964 2524 chrome.exe 37 PID 2524 wrote to memory of 1964 2524 chrome.exe 37 PID 2524 wrote to memory of 1964 2524 chrome.exe 37 PID 2524 wrote to memory of 1964 2524 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\HC2Setup.exe"C:\Users\Admin\AppData\Local\Temp\HC2Setup.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\HyCam2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\HyCam2.exe" -install2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6d99758,0x7fef6d99768,0x7fef6d997782⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1316,i,13033809830620781237,16614696602030482419,131072 /prefetch:22⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1488 --field-trial-handle=1316,i,13033809830620781237,16614696602030482419,131072 /prefetch:82⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1316,i,13033809830620781237,16614696602030482419,131072 /prefetch:82⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1592 --field-trial-handle=1316,i,13033809830620781237,16614696602030482419,131072 /prefetch:12⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2308 --field-trial-handle=1316,i,13033809830620781237,16614696602030482419,131072 /prefetch:12⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1564 --field-trial-handle=1316,i,13033809830620781237,16614696602030482419,131072 /prefetch:22⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2932 --field-trial-handle=1316,i,13033809830620781237,16614696602030482419,131072 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:448
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
-
C:\Windows\system32\SndVol.exeSndVol.exe -f 45548690 215951⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5964f7185e134926a77ce729cd8266efc
SHA14fa82a0f01faf7192fd32bec990abf26ecb2d437
SHA256fd31b13bc7ede632d3f524c724232e303a8a8b0c78790a9cda2f6f0b3171ec96
SHA5128d70b19c3522913f6b74982f3f8a4577525b0af2f74a70912dd5d3505b8088568f497fb22d8bce0d881b580a697daeb1f32587de00fcaa2bf9077847f7aed4b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dde72a03c66fdacb8487b440e2d88bd
SHA15b3598b5a147fa6ec0ff12cc2143be5e0aff9b1f
SHA25685ff8ab381b59954c2a4397cb74e225eca4b990d47784176fdcd78d9ad130d67
SHA512bcb8f60b06948ffb43c6dab1a40bc67c59a301fc5dfd97ae87686f4acce4fe226de220dcafb65e81258b8a148685999c75b3e0dfbcace133d07dd1e2898d92b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556926283fce5f71aac11707d36b151c9
SHA1b5d3f326f25ffcf35f8a6f1c6dd2ebba952f9616
SHA256c3a4482ba6777e07d3bc9d5072595b2abe908132e183ad5191eaf8220f32b5d9
SHA512bfb2991b11010824a55a9c3916632ae595d8ce1094c53080db3f6e7e11282f165ffe4b33eef9e3f3ee44678c46f276cac65cbb0623b7081b1bbfc2fb4c5490ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5610af29df4bb42c4d32ccede3968468e
SHA1741b26127cd78ecf331d3208665c1d47d852c1e8
SHA25615e6d98d1b9bb85cf3f6d81956cd6841b12411fe9aeebfc5ab879cc4ffb9d2e6
SHA512af07d366e22d5f4938db2143e116b290ffc2d5d0d1abffc18a602ae261523a203c661a206d2793a71e0e135cce020b094b7c876da862285e2c0af5b07a0dc39e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52322d28080a3620b276e52410281e2d4
SHA1129a22db67b3883c759ac36d3406f1e129d34d5f
SHA2568fcefb096ad80fc360e56414ab33e3e5dc087fa5df9eb2825a19406ae040a45f
SHA512ec6f61d06ba4eba8ce2f48e8721156236e79ab9a1db2e1072214c524936ea42f7b9abadaef9f057b7cbedae7e6d09379e500c5c3ad2c07a700acc03b75d05c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e80772f7970a2a2c2923f7293c16b157
SHA11d23b28a1c4fdc815e8c0480b182b98a91070cbf
SHA256681bb48459c0a3ad23fcff34fb02a8390513e1fefd77c33de100835033aefb1b
SHA5123df10205bf69513b360cacb32c1a56fed8ab8857e358c87a85bd35f2185946686490b6faafbba2d45bcc78448f7b33f13589435f596f9cfe4e126444aac2bd31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b2aa4066c4c01ccb732e6e40f4b47c
SHA1637680611c5599f0e3cc9a4ad9469fe4d37eb614
SHA256f1e0a612dc6430d4ba17b22a9f1660c09706b0cb6253a4cb370f3de2bd257a7f
SHA51247a6da7b82d18a74e678017afe072b9690565a6443abbe7563c04ae3e58d3bae4b684b730c1e08212247f8dc6038b2949088a6bf0dafffe9dd4801747453773e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce0d54961e21b62309b88fc8b93666a8
SHA1facb8aa603e984bd8116c6f6858aab6dcf1f1560
SHA25613fa36e20dc0d24ec37a42b7b30e786bcaaad323867c11c5012567a7a8e6b68c
SHA512a4cdd7f8a947b27856eb83f0918bda43f49fd99de4e06a7dff12b3e06a7b1f1b37180ee331bb0f2039e8132e622a925c340cc070460244f3f09dc20f3d5ff815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565767d1a9a74f0213201d9990b75524f
SHA12c986b4e99b1fcd35dd6a4a2ba4aa65034be9264
SHA256e9fe1626ede3149535dee91151941c9b3d39f2289b81ba3b765d6f295786030f
SHA51290d9f3f8e4bb340472e637e38041404a73d1451e086cff7e4cb436dbc3c1ece61850e6142c76033282739fcfd397886d5475a218510e926cfd7bf7e8830f5e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d294ec2e2e22808c3189f2d8fb9de608
SHA1070752cff33d5707cbd0360df6ee9ce94af5a804
SHA25681c87496db18b434ad12ac434f31df8e8ef3ed82ad306055bbaef64754d444c0
SHA512142789f1a31548657715f3d8c04d7b3056146484c021d0192800a4cdd98b6a61408dfb5f5d314aea44a3dbaac483cd104569191e7e5d1a1b7fc57685a5d5d27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ced6d00b1f7405bcccb72b45561b324
SHA19fbfd1e0098107d24e65eca0e56b3c429c57cb28
SHA256517ec46494af0a4478ee1ecf59fb5f26590e76468730ff75d6e74ec7ca776199
SHA512edeb63f4f362c14e2059f116cacdf260a8ed954ba1eece757d0b89ac8d0688800bab3b1d0ae1aeed7206064a304d3c2a30a8bb70c135f22a0d795ad8090132d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eda81c277b567d7960e39ce4ec7718ca
SHA10419b8550a3c2d4bfba9b32ca8a84dc34fc12c3b
SHA256f90d6ae6a32118cb7e786e10c566e697bc2b62d788b890bb3114551e1db11cce
SHA51284ca30d57c8d1064d3e651e68236a87e15487867d4696439ddaaa562634b2276712854b5d26e7c7cb464acb260f55de54815c55cf169a6c5008d7fbd0834c284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb95d7a723ac053655ae77ea564da0ae
SHA15574e4caf9bf49d68e0ed9cf2a2d0a2ce0d7312b
SHA2566cc1e3e4bb14e7e8ac95f414858ad3530a35608d51517b90caab1582813f9188
SHA5120d899921d57694bbe311a84ef1d28f49274e3727912632309d2698ad40812c1306f0703edd26752cef38a839466df8838ada1afd2706d47ecfcd097002c6c3dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1ecabe41262e9a3dc7b9ee3edf769f2
SHA10dc5729f6922c7c011980e2304359afcb7d913a8
SHA25624a7632d4d3a00ba70f193b1700dadf5a3bd6e4fda567d332515a497837e863d
SHA512242959e260c0f6d6674b73d540316f814577446e800ebecb7190b4d589851b815e4db0166490efe0731c37b454bff5d76b11f67313a9d81650a4037e9e79312e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c44602ff682ef3fadf13e3d118bcf9dc
SHA1203de4cdfa8db3542d31cb0748365d87d6bc04bf
SHA256ff536098967d03030792ad6cd843e29dc481d46f091fae05e6b90b1330b348db
SHA51278a6bf4ccd732d5411c903628925880c3d986e63fd646df8458c28d151ba5b38e757f991291d563cd2efc3a32e77f16a8e741d9aea72341e642ce7818f2838a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56824c28111a769476aceb49a8206156a
SHA1f54548d9c7bf12d1ac55ac012e55c9a493ad18f7
SHA256e18771b1818aa3a3c96ec4ca254f3dd33e38bd1e0dfb769be2022a9b3ca39bd8
SHA512ddfdb0952e86f49820b8a97266a63334f14b915e8696e086a416b8a0d401c03881f17284f7cfcc9a3d0518efc79f41d5c8f5d7424dca0930391632518f95f999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b57835a372087441969eedc27048e580
SHA19425c981dbfe6c12851543188b7c450b2e8ab536
SHA2566f05a0a53bdca58a97093f3fc8f51e33a345e837334d2c08503101fa4f30306c
SHA512f44f3099a3d4874ece03f40a13a9ad87be307950b2cc4fdf76bac054e873ee460cd58d9d535bb3e65f2d72c139685eca93838e4a21a7149b6d10827741d5aaba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e465c189a16c74358fa528947b773acc
SHA107f9e7307984c5981a803e71ff6aa26b0aab25ed
SHA256e84ef23774ed3988a05b7845ef385587e3ea4689588499f1912d54c3059074a8
SHA512a082c6cb861141dd4c006a27e814a35839e97dc4be3ad72a33116e634702f6c8c9a775fa3e65a1102b2a15ad8db83b3dbb3c26c5a67fafd8156df41b2b6a8ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c6b97cc69f8471f4ca22b2873922eea
SHA1e4e00b737bb50aef0ac6c771cdd7aea324749264
SHA25661e9aba7e0e3f38a73edd932f15d648fa8ade2141adb55abd844a7dc7ac21898
SHA51222c1a3ee36c0963ebb02da725393990bef2045583d21b28b7420b1e092259af8c8360294cb1f17ff607030f9837e2af35da59d03d7b9a255d4a7198b036b9805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db27e0eba1c7a2857ba31f8877b0ba31
SHA1a1c69623d3ad445123b2340df126cac943653219
SHA256d514ca24c02c1de69f34ade2c613749c420d43d0806768ed3110bbad434fd53d
SHA512410bfad5cc61f7ea83e3abef671df328c873857f10d7968283ea7038b94137807e0054b58338f42c44284eb8f44c138e5bf306bbd8b2c930ecdf1784c19af151
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
986B
MD5b07b2429d6598e350d8a9bd5fd723712
SHA1e26284591c8d431addd44b21e76fc016805cad78
SHA2560ef6596c656d61c3cafc06eb9de52af487124608f5dd55dd25db5fd23721d529
SHA5125052746871972278707716315f481522731db978775020585b856b4b567445eb9ee474e8bdef31b9af78356d4a95915463a8a44b0ff61770d91ffad0d6332688
-
Filesize
5KB
MD5030053908eb9188779ae6cfeebde8cb2
SHA174b0891b0f79f16e303067764e3bb5e6ae647d91
SHA256a21d4caa87eb5e2e74a62b6820a3c324bbf0e245c5d41dc35752aab70cfe6cd6
SHA51275fea4aa208dc33ee02502f2ec7a4554ceeb208b03f9ca6f939e1d6c591a5b7b8e5f30d9fbcd6787522d1a59822dbfcacb6a043ebf94f1b2f9b369efb11589b8
-
Filesize
5KB
MD5b45a445522e0849a7867a2154e7b93e4
SHA1a3b1ac7e4168c1943373f90dc9afec2a07a81917
SHA25665f78da5d4aa4b705151b37f4281fdd8a905e234e943598aa90d5e832a0fb01b
SHA512b623b0e85668e00ca9631dcedd152e02ddbda9c9af4fd064be17e26362be3196a38f12116f9829cc2bbc9d4d113d4035ccab595fe1475ad352b52f2aa81b714d
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
68KB
MD5302ff6a4b9f7af939366600a818316c8
SHA18aa2404d9004e9b094e165b62a1dc318661bcf1f
SHA256de326afdcf4ac17d6e75d46499685c22f39f837e12348992ce768b2538d69372
SHA51249e90b4ad4f2b9ae8b84ab0af54e939d9305283811e3be757ac7224575ad2c5fe96cf9eea4f1ad9918578386d3c93afc0549231b3239a7c811e6141b021c13ac
-
Filesize
82B
MD592b609d63452d6f46670ddb55f4cabf6
SHA1f8924ca1578173795b5de4041c99fe69a1013552
SHA256ae90f5cc0ca1194e999d1b7faf382cad743633876afd5cd0585896e17ec32310
SHA51240102772b4133b41e339fc0dde66577c048f55f38d56770dd8ddc25f846053e55d6372bc9e6432edaa202927a16df62fcdf342529bb815c2923706ceadb0ac66
-
Filesize
56KB
MD5a4830c567b228dc7f032d88dd772c068
SHA1ffc190ded8fc1685757f0340814140ab4af81c35
SHA256f1841225411bf68cc24159b001e15072e96368654862470c2cc272d004e6b736
SHA512d2d112980a3fee36ad7049225fe8a5b79664e991db69dfe2cd5266d9fa694a958b35497a468908532568c61d1c85d0fad19997f60f738318d0e925103a7e6d4e
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
861KB
MD5596580454699fdc01b48029905171bd3
SHA135d0e563dab1a887f6138298c6500c7aee0032d6
SHA2567465a6b09b41dbc3d0e3b564c6ac6334dc41ff2f3c2dc39bc9e37aede51b7272
SHA512fd74477f50a55117f756d2ba495f03c35ebce45d50852d9cb220e4bbcfd32e4569566c8c04d41f263335b262621e8cec88ed92ce395d4671548ab606b2ec491e