Overview
overview
3Static
static
1S3LF BOT.zip
windows7-x64
3S3LF BOT.zip
windows10-2004-x64
1LICENSE.lock
windows7-x64
3LICENSE.lock
windows10-2004-x64
3RunApp.bat
windows7-x64
1RunApp.bat
windows10-2004-x64
1afk.py
windows7-x64
3afk.py
windows10-2004-x64
3afk_data.json
windows7-x64
3afk_data.json
windows10-2004-x64
auto_messages.json
windows7-x64
3auto_messages.json
windows10-2004-x64
3auto_responses.json
windows7-x64
3auto_responses.json
windows10-2004-x64
3automessage.py
windows7-x64
3automessage.py
windows10-2004-x64
3bot.py
windows7-x64
3bot.py
windows10-2004-x64
3config.json
windows7-x64
3config.json
windows10-2004-x64
3requirements.txt
windows7-x64
1requirements.txt
windows10-2004-x64
1status_rotator.py
windows7-x64
3status_rotator.py
windows10-2004-x64
3tokennn.py
windows7-x64
3tokennn.py
windows10-2004-x64
3Analysis
-
max time kernel
146s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
S3LF BOT.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
S3LF BOT.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
LICENSE.lock
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
LICENSE.lock
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
RunApp.bat
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
RunApp.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
afk.py
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
afk.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
afk_data.json
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
afk_data.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
auto_messages.json
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
auto_messages.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
auto_responses.json
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
auto_responses.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
automessage.py
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
automessage.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
bot.py
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
bot.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
config.json
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
config.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
requirements.txt
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
requirements.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
status_rotator.py
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
status_rotator.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
tokennn.py
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
tokennn.py
Resource
win10v2004-20240802-en
General
-
Target
S3LF BOT.zip
-
Size
11KB
-
MD5
0a8cde3c0dbccd5e4292315e9fbe384a
-
SHA1
70af443250f498f9087b45527330ff85af1c116b
-
SHA256
2795153f640f44d5fd12c73aa5291f29f3448bade08565e5e326c07184c594c3
-
SHA512
030a8a01d958cd37ffc28d7c2c27d3c42d90074b35d9ad7260a04fd64ebd47454249d3829ff229a8f24eaaf6829bb533494f572e9de01074ebd1ff2b9368abf8
-
SSDEEP
192:4HxfJ4mCW/GVdPT9hIXjBKExJZRIgoh5oZU3ZbekgVPDGcPgBwAH7V:4HTctLWNKO3Cj/o8ZbeXtPgp7V
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Groove.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DW20.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwwin.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLsTime iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url1 = 908691b856eeda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url2 = 0000000000000000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLs\url1 = "about:blankhello" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url4 = 0000000000000000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLs iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLs\url3 = "https://login.aliexpress.com/" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{E2C11923-3E20-11EF-AD9E-EE33E2B06AA8}.dat = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE94A471-5A49-11EF-AD9E-EE33E2B06AA8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLs\url5 = "https://login.live.com/" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url6 = 0000000000000000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLs\url2 = "https://www.facebook.com/" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url3 = 0000000000000000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLs\url4 = "https://signin.ebay.com/ws/ebayisapi.dll" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url5 = 0000000000000000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TypedURLs\url6 = "https://twitter.com/" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3004 chrome.exe 3004 chrome.exe 540 Groove.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 112 iexplore.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 112 iexplore.exe 112 iexplore.exe 668 IEXPLORE.EXE 668 IEXPLORE.EXE 688 IEXPLORE.EXE 688 IEXPLORE.EXE 688 IEXPLORE.EXE 688 IEXPLORE.EXE 112 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2012 3004 chrome.exe 33 PID 3004 wrote to memory of 2012 3004 chrome.exe 33 PID 3004 wrote to memory of 2012 3004 chrome.exe 33 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1672 3004 chrome.exe 35 PID 3004 wrote to memory of 1824 3004 chrome.exe 36 PID 3004 wrote to memory of 1824 3004 chrome.exe 36 PID 3004 wrote to memory of 1824 3004 chrome.exe 36 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37 PID 3004 wrote to memory of 572 3004 chrome.exe 37
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\S3LF BOT.zip"1⤵PID:1152
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2812
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6679758,0x7fef6679768,0x7fef66797782⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1304,i,8547802975131883465,15627525143556742588,131072 /prefetch:22⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1536 --field-trial-handle=1304,i,8547802975131883465,15627525143556742588,131072 /prefetch:82⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1640 --field-trial-handle=1304,i,8547802975131883465,15627525143556742588,131072 /prefetch:82⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2292 --field-trial-handle=1304,i,8547802975131883465,15627525143556742588,131072 /prefetch:12⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=1632 --field-trial-handle=1304,i,8547802975131883465,15627525143556742588,131072 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1500 --field-trial-handle=1304,i,8547802975131883465,15627525143556742588,131072 /prefetch:22⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1316 --field-trial-handle=1304,i,8547802975131883465,15627525143556742588,131072 /prefetch:12⤵PID:620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 --field-trial-handle=1304,i,8547802975131883465,15627525143556742588,131072 /prefetch:82⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2476
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f657688,0x13f657698,0x13f6576a83⤵PID:2052
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3660 --field-trial-handle=1304,i,8547802975131883465,15627525143556742588,131072 /prefetch:12⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1272
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:668
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:112 CREDAT:209934 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:688
-
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove.exe"C:\Program Files (x86)\Microsoft Office\Office14\Groove.exe" /TrayOnly /NoLogon1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:540 -
C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE"C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE" -x -s 13322⤵
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Windows\SysWOW64\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 13323⤵
- System Location Discovery: System Language Discovery
PID:1584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5007867bf4422c98a1ba1ea7c622a444d
SHA145ec07e46f7314718eb095a727e945eef8c32fcc
SHA256682d1afc2588f69117b5547b68c3455560607780c8e3f8ea606b93ec84f30048
SHA5124b0179a414042eb7a3727cea1eedfe4ce0a71bb3fbade5d3fb059a73c7bac7808c56654c0e059f5ecec43567016f4f348bf6f035738a4ea87d09c4a17bedba4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567119229d0352464965b06dcdd5883cb
SHA1860ea41dfb19bee1e6c12dd8bb863da608907576
SHA256e832464a640ee5b659864dd8dffd558f3b90d7c01c53b78f069bf4c8354d2eed
SHA5122e0b92ab48cead7277d29a5af8c05c61c1cfd93686baac9f0a771225754b67b6262de59a372f767ab0e21adda8deca2812fc33afb4bce14c3945643aeff7d435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2afbc49a3a911f10073cd0f5f5bb08e
SHA1be66211aeefd78d48b283b344963045261b5efc4
SHA2563c771a8ac18c6072909321bb678a3632a07dc9fb88ae03d5ecdbc22ce73e3725
SHA5128f000892d62e53345d8caf91b68715635d80c940ee78a5940a178dd70cb3762773e6857fd9aaa1a1d393438b2d56c8dd1afc78fedaa9fa8fb65c4c1a9457cbc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559d9cc1574de5c989bd35eb4594a4501
SHA1f591db92b613c5611b66fa5c59a22dd7cae14786
SHA25683fba3c8b985980fb7886e3bea734f7b6fbd00c2d2d758a16a98559ebe9f2a3e
SHA512224f7208ebca420377d8fd2b334c8f9c9175be7b6448f5a6dad81c27c4e843f1356aed51c3ff21c464fcb7f7b9994f21e293beec9104dc67c2f5bddc597ad04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db872fd868977b1f9c729a9735446239
SHA17e099f836a19d309496cf0c9f025bf1ce1465f80
SHA25684a859346e533c4a54b01ec62ecb8ec64a99b8ec4e6b8dbd2ac905d5e6b433c8
SHA512b9d26371b9af741fb7dc1cc38262a31fc0bc940837518b177adfb7cd92de95f5a4bf8bbc466f2ca7af61796e6b5e0a7d11c2875315ce87411936c18666ae50b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d24d107200e8c7020e0e5c11a5aea028
SHA13867ba5f34950068daf22c2d26d75c9de4464b18
SHA256dd2122618a2e4ec3f0735fe6ba61d6454ca8e89cb042280db1a10df7ab179c92
SHA5129f21623e8d514b1e9441823647cdc7ae451a28d014dd254f85c88cc52c81bae0197b6e4260db59f07d68cc2772b92370382ecd67eec58c113a58cfc2af7b264a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5483ba4199a82bf7216fa088c20f6d5c6
SHA137cfede4258c9b3f1e1a5e5555ff63b0c78c11be
SHA25682d20f16294a647e74e5856865f974367fa1154d5dd08c99ede080e8a5f0669b
SHA5120f6a076eb7c3335d8e6986dd28c594537874d380b311efaf91effee41b87677658b1f926e05f0a30337e2be8fc41d7550b7e356830e9846c364421b15c71d4e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b821e167f22c111aad39c3ffcad93694
SHA1d13bd70e00b9e74ad101edc0ef2b9aaf7d24a1cc
SHA2563dc5d6d17e01d5495a6e6f1770d9e59f8b125ce7424fca3c2c5457e7251d6bb0
SHA5120866b9e9a939fb1eb6030e6c57fe228937bc51d68aa716ed423f545483a73aa71369f5889686ed9d1590c94ff58c8c917143871fefcce90de1877638dc67094f
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
986B
MD55e0b838c007eccf3dcf66c6be5af8484
SHA16fbdfffeafac5a40f589fabd455b4d30738a6b35
SHA2569aee2fd5f03f0d85afd1f9275a566ffcb685898767a65b0d9a38c6fd81d754e8
SHA51216ad20cea726180d9b46f6f2a615e49129cb7345594abb6d9fc6bfde32ffa12ea2a517cef2ac7c442d3150a5fa68dca949a8fff0483b0100eaf5c4e914c08edc
-
Filesize
5KB
MD509584289648ea7c6da06a4ec20d6b56b
SHA1bbb37db6f252f69e12b95f372cee0610f462f754
SHA2567607e36e942c515962a5ea31623d8a4a5c52594fef163d14f339641f435a2e5b
SHA512299d74d4b64a17ed0f61bb4d4006ad285e954dee5a62a25611b2faf39ad3d80154b7becb3ae7a03cc5e6b27992c037cd609e3690a4c9fc319bd348a9e0655f3a
-
Filesize
5KB
MD5016b2f5234f8464a832baa1fff9d16e8
SHA11be78f44f0d6c6233aed0b612a9e3239c14badf1
SHA256a6a471bd84a21188ac50c46a1b0927e26d11a3ba6650a1524bb19e11a23c6958
SHA512fc0626e61c7134f5c90b545cda16e4f99cf573fbf22bc759ff6a46e86aee9f672d44f3c1fc3f387624e14dc18500e7b826e4a5964bc4316d691ef2f6da23bc8c
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
310KB
MD59b17d8f975a85772a47a29c9c9eb347e
SHA1c7c4b5eea87beed30028894e850aa064614b1a91
SHA2569d0ddb9e59b85d5629d2b03351bec68e82b0e025af5344ffb119ee7b90556f78
SHA512044a07790b1460744413381cfb7fffb1d4ee0b28b89c81f1df10f9c4ceafc3f146422807e07abc35f2cf0dd7d3ac374ec75c50f13df5b4fbae900e92d8eb78b9
-
Filesize
310KB
MD585af121175d3e74a757d69142ff7c913
SHA105088fc223c016896186b6894e48df1f84ac21ca
SHA256e7f439f9d7321732c8255de38f8a91164c2fc75d677dc05c887c8f2dae959211
SHA512ce69a4d49f1fa1302bc9cf78a62c0876aed170aa461ae04d1d584658e7f967d38ac76b268ec340e60438f2f17f1240abd5ef135a46d48e05d8e8b6c501899a44
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{55268EE2-7A44-4E4D-9408-AF3D58129A86}.FSD
Filesize128KB
MD5a1436dbcb4e46126d02d3e49f2504192
SHA175b60ed0ca52dcd3b16d66394748b8ccab7b2b88
SHA2567a2ed94436fe2f4af9d96252f5fcbf5b1eab954951bfa9b729153137bc07b116
SHA51226311de5171410f54cbc0841390758f47a2dd0d36923625a6072ba915f1c5ea1a3d97946bd3a85e5b142257331b3d4c54451e09f89c14b6744a7ef98c8ed56f2
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Filesize128KB
MD57bb371376e6d8644ae9e83c8058190a0
SHA168b66dfbf9715c1c91f8c1fd43506daf81346e10
SHA25693cc3e88a37b0a87e5b2848f86e8078f7ae9690e97d48b7e4630895a09a70fbb
SHA512d38d7ee625d90d623a20f29a2e4b04181dd82908839e94b16e75d2883cbbe493eaff7ea0c65e6614669ab848047121139708fa399af7112e30bc68f7734063d5
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{06B2B161-705D-4336-8C57-EE7C74B34807}.FSD
Filesize128KB
MD50fd22e83429d578b94caf6b13beab82a
SHA1c7b92b14d6f5e73b8ed3df8b1638be593d212843
SHA2562fbc30fe375d0e722e849f53448d6486c53231a115ab6a55c31ea801927c4866
SHA512ab47953bc676aead7ce0dace32ab113289ab0f7d7283ad6c4427319c699cb744f6fc61139999019d99e06ba0435083a1c3ba83e13c50eea33ce456c8c9e9807f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\qsml[1].xml
Filesize256B
MD51ca648686e3b29e4c56333cb10a52b2a
SHA1f3cd1a0ccb73cdadd0e4e8bf0cd9eb5689806778
SHA2562b4da9003314efc28c4ce05728271966ab7bedbb032d2fc7a47b8ef686842757
SHA5125812b3e8d7014235e1d7d132ac91b52b5f760cc3f2b6e24eadf301ac84de2b52fa7ab26c03ed70bfc3e882b6700bf5b425acd96e9a64032527cec7314720bb94
-
Filesize
560B
MD5600195aa8e276585af41bec3046292af
SHA138eb8b87a1d40f6b3681f5bc35a3eb72b606b6a3
SHA2561f660a11e91f1d2f8efe6fc30eb7ddf5017f8ec192dcb92e150338f0d317e361
SHA5127ed50c254e5b027a9f1db6cddc977b4c670d9be844708a2d92dab38a891f4764de7dd1f59593743e743eb00a9c14d6c38820fc09235317dfe687f8ee4b2974c0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
128KB
MD5181517de766f19204613c7bac7537ac1
SHA10fbce63385d0a28782a4c049a39111b6140c6096
SHA256caadb75d3dfb8f2c72a8b96ac0df1de5585529ce0b796af38b73bdf0f3fc8173
SHA512d999660a798dd187fa64d184bd8c9c279fb260bfd0c90a0f16d68eaea5961df8f4982d6351adf3409c90fdbbc08ee1baffb826db2f1d82310eac59e0054f8a02
-
Filesize
16KB
MD5127bccd816593016a2f9d5ee48e58bfb
SHA1884d4fde6125c38e3a583773dd0b78440f1955b7
SHA25692339260cfe9c3cbeda6eec8444d4bf932761f02681864995e69fc5875839320
SHA5121bffec47a8b27d2815317d435e5d28805609d74dbc873a963d752090d7279699c919542521d84eef17d0f5a402e08221c45129b1a2aa84869057578e6103be11
-
Filesize
509B
MD51a5f10b1e278047940ba93e5f4560561
SHA12ed880202769b8e092cf1f7c74fe100cd82ddbfd
SHA256bb01368805a601fec028b310f22092f7dd41a69698b2ae399f1722447d97d1f0
SHA512c9a66bb352b251ca503f96ea7c8c0859ee317b29e42afead6a4f8c4a64ee46d10b02ed0adb0fbcdbfb31f0e893fb4233c12c167c5f26272368a05567e552cb26