Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
24/08/2024, 11:33
240824-nnznzsxgpc 1024/08/2024, 11:26
240824-njxntsxerc 1024/08/2024, 11:20
240824-nfr9yaygrk 10Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 11:20
Behavioral task
behavioral1
Sample
20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe
Resource
win7-20240708-en
General
-
Target
20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe
-
Size
5.9MB
-
MD5
fddabf0ae5d62e5888eeef778ec1e7bc
-
SHA1
eec4e6c645dcc10238a4d01e43c4fc822e8fb4f5
-
SHA256
d5ce0809bfd359dd4d5d8ed050f8ad9d321f9f34179f5ace550dacbde9133d4c
-
SHA512
72c50dcb906ee06d3d8769143df0eea1e370303f993b291738b4127f34baa38fd5067539dc8577673e524b8f9596ae0d56e166a4bfaf84f9e447c7cfa6e5654c
-
SSDEEP
98304:oemTLkNdfE0pZrD56utgpPFotBER/mQ32lU0:T+q56utgpPF8u/70
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x0008000000012115-6.dat cobalt_reflective_dll behavioral1/files/0x00060000000193e6-8.dat cobalt_reflective_dll behavioral1/files/0x000700000001940f-16.dat cobalt_reflective_dll behavioral1/files/0x00060000000194cc-21.dat cobalt_reflective_dll behavioral1/files/0x00060000000194d4-26.dat cobalt_reflective_dll behavioral1/files/0x00060000000194e0-30.dat cobalt_reflective_dll behavioral1/files/0x00070000000194e9-36.dat cobalt_reflective_dll behavioral1/files/0x00070000000194f3-38.dat cobalt_reflective_dll behavioral1/files/0x000500000001961e-55.dat cobalt_reflective_dll behavioral1/files/0x0005000000019624-71.dat cobalt_reflective_dll behavioral1/files/0x000500000001966b-122.dat cobalt_reflective_dll behavioral1/files/0x00050000000196ac-87.dat cobalt_reflective_dll behavioral1/files/0x000500000001971d-128.dat cobalt_reflective_dll behavioral1/files/0x000c000000018c44-132.dat cobalt_reflective_dll behavioral1/files/0x00050000000196aa-90.dat cobalt_reflective_dll behavioral1/files/0x00050000000196b0-115.dat cobalt_reflective_dll behavioral1/files/0x0005000000019626-77.dat cobalt_reflective_dll behavioral1/files/0x0005000000019622-65.dat cobalt_reflective_dll behavioral1/files/0x0005000000019620-61.dat cobalt_reflective_dll behavioral1/files/0x000500000001961c-51.dat cobalt_reflective_dll behavioral1/files/0x000600000001961a-45.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 56 IoCs
resource yara_rule behavioral1/memory/2716-0-0x000000013F640000-0x000000013F994000-memory.dmp xmrig behavioral1/files/0x0008000000012115-6.dat xmrig behavioral1/files/0x00060000000193e6-8.dat xmrig behavioral1/files/0x000700000001940f-16.dat xmrig behavioral1/files/0x00060000000194cc-21.dat xmrig behavioral1/files/0x00060000000194d4-26.dat xmrig behavioral1/files/0x00060000000194e0-30.dat xmrig behavioral1/files/0x00070000000194e9-36.dat xmrig behavioral1/files/0x00070000000194f3-38.dat xmrig behavioral1/files/0x000500000001961e-55.dat xmrig behavioral1/files/0x0005000000019624-71.dat xmrig behavioral1/files/0x000500000001966b-122.dat xmrig behavioral1/files/0x00050000000196ac-87.dat xmrig behavioral1/files/0x000500000001971d-128.dat xmrig behavioral1/files/0x000c000000018c44-132.dat xmrig behavioral1/memory/1684-109-0x000000013F100000-0x000000013F454000-memory.dmp xmrig behavioral1/memory/2208-107-0x000000013F360000-0x000000013F6B4000-memory.dmp xmrig behavioral1/memory/2884-105-0x000000013FF50000-0x00000001402A4000-memory.dmp xmrig behavioral1/memory/2640-103-0x000000013FE90000-0x00000001401E4000-memory.dmp xmrig behavioral1/memory/2716-101-0x000000013FE90000-0x00000001401E4000-memory.dmp xmrig behavioral1/memory/2580-100-0x000000013F840000-0x000000013FB94000-memory.dmp xmrig behavioral1/memory/2680-98-0x000000013F310000-0x000000013F664000-memory.dmp xmrig behavioral1/memory/2716-97-0x00000000022A0000-0x00000000025F4000-memory.dmp xmrig behavioral1/memory/1876-96-0x000000013FF20000-0x0000000140274000-memory.dmp xmrig behavioral1/memory/2396-94-0x000000013FB60000-0x000000013FEB4000-memory.dmp xmrig behavioral1/memory/2716-93-0x000000013FB60000-0x000000013FEB4000-memory.dmp xmrig behavioral1/memory/2272-92-0x000000013FBE0000-0x000000013FF34000-memory.dmp xmrig behavioral1/files/0x00050000000196aa-90.dat xmrig behavioral1/memory/2788-82-0x000000013FFE0000-0x0000000140334000-memory.dmp xmrig behavioral1/memory/2768-120-0x000000013F7E0000-0x000000013FB34000-memory.dmp xmrig behavioral1/memory/2316-119-0x000000013F360000-0x000000013F6B4000-memory.dmp xmrig behavioral1/memory/3020-117-0x000000013F420000-0x000000013F774000-memory.dmp xmrig behavioral1/memory/2716-116-0x00000000022A0000-0x00000000025F4000-memory.dmp xmrig behavioral1/files/0x00050000000196b0-115.dat xmrig behavioral1/memory/2508-114-0x000000013FA30000-0x000000013FD84000-memory.dmp xmrig behavioral1/memory/2716-113-0x000000013FA30000-0x000000013FD84000-memory.dmp xmrig behavioral1/files/0x0005000000019626-77.dat xmrig behavioral1/files/0x0005000000019622-65.dat xmrig behavioral1/files/0x0005000000019620-61.dat xmrig behavioral1/files/0x000500000001961c-51.dat xmrig behavioral1/files/0x000600000001961a-45.dat xmrig behavioral1/memory/2716-136-0x000000013F640000-0x000000013F994000-memory.dmp xmrig behavioral1/memory/2768-139-0x000000013F7E0000-0x000000013FB34000-memory.dmp xmrig behavioral1/memory/2272-141-0x000000013FBE0000-0x000000013FF34000-memory.dmp xmrig behavioral1/memory/2788-140-0x000000013FFE0000-0x0000000140334000-memory.dmp xmrig behavioral1/memory/2396-142-0x000000013FB60000-0x000000013FEB4000-memory.dmp xmrig behavioral1/memory/1876-143-0x000000013FF20000-0x0000000140274000-memory.dmp xmrig behavioral1/memory/2680-144-0x000000013F310000-0x000000013F664000-memory.dmp xmrig behavioral1/memory/2580-145-0x000000013F840000-0x000000013FB94000-memory.dmp xmrig behavioral1/memory/2640-146-0x000000013FE90000-0x00000001401E4000-memory.dmp xmrig behavioral1/memory/2884-147-0x000000013FF50000-0x00000001402A4000-memory.dmp xmrig behavioral1/memory/2208-148-0x000000013F360000-0x000000013F6B4000-memory.dmp xmrig behavioral1/memory/1684-149-0x000000013F100000-0x000000013F454000-memory.dmp xmrig behavioral1/memory/2508-150-0x000000013FA30000-0x000000013FD84000-memory.dmp xmrig behavioral1/memory/3020-151-0x000000013F420000-0x000000013F774000-memory.dmp xmrig behavioral1/memory/2316-152-0x000000013F360000-0x000000013F6B4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 2768 sPHHgxS.exe 2788 lJnhxtA.exe 2272 WHOUhlT.exe 2396 jyiJZDq.exe 1876 ARYFRGh.exe 2680 xlpHLYL.exe 2580 WUeXRZJ.exe 2640 YUOkiIF.exe 2884 eIzVxuj.exe 2208 hMlVhQc.exe 1684 kKOquSt.exe 2508 pGooYTY.exe 3020 TVPYEhZ.exe 2316 eQTiIgj.exe 1220 wLGdBmg.exe 2628 tLhworS.exe 2108 qGPeMXr.exe 2656 fkCDOYK.exe 2800 ROJBbYJ.exe 2436 HbDzxlE.exe 764 uBKYaqi.exe -
Loads dropped DLL 21 IoCs
pid Process 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe -
resource yara_rule behavioral1/memory/2716-0-0x000000013F640000-0x000000013F994000-memory.dmp upx behavioral1/files/0x0008000000012115-6.dat upx behavioral1/files/0x00060000000193e6-8.dat upx behavioral1/files/0x000700000001940f-16.dat upx behavioral1/files/0x00060000000194cc-21.dat upx behavioral1/files/0x00060000000194d4-26.dat upx behavioral1/files/0x00060000000194e0-30.dat upx behavioral1/files/0x00070000000194e9-36.dat upx behavioral1/files/0x00070000000194f3-38.dat upx behavioral1/files/0x000500000001961e-55.dat upx behavioral1/files/0x0005000000019624-71.dat upx behavioral1/files/0x000500000001966b-122.dat upx behavioral1/files/0x00050000000196ac-87.dat upx behavioral1/files/0x000500000001971d-128.dat upx behavioral1/files/0x000c000000018c44-132.dat upx behavioral1/memory/1684-109-0x000000013F100000-0x000000013F454000-memory.dmp upx behavioral1/memory/2208-107-0x000000013F360000-0x000000013F6B4000-memory.dmp upx behavioral1/memory/2884-105-0x000000013FF50000-0x00000001402A4000-memory.dmp upx behavioral1/memory/2640-103-0x000000013FE90000-0x00000001401E4000-memory.dmp upx behavioral1/memory/2580-100-0x000000013F840000-0x000000013FB94000-memory.dmp upx behavioral1/memory/2680-98-0x000000013F310000-0x000000013F664000-memory.dmp upx behavioral1/memory/1876-96-0x000000013FF20000-0x0000000140274000-memory.dmp upx behavioral1/memory/2396-94-0x000000013FB60000-0x000000013FEB4000-memory.dmp upx behavioral1/memory/2272-92-0x000000013FBE0000-0x000000013FF34000-memory.dmp upx behavioral1/files/0x00050000000196aa-90.dat upx behavioral1/memory/2788-82-0x000000013FFE0000-0x0000000140334000-memory.dmp upx behavioral1/memory/2768-120-0x000000013F7E0000-0x000000013FB34000-memory.dmp upx behavioral1/memory/2316-119-0x000000013F360000-0x000000013F6B4000-memory.dmp upx behavioral1/memory/3020-117-0x000000013F420000-0x000000013F774000-memory.dmp upx behavioral1/files/0x00050000000196b0-115.dat upx behavioral1/memory/2508-114-0x000000013FA30000-0x000000013FD84000-memory.dmp upx behavioral1/files/0x0005000000019626-77.dat upx behavioral1/files/0x0005000000019622-65.dat upx behavioral1/files/0x0005000000019620-61.dat upx behavioral1/files/0x000500000001961c-51.dat upx behavioral1/files/0x000600000001961a-45.dat upx behavioral1/memory/2716-136-0x000000013F640000-0x000000013F994000-memory.dmp upx behavioral1/memory/2768-139-0x000000013F7E0000-0x000000013FB34000-memory.dmp upx behavioral1/memory/2272-141-0x000000013FBE0000-0x000000013FF34000-memory.dmp upx behavioral1/memory/2788-140-0x000000013FFE0000-0x0000000140334000-memory.dmp upx behavioral1/memory/2396-142-0x000000013FB60000-0x000000013FEB4000-memory.dmp upx behavioral1/memory/1876-143-0x000000013FF20000-0x0000000140274000-memory.dmp upx behavioral1/memory/2680-144-0x000000013F310000-0x000000013F664000-memory.dmp upx behavioral1/memory/2580-145-0x000000013F840000-0x000000013FB94000-memory.dmp upx behavioral1/memory/2640-146-0x000000013FE90000-0x00000001401E4000-memory.dmp upx behavioral1/memory/2884-147-0x000000013FF50000-0x00000001402A4000-memory.dmp upx behavioral1/memory/2208-148-0x000000013F360000-0x000000013F6B4000-memory.dmp upx behavioral1/memory/1684-149-0x000000013F100000-0x000000013F454000-memory.dmp upx behavioral1/memory/2508-150-0x000000013FA30000-0x000000013FD84000-memory.dmp upx behavioral1/memory/3020-151-0x000000013F420000-0x000000013F774000-memory.dmp upx behavioral1/memory/2316-152-0x000000013F360000-0x000000013F6B4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\hMlVhQc.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\fkCDOYK.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\YUOkiIF.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\kKOquSt.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\TVPYEhZ.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\lJnhxtA.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\WHOUhlT.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\jyiJZDq.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\xlpHLYL.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\WUeXRZJ.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\eQTiIgj.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\ROJBbYJ.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\uBKYaqi.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\pGooYTY.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\wLGdBmg.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\tLhworS.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\sPHHgxS.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\ARYFRGh.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\eIzVxuj.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\qGPeMXr.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\HbDzxlE.exe 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe Token: SeLockMemoryPrivilege 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2768 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 31 PID 2716 wrote to memory of 2768 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 31 PID 2716 wrote to memory of 2768 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 31 PID 2716 wrote to memory of 2788 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 32 PID 2716 wrote to memory of 2788 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 32 PID 2716 wrote to memory of 2788 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 32 PID 2716 wrote to memory of 2272 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 33 PID 2716 wrote to memory of 2272 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 33 PID 2716 wrote to memory of 2272 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 33 PID 2716 wrote to memory of 2396 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 34 PID 2716 wrote to memory of 2396 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 34 PID 2716 wrote to memory of 2396 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 34 PID 2716 wrote to memory of 1876 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 35 PID 2716 wrote to memory of 1876 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 35 PID 2716 wrote to memory of 1876 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 35 PID 2716 wrote to memory of 2680 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 36 PID 2716 wrote to memory of 2680 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 36 PID 2716 wrote to memory of 2680 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 36 PID 2716 wrote to memory of 2580 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 37 PID 2716 wrote to memory of 2580 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 37 PID 2716 wrote to memory of 2580 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 37 PID 2716 wrote to memory of 2640 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 38 PID 2716 wrote to memory of 2640 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 38 PID 2716 wrote to memory of 2640 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 38 PID 2716 wrote to memory of 2884 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 39 PID 2716 wrote to memory of 2884 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 39 PID 2716 wrote to memory of 2884 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 39 PID 2716 wrote to memory of 2208 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 40 PID 2716 wrote to memory of 2208 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 40 PID 2716 wrote to memory of 2208 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 40 PID 2716 wrote to memory of 1684 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 41 PID 2716 wrote to memory of 1684 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 41 PID 2716 wrote to memory of 1684 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 41 PID 2716 wrote to memory of 2508 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 42 PID 2716 wrote to memory of 2508 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 42 PID 2716 wrote to memory of 2508 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 42 PID 2716 wrote to memory of 3020 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 43 PID 2716 wrote to memory of 3020 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 43 PID 2716 wrote to memory of 3020 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 43 PID 2716 wrote to memory of 2316 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 44 PID 2716 wrote to memory of 2316 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 44 PID 2716 wrote to memory of 2316 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 44 PID 2716 wrote to memory of 1220 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 45 PID 2716 wrote to memory of 1220 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 45 PID 2716 wrote to memory of 1220 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 45 PID 2716 wrote to memory of 2656 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 46 PID 2716 wrote to memory of 2656 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 46 PID 2716 wrote to memory of 2656 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 46 PID 2716 wrote to memory of 2628 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 47 PID 2716 wrote to memory of 2628 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 47 PID 2716 wrote to memory of 2628 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 47 PID 2716 wrote to memory of 2800 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 48 PID 2716 wrote to memory of 2800 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 48 PID 2716 wrote to memory of 2800 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 48 PID 2716 wrote to memory of 2108 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 49 PID 2716 wrote to memory of 2108 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 49 PID 2716 wrote to memory of 2108 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 49 PID 2716 wrote to memory of 2436 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 50 PID 2716 wrote to memory of 2436 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 50 PID 2716 wrote to memory of 2436 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 50 PID 2716 wrote to memory of 764 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 51 PID 2716 wrote to memory of 764 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 51 PID 2716 wrote to memory of 764 2716 20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe"C:\Users\Admin\AppData\Local\Temp\20240824fddabf0ae5d62e5888eeef778ec1e7bccobaltstrikecobaltstrikepoetrat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\System\sPHHgxS.exeC:\Windows\System\sPHHgxS.exe2⤵
- Executes dropped EXE
PID:2768
-
-
C:\Windows\System\lJnhxtA.exeC:\Windows\System\lJnhxtA.exe2⤵
- Executes dropped EXE
PID:2788
-
-
C:\Windows\System\WHOUhlT.exeC:\Windows\System\WHOUhlT.exe2⤵
- Executes dropped EXE
PID:2272
-
-
C:\Windows\System\jyiJZDq.exeC:\Windows\System\jyiJZDq.exe2⤵
- Executes dropped EXE
PID:2396
-
-
C:\Windows\System\ARYFRGh.exeC:\Windows\System\ARYFRGh.exe2⤵
- Executes dropped EXE
PID:1876
-
-
C:\Windows\System\xlpHLYL.exeC:\Windows\System\xlpHLYL.exe2⤵
- Executes dropped EXE
PID:2680
-
-
C:\Windows\System\WUeXRZJ.exeC:\Windows\System\WUeXRZJ.exe2⤵
- Executes dropped EXE
PID:2580
-
-
C:\Windows\System\YUOkiIF.exeC:\Windows\System\YUOkiIF.exe2⤵
- Executes dropped EXE
PID:2640
-
-
C:\Windows\System\eIzVxuj.exeC:\Windows\System\eIzVxuj.exe2⤵
- Executes dropped EXE
PID:2884
-
-
C:\Windows\System\hMlVhQc.exeC:\Windows\System\hMlVhQc.exe2⤵
- Executes dropped EXE
PID:2208
-
-
C:\Windows\System\kKOquSt.exeC:\Windows\System\kKOquSt.exe2⤵
- Executes dropped EXE
PID:1684
-
-
C:\Windows\System\pGooYTY.exeC:\Windows\System\pGooYTY.exe2⤵
- Executes dropped EXE
PID:2508
-
-
C:\Windows\System\TVPYEhZ.exeC:\Windows\System\TVPYEhZ.exe2⤵
- Executes dropped EXE
PID:3020
-
-
C:\Windows\System\eQTiIgj.exeC:\Windows\System\eQTiIgj.exe2⤵
- Executes dropped EXE
PID:2316
-
-
C:\Windows\System\wLGdBmg.exeC:\Windows\System\wLGdBmg.exe2⤵
- Executes dropped EXE
PID:1220
-
-
C:\Windows\System\fkCDOYK.exeC:\Windows\System\fkCDOYK.exe2⤵
- Executes dropped EXE
PID:2656
-
-
C:\Windows\System\tLhworS.exeC:\Windows\System\tLhworS.exe2⤵
- Executes dropped EXE
PID:2628
-
-
C:\Windows\System\ROJBbYJ.exeC:\Windows\System\ROJBbYJ.exe2⤵
- Executes dropped EXE
PID:2800
-
-
C:\Windows\System\qGPeMXr.exeC:\Windows\System\qGPeMXr.exe2⤵
- Executes dropped EXE
PID:2108
-
-
C:\Windows\System\HbDzxlE.exeC:\Windows\System\HbDzxlE.exe2⤵
- Executes dropped EXE
PID:2436
-
-
C:\Windows\System\uBKYaqi.exeC:\Windows\System\uBKYaqi.exe2⤵
- Executes dropped EXE
PID:764
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD581307524451f816a4cba8e3b87d303d1
SHA18891b86dde323b7696570eecc6df05d8248a02f0
SHA256d37aef4c2991c31fee9dfb16ced4cc773da9dac5001c7837cccfd736ef2587a3
SHA5120b19ffb2fcdc319d1031bd4d71030ad6a2139d4b437aa8bf2514af6ba18016234b9fa9389ec9e138775fcf9d948f7aaabae3ffcb3d4f04b05065b1a49ab40bfa
-
Filesize
5.9MB
MD5e1c95d92977277d7f128160fdb6cf909
SHA1f31ec5ed06ba2ae73e1d59304c3eb782f539de4b
SHA2568f0397540d5f8c02642d701c80fa54f81c07cab801faa254f6ba40fbe230794e
SHA5121c30fc0e4f2d5b6eec451e048b88103147f7dddf07da096aa17486f77548f2311aa172b1976ddb332839cdf28cc286a72b5bcac79b87a7b2f1398f06e6949d76
-
Filesize
5.9MB
MD59af1637e179515ea37a3c4e2932f093e
SHA173b5858a783eb9fc21d032427a533cf847abaefd
SHA25696731026ed835f9105cb357ffbd32945ab90606a662f72ed3a7c4a0b36b86a8a
SHA51284bec4923a4cf5d096eeab4539af40ee4d47a18767f969b4c35a309f2215770b9959bb8c45191fde361d933be02f2d3dd34175248c993023f4b91fa368e112b3
-
Filesize
5.9MB
MD5430e0a058320893f15cc3cd3acc6caee
SHA17528ddd2b1dda4260ef7b08799aec516c63efbfb
SHA25626ca202b775ec069542cd6cd21b2c3cb129b0f65334e58c04c1cae6b2329700c
SHA512e029c70841fc843aed194a2b6aafa9221392273e1302c1746aac95875d4eb0d949b32b59c077eb65bdd0a12584a8c8a6c364ae713bb52a12893a2ef5ce0a6a77
-
Filesize
5.9MB
MD5c79396b90f9694e72867bb55237f729e
SHA19d6fc7d8fbca1471c41d300be86aa7b098636f56
SHA256ecb15a37fa45f6b000da5fc5c1083aeb7a3e0e9bfdf42d199d1b176e400106dd
SHA5126b28952da4b524ab322ba03a476a732e8651f3aec74487d9b8b1d3c918e2f6522edf78430bfad0d903bc9debbe772421b399cf1423c97f1034d1d554d1480507
-
Filesize
5.9MB
MD522130e473202ac286372b39b788d5bdd
SHA1841d810a23dc95fa1c562916675f493d3da4adc2
SHA256256aa3f99f7a9cfe832dfc042daa4f40e740a2bf3ab202a1e658da2343606f3d
SHA512be7b63823eb6ae81b8dc4088c62e0cc4f5e02280205b8ca10b89bd5367d4166c369aaff787b71824e7eff630543b151e530152896cc8652a39a2bf2a8114de6c
-
Filesize
5.9MB
MD5d527f258eb08645a125c9046e58f9c50
SHA10bc38a02e3ccf4c397721283e3cb4723472dafe2
SHA2562fea8416babf4f58bb2434efe7ad482693e1d291139d5bb2f5a543ca31030de2
SHA512612b3b5815bd858a6cb885e64b783705c9171aff17898ed8b695f6da38fd38a4bdc43c13649a8894432c5a0e2ac5ffcba51695fc5f8a6607874ddc0d3031120d
-
Filesize
5.9MB
MD565cd31b49d043a7d29ee99c19af78694
SHA1fd40aae5a58a9b94456657e1cdf714b3bcfd3e8d
SHA256713fc98f744f8de6b2747c7ef3025471333b52fb41fb5883419b2f5f264f0170
SHA512cbb9a51e68516adffba06ca97a3f15a748b6904032542bc6c37927d349e7820c4b1e75b1d7c03bd99ad8f9f96a675a493d95256deb526d8036b7abdad4c1b990
-
Filesize
5.9MB
MD5a60b22bb116f7ad15e7e8d3aa56586ee
SHA1c653d9e9b0de6010016a8a866c96a5fb4e6da0ea
SHA25612f5cbc7727206c8cb8ad4744f7c58212eeb77ca1a8fb94ec6f9305f2e16993e
SHA5123e0c1db0653413c1efe5c5190b582aaa231a966f81afbbbbe4f091fba3747d09dd657d11258214b7f89edc252be369615148d8dfd2f48dbb475725cd903807e0
-
Filesize
5.9MB
MD55c988ee4a17cb89c886735f54119417a
SHA1644509c7f10a1f779db9117eab9b2d2dab1fbf3b
SHA256e8f46466783f90655f42330b26686f562722ca6a4fdcc9283fae95386508847a
SHA51261ac842af4afe19e4de8faf3c485d074c9af8aec1de5410c77ef889f0e001483aa63878027cbca26e0f79e2e37d294f8c30ae5e15db92bed430eaf2ab7c60d23
-
Filesize
5.9MB
MD522e2c5a3cfe4401930c0504d9c465042
SHA1af195e1f8363bca7a523b56d3c03094026ef8625
SHA2560252d7d1641499b7a33c7bc5a974fea732e0cca4d2d38882dbd7ccb2d8b7b6e3
SHA5124aa72315974fa1e4e85e6e241f4b8763496c86ab2437b96dd4dd20f8b54b7761b89ad4cf96d0a53d9d01c27dcbcce0ed518a9d119c9b70497066ddf4707a40de
-
Filesize
5.9MB
MD5cc338612b00bebfb04099ed3068f2a8b
SHA11f48a0bc2e9ce381c5217953f7bd86b271cbf651
SHA256a3601a40d81a6e04c10b4e7c49eddc40f1ebf7215d472b53ee3a75806824ad38
SHA512c900c984f05e9803d82f9c2a80978c65e91d292e78179778f795a9b7d493f0074c981cac42c8346f956e3d0a6b2445766d357497765db35e02106f5b33092f40
-
Filesize
5.9MB
MD51be8df6e8029a568d739da5ba5c16e53
SHA171b2d87c35b5856af4a5c0229ec830060bc8638e
SHA256799a5bf0c45a83f5e02e7c20d7e154407693988fefad09b14b23c913d94cd581
SHA5121c11b675d2ffbe8ab3f4bfe980085c582122afab53d2532433d3a50f8beeb664e7fe0ef6ef079b3ca26a7c4990c2f0f1eedac9710090489334c9c82bb5f0b876
-
Filesize
5.9MB
MD5aaefc32db9ef250af3f75e53b667acdb
SHA10527f44012da38b5802bb78eadea21493bfb6fb4
SHA25606b811b22b4c0e6c916d81146f0943f256eb82492694be87bbafc84cd3c3c897
SHA512a2082191d051690c6ddf2a6966a7fc1582f912af8e925d6dbcaf297a741e1e88c07b4dc25bca3d8138729906cf08936cbbcec401a79038d146795325de7855a3
-
Filesize
5.9MB
MD5ad29c97e917a5167110401a3794b82d7
SHA1336f52902204c63ea272b2871142018bf3e33be5
SHA256f6827da303a8d86f26e9a4cbad7e1be0397bd6c0f565e22f98d0a0b87dbd21b9
SHA5122e28cd5c9f6024f10381d8f0491de602428fcfa6db5083ec995075b5bfdb89886dd7aa36001dad94d6f4df89bf9eacb7d55c21b16675b28d82039fd0530ccb86
-
Filesize
5.9MB
MD5eba86b22eaaf48fd8a59068d9772741c
SHA1077e83f86c304e2075b7c24981dd25c822b42988
SHA2564808413e6d005d45c3229e6ca84021ab935c7b3068bb5cfdb05c0b5a4bd7fd25
SHA51297011d2f7b46e4fa0275d550af8dfcbf4e643032de983fdfb929b036eca4958945c0512e4427304d610b946e82d41551f5c43132e2b5a0bb6f2a329de78a8370
-
Filesize
5.9MB
MD5a7e7a72c50a8e34c8b4a58207f03df3c
SHA176fa54f576f6b85733d70f3242054fbe7ba8a0aa
SHA256a04ba24f13851d817372fff9362e66e97151677c46dd0faf324d4d72e05580fc
SHA5129adeb4050f4e615c970ab9dfe0644333037ea95dbbd85d8779280b48dc6e69a6b8445f1db3cd498abbba9a0f1ae4ff3a39703b701e06e914f6e4e3e88cdcf0a3
-
Filesize
5.9MB
MD5136a6055cb8a0749de8cc94e8a717252
SHA103ef4500d0bcfb6d9faf870d1756741113333ab2
SHA25643384c7e262fcb9cf192b6e89ee2dcdeebb4d911387e8371954648019c8af872
SHA512ecccd8f4ba3930dadeefa5f734bb22fcb2264ebbebfdee7976d377f783a35d611de4f03d7c65093eeb1fb508ac65917a2d665d892777cf5a2c0f458ba44d1244
-
Filesize
5.9MB
MD53cb5a1eeee8b7e82aeff2b7f567ec662
SHA15f19a73ce6871005fa7f69b9970ec725d74e7f01
SHA2561c81dbcca2ff2f116dc2bdf5f4c7f11702a4875354850e216cf723e1297c0b42
SHA512615b1d1a2eaf0df626a98c2778587460218e575e3016f551b95841c0fde8d9b2650cc824531fe841a2f54c00f8c96c9540e4a1124b89e9096e33efd856142afc
-
Filesize
5.9MB
MD543c8f55a88f7da01a90eadeca17b6194
SHA1c2a90ca1763b33749b6b0dc06678b71bc887fdbb
SHA25676768be30b1ca49bc0e496c5d1db03ba914fcb767fe058c87d35fed7618ba431
SHA512b0cc6a856a9584f5eb5dcc18c8f77409d11224adfbadedf5920a559c230dc35d0677e203904190a9b618cdc6ba50b281286597903d870162aeabdc68e4b6d11e
-
Filesize
5.9MB
MD574c1f56b643b872bee15c14c5dc1e612
SHA162677e5e3d23d3ea5569feb93a21b2ed0d136617
SHA256f92cee577f08db73e992e10e4dc29c0521e2eef1094b4b714fa6e2ca66152a78
SHA5129106ea410df957c3a7df6e5712e8d049ec39945e243a594d23f1e029f3616547b862e96c58466ddf716e2e0a0d1a7d6bbee7122707362a9659f120eaad2f778e