Analysis
-
max time kernel
150s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 22:34
Static task
static1
Behavioral task
behavioral1
Sample
51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe
Resource
win10v2004-20240802-en
General
-
Target
51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe
-
Size
347KB
-
MD5
b5ff844d298650467e7d45a18bfb1303
-
SHA1
a1dab1a6cdd93b0aa06bedcf4088a93f2e8127a4
-
SHA256
51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc
-
SHA512
b4c47ed3aef8b5f9c160572824b1a167a6a5a10143254f6b8908f9d37b227f5036feb5345f48eb6dadaed2c884d31dbc7b46de0fd343b9b8b3240869d518bdfa
-
SSDEEP
6144:hgOh2p1qF8C8gDL5GXAHsZC1JxvkChUQxL0hkMVKnzL:hgOgPqFqgD1GVg1J5pdxikfzL
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://52uo5k3t73ypjije.wht5py.top/4041-1F46-6A2B-006D-FC83
http://52uo5k3t73ypjije.ssd5gt.top/4041-1F46-6A2B-006D-FC83
http://52uo5k3t73ypjije.lwbi59.top/4041-1F46-6A2B-006D-FC83
http://52uo5k3t73ypjije.3odvfb.top/4041-1F46-6A2B-006D-FC83
http://52uo5k3t73ypjije.onion.to/4041-1F46-6A2B-006D-FC83
http://52uo5k3t73ypjije.onion/4041-1F46-6A2B-006D-FC83
Extracted
C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3AEA9A82-4E28-13C0-DB4D-43AE90C05B1C}\\MuiUnattend.exe\"" 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3AEA9A82-4E28-13C0-DB4D-43AE90C05B1C}\\MuiUnattend.exe\"" MuiUnattend.exe -
Contacts a large (516) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
pid Process 2744 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\MuiUnattend.lnk 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\MuiUnattend.lnk MuiUnattend.exe -
Executes dropped EXE 3 IoCs
pid Process 2904 MuiUnattend.exe 568 MuiUnattend.exe 1092 MuiUnattend.exe -
Loads dropped DLL 2 IoCs
pid Process 1140 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 2904 MuiUnattend.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\MuiUnattend = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3AEA9A82-4E28-13C0-DB4D-43AE90C05B1C}\\MuiUnattend.exe\"" MuiUnattend.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\MuiUnattend = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3AEA9A82-4E28-13C0-DB4D-43AE90C05B1C}\\MuiUnattend.exe\"" 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\MuiUnattend = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3AEA9A82-4E28-13C0-DB4D-43AE90C05B1C}\\MuiUnattend.exe\"" 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\MuiUnattend = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3AEA9A82-4E28-13C0-DB4D-43AE90C05B1C}\\MuiUnattend.exe\"" MuiUnattend.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MuiUnattend.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp60C6.bmp" MuiUnattend.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MuiUnattend.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MuiUnattend.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MuiUnattend.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2744 cmd.exe 2776 PING.EXE 2404 cmd.exe 1640 PING.EXE -
Kills process with taskkill 2 IoCs
pid Process 2912 taskkill.exe 1888 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3AEA9A82-4E28-13C0-DB4D-43AE90C05B1C}\\MuiUnattend.exe\"" 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop MuiUnattend.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3AEA9A82-4E28-13C0-DB4D-43AE90C05B1C}\\MuiUnattend.exe\"" MuiUnattend.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A1E5811-6269-11EF-8FA3-EA829B7A1C2A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 801d94fd75f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000073c869c69c709919855ac26366e842338cd0fd5f8009b263abfb44d0094335db000000000e80000000020000200000002b1daabd327f7add38fd3f6e98902a2e74871bfd068ed9a887583f9c97f4b1b7900000005cece06cb838e3a7c42a9d7d40c77432cbb193d60375a978707dbfcf87dc5c1afe667a40f187164f88c211970038a9d2b538e5c9638265946198150ea787cb0adf2421e92ce0992586c737a454b66c17d13968ad5f28cca014090ae2de1cd83de79391f69ecc9c16a82cfdd96fc02debd1fe0c59837d7b61af37366838081452d52ca1e20b901c319f7f876e8b5d1f8440000000fe3f03fd2544edcde49261b12828ae921618856106ddfbd92eb3c02834a7a2a6b400c14fefbc20279a9bd59840567c230e10543488054b75837ad70ae853d2c4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000bc58744b50e1f605baea6bd2b64d4169360a4e5309a490cdfcaff4988a3575f1000000000e80000000020000200000003fa60845f2acfe4c52a3042d8ba3f80f89c5cdba892e84390cbb4cbc5cab9868200000002675f8c9d591eefcb9468c5e10d97d0d1fa108e9a221c4cb4d75b373095fc70d40000000ab2b4eea836f8e89496a695139d7f42fd33bf4589fad8a4cd12041ffa33a033f4160a527a353d61fa7b109910ca41a872f4cebca4c13e0e0897d9da2caaf3f73 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A3FAB51-6269-11EF-8FA3-EA829B7A1C2A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2776 PING.EXE 1640 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe 2904 MuiUnattend.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1140 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe Token: SeDebugPrivilege 2912 taskkill.exe Token: SeDebugPrivilege 2904 MuiUnattend.exe Token: SeDebugPrivilege 568 MuiUnattend.exe Token: 33 1240 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1240 AUDIODG.EXE Token: 33 1240 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1240 AUDIODG.EXE Token: SeDebugPrivilege 1888 taskkill.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1140 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 2904 MuiUnattend.exe 568 MuiUnattend.exe 2008 iexplore.exe 2008 iexplore.exe 1812 iexplore.exe 1092 MuiUnattend.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1140 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 2904 MuiUnattend.exe 568 MuiUnattend.exe 1092 MuiUnattend.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 2008 iexplore.exe 2008 iexplore.exe 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1812 iexplore.exe 1812 iexplore.exe 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2904 1140 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 30 PID 1140 wrote to memory of 2904 1140 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 30 PID 1140 wrote to memory of 2904 1140 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 30 PID 1140 wrote to memory of 2904 1140 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 30 PID 1140 wrote to memory of 2744 1140 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 31 PID 1140 wrote to memory of 2744 1140 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 31 PID 1140 wrote to memory of 2744 1140 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 31 PID 1140 wrote to memory of 2744 1140 51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe 31 PID 2744 wrote to memory of 2912 2744 cmd.exe 33 PID 2744 wrote to memory of 2912 2744 cmd.exe 33 PID 2744 wrote to memory of 2912 2744 cmd.exe 33 PID 2744 wrote to memory of 2912 2744 cmd.exe 33 PID 2744 wrote to memory of 2776 2744 cmd.exe 35 PID 2744 wrote to memory of 2776 2744 cmd.exe 35 PID 2744 wrote to memory of 2776 2744 cmd.exe 35 PID 2744 wrote to memory of 2776 2744 cmd.exe 35 PID 3004 wrote to memory of 568 3004 taskeng.exe 38 PID 3004 wrote to memory of 568 3004 taskeng.exe 38 PID 3004 wrote to memory of 568 3004 taskeng.exe 38 PID 3004 wrote to memory of 568 3004 taskeng.exe 38 PID 2904 wrote to memory of 2008 2904 MuiUnattend.exe 40 PID 2904 wrote to memory of 2008 2904 MuiUnattend.exe 40 PID 2904 wrote to memory of 2008 2904 MuiUnattend.exe 40 PID 2904 wrote to memory of 2008 2904 MuiUnattend.exe 40 PID 2904 wrote to memory of 2724 2904 MuiUnattend.exe 41 PID 2904 wrote to memory of 2724 2904 MuiUnattend.exe 41 PID 2904 wrote to memory of 2724 2904 MuiUnattend.exe 41 PID 2904 wrote to memory of 2724 2904 MuiUnattend.exe 41 PID 2008 wrote to memory of 1736 2008 iexplore.exe 42 PID 2008 wrote to memory of 1736 2008 iexplore.exe 42 PID 2008 wrote to memory of 1736 2008 iexplore.exe 42 PID 2008 wrote to memory of 1736 2008 iexplore.exe 42 PID 2008 wrote to memory of 2896 2008 iexplore.exe 44 PID 2008 wrote to memory of 2896 2008 iexplore.exe 44 PID 2008 wrote to memory of 2896 2008 iexplore.exe 44 PID 2008 wrote to memory of 2896 2008 iexplore.exe 44 PID 1812 wrote to memory of 1748 1812 iexplore.exe 45 PID 1812 wrote to memory of 1748 1812 iexplore.exe 45 PID 1812 wrote to memory of 1748 1812 iexplore.exe 45 PID 1812 wrote to memory of 1748 1812 iexplore.exe 45 PID 2904 wrote to memory of 2744 2904 MuiUnattend.exe 46 PID 2904 wrote to memory of 2744 2904 MuiUnattend.exe 46 PID 2904 wrote to memory of 2744 2904 MuiUnattend.exe 46 PID 2904 wrote to memory of 2744 2904 MuiUnattend.exe 46 PID 3004 wrote to memory of 1092 3004 taskeng.exe 49 PID 3004 wrote to memory of 1092 3004 taskeng.exe 49 PID 3004 wrote to memory of 1092 3004 taskeng.exe 49 PID 3004 wrote to memory of 1092 3004 taskeng.exe 49 PID 2904 wrote to memory of 2404 2904 MuiUnattend.exe 51 PID 2904 wrote to memory of 2404 2904 MuiUnattend.exe 51 PID 2904 wrote to memory of 2404 2904 MuiUnattend.exe 51 PID 2904 wrote to memory of 2404 2904 MuiUnattend.exe 51 PID 2404 wrote to memory of 1888 2404 cmd.exe 53 PID 2404 wrote to memory of 1888 2404 cmd.exe 53 PID 2404 wrote to memory of 1888 2404 cmd.exe 53 PID 2404 wrote to memory of 1640 2404 cmd.exe 55 PID 2404 wrote to memory of 1640 2404 cmd.exe 55 PID 2404 wrote to memory of 1640 2404 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe"C:\Users\Admin\AppData\Local\Temp\51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Roaming\{3AEA9A82-4E28-13C0-DB4D-43AE90C05B1C}\MuiUnattend.exe"C:\Users\Admin\AppData\Roaming\{3AEA9A82-4E28-13C0-DB4D-43AE90C05B1C}\MuiUnattend.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1736
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:537601 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2896
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:2724
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:2744
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "MuiUnattend.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{3AEA9A82-4E28-13C0-DB4D-43AE90C05B1C}\MuiUnattend.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "MuiUnattend.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1640
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe" > NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "51716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2776
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {240FD13C-AF2B-4D43-BD03-78DD488AB528} S-1-5-21-2212144002-1172735686-1556890956-1000:MVFYZPLM\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Roaming\{3AEA9A82-4E28-13C0-DB4D-43AE90C05B1C}\MuiUnattend.exeC:\Users\Admin\AppData\Roaming\{3AEA9A82-4E28-13C0-DB4D-43AE90C05B1C}\MuiUnattend.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:568
-
-
C:\Users\Admin\AppData\Roaming\{3AEA9A82-4E28-13C0-DB4D-43AE90C05B1C}\MuiUnattend.exeC:\Users\Admin\AppData\Roaming\{3AEA9A82-4E28-13C0-DB4D-43AE90C05B1C}\MuiUnattend.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1092
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1748
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:2516
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5681⤵
- Suspicious use of AdjustPrivilegeToken
PID:1240
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5208dbb6876bf687104081a70622aee4b
SHA18580196fa9a108495210ebb33a24ca4bbfcbfc86
SHA256b6eb65d1b28df8520b257eca13d692f5660d9663126c887695b9f66aae36ae8d
SHA512bd6a1e26546b624f01a18fbf54af8d1b149d7e7c91ad38cfe619b7c715b9b0bedba722b9fc71114e311a08c91ab201ab2e994096c7c5c8eadddc699bd6c8b70c
-
Filesize
90B
MD5304cf4ec3e8011e3eb7700195eef6e77
SHA1a90058f77b3cb5e489f7014248142fe93f26a5a9
SHA25614e47dce837695285db2c99c4833bb49d5330294c2dad34e3bfc1cc945f9d4f2
SHA512b624cc3a90be8afecbadd525146f9afb1ab55b265c502dca0fa8ae0cb2c28ff6f24544ba63b3c47923a61fbee23b9701e1db996a66840d328950bcf4b1b7d0c4
-
Filesize
234B
MD56f84dbf74ef41dc3d861f5fb3e0f45ff
SHA13e5f17e9b9589f33ce6add7f2518a666ff2253a4
SHA256df5f432d7e0d2bd1c4dddb1fabbf1e77bd1065b9020f71abaf1a45fbb950bbb8
SHA5129f9ec25b815be7b20df26244d31848c9a4896b130241b63636d63511a290eaad78d289a9bb04592c0ba31492064671351b4c7359310f03469e27764132a20a5a
-
Filesize
12KB
MD579e59b7b1488363d5bb908e5edf2f9fe
SHA1829f58f69830cff8021410d0bb004143ed9aaab3
SHA256c71357adcf1d22c9f5de5bd24cf3ee4aa76a44b5854428aa521f1838ce875bac
SHA5129a38da60dce2b61cda0e5c0728e5032bddad4c36f929da0aecf92d85b6dbf5c33b649248d724aed18c86d91ad52e04de05905f9399631231742c844f4cc15f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e625d138f1b3e7aede12bf7ad947b52
SHA1281a27982b429e1cc08a311cbd4d5c37d9f6840d
SHA2564582823891e3fcb70a335459229c064af3a3a958324eb2f91362225185234edb
SHA51273d70a5c92a51395660bf02bafcb4c8a3736e61d320c91f960c2e451bb8dd899ebfbe1b464cba8ed95fb04d5882db30d386e07d7456186dd31fc31b498bf2c50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89da0980892b8bc0ce4aad1adb7c82c
SHA1ced829ed41cda440efe91bda4afed5d9a218a53b
SHA256310a0dfd69ab9a9fb1bdbbd8bb2f8113924a369cee1e33d6f26f097b9db5d310
SHA51204a4dd97aa7e5ba27f8cb4ce75efc909a3efc9b0e6dbe66edd8cdbf84f8577deeba64955eb910270baa41f7954bd5ee2d61eb59a8966bcd0006d7bd046030f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5e2741d2c8efd5214b7cd2468253500
SHA1ed7a10dfab27315645d2f587da73cd11a9d1a412
SHA2569ac03a676dfd41e8a4a0b5aac39c59671fd443c2f48d630ef28659fe57bd24e1
SHA5126edf0098d841a221f8c48a6fbd013ba2c6d7d185adc85883a388d7da7398391161826a0751a34dd7b5db402adb6326252c13033aac7fb3069b52379fe1597714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e300d899f2ebb92b2e58589c1337c8f8
SHA1a9d00b5e11fd4ac0cfe4c76529223c076659f560
SHA25627868e40717a240fa396dce53ede04995f28330a1cea227fa061492d9220c5e8
SHA512eb40464fc61f82770410decb386ea1b0f99894bec7e5ab59ee3d4dcda3bb2cd272289e80868228b41ac12ca85f431a239a934c6baaf065c8bb0b428f7000072f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cdec14b11445e64f55d2e7cb43497a0
SHA15ac75cffeb77572829c4177f6506a1c0670a0bdf
SHA256ac0635396b7ffee650d580e7157ae0d21b0020ae5461fefe8589396ef351bba2
SHA5125f852e3f53cd46f13784b164f23ddae141a536b817c6375e6a381da9d657e0e456f34a906d03ea0e2ae0ec36b0338b86c9948f0714920502b98cbf9697a71f18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291e32b251a8b366e6c60ace2ee33fef
SHA157e77cc1e38b9ef9cb838437379aebfdebce29af
SHA256dbab1b1b183c900e2f0a0e52d74736e386d49eede79614ecf8c3c22c3c06cf57
SHA512014ac4007d222477a9cdd7b6a4dc0b589c881f98ce19717a28b6d9ff8283b5b608e5f6e054902707556bf4568a3e7bb1c5de2d9869147b2b48fe47b61a62946b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657dd594b77faf7c635a075d6e32622c
SHA1a9fdfdd473f1acf1660973746ef3e03999df8629
SHA256a3c87017d873527ee0d9956e8083754a357c174b3c1421c66f0e30dc7d82e1e3
SHA512105f4fc3302cd8dbc6a5c85cefb9efaf5de6877e7a8d605cd108545c20d863c268d8ecc6d028ffbaf624766e277be511b4327090a4786f6ed276228ddee1594c
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3A1E5811-6269-11EF-8FA3-EA829B7A1C2A}.dat
Filesize6KB
MD5ef11f72f8b1542d24f34b3433154a9e5
SHA10347071b8a7dde00d46fc77818ac6a122b6d4204
SHA256898c956bce6491a92ea111dd3778b83cea52cf6b9eab8773df7c1809ef5464dd
SHA51207f1697dec3d1ea7f7648600ecdf6d32df2f41540bc73a2012ddd337baf48415a72ea512a67e4d296267145d9faea2dcf2e5d5e0a4ca7054129e0fabaceb9a45
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD566585fce736fdfc0ba45077976606b67
SHA1dab8be8cc3ef83c54ab1e0af3fc49c5a23fedea9
SHA256b03371e1db44c56c15a5c834bfc04541ca741bbed409763b53a751187b57ad82
SHA512b9303bc8111912fce6c578c512956c94656c3f5ff09a9a34c3c91697731402d245707fe01e143408973ae94b160d7267d9904ee7144fb17744eb8ed043398f37
-
Filesize
347KB
MD5b5ff844d298650467e7d45a18bfb1303
SHA1a1dab1a6cdd93b0aa06bedcf4088a93f2e8127a4
SHA25651716929656f2a988e167a5b13e7cc55aa93e061e0e5cda5681071cba8faf1dc
SHA512b4c47ed3aef8b5f9c160572824b1a167a6a5a10143254f6b8908f9d37b227f5036feb5345f48eb6dadaed2c884d31dbc7b46de0fd343b9b8b3240869d518bdfa