Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 13:21
Behavioral task
behavioral1
Sample
202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe
Resource
win7-20240708-en
General
-
Target
202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe
-
Size
5.2MB
-
MD5
6a36c491031ad8fc1d2b7476dda62f8a
-
SHA1
bb68942deb7f565fae09536e48b2f65153381da2
-
SHA256
4d669c86238f4f6e5059e417a1f0eb951b61fd946ae4b0c0e0f42d37da508447
-
SHA512
0c12c5d3cf3f2230b5efe9f01b101804ab959fb5a78fab2d3b0f477298f406a57c2d6c6a414c4139909d73e28729fb5f76d7d4ce69f7ed9dc93346b8ab3ee13f
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lX:RWWBibf56utgpPFotBER/mQ32lUr
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x000a00000001202b-6.dat cobalt_reflective_dll behavioral1/files/0x000800000001707e-8.dat cobalt_reflective_dll behavioral1/files/0x0008000000017226-16.dat cobalt_reflective_dll behavioral1/files/0x00080000000187a7-40.dat cobalt_reflective_dll behavioral1/files/0x00050000000194ab-83.dat cobalt_reflective_dll behavioral1/files/0x0005000000019516-114.dat cobalt_reflective_dll behavioral1/files/0x0005000000019533-131.dat cobalt_reflective_dll behavioral1/files/0x0005000000019529-124.dat cobalt_reflective_dll behavioral1/files/0x00050000000195b3-137.dat cobalt_reflective_dll behavioral1/files/0x000500000001952c-130.dat cobalt_reflective_dll behavioral1/files/0x000500000001951e-119.dat cobalt_reflective_dll behavioral1/files/0x000500000001950e-107.dat cobalt_reflective_dll behavioral1/files/0x00050000000194df-99.dat cobalt_reflective_dll behavioral1/files/0x00050000000194c1-91.dat cobalt_reflective_dll behavioral1/files/0x00050000000193f7-67.dat cobalt_reflective_dll behavioral1/files/0x0005000000019426-75.dat cobalt_reflective_dll behavioral1/files/0x000700000001756f-35.dat cobalt_reflective_dll behavioral1/files/0x0006000000018708-31.dat cobalt_reflective_dll behavioral1/files/0x00060000000193da-51.dat cobalt_reflective_dll behavioral1/files/0x000600000001870a-50.dat cobalt_reflective_dll behavioral1/files/0x00070000000174f7-24.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 41 IoCs
resource yara_rule behavioral1/memory/2632-21-0x0000000002340000-0x0000000002691000-memory.dmp xmrig behavioral1/memory/2812-23-0x000000013FE70000-0x00000001401C1000-memory.dmp xmrig behavioral1/memory/2800-22-0x000000013FE00000-0x0000000140151000-memory.dmp xmrig behavioral1/memory/2872-20-0x000000013F730000-0x000000013FA81000-memory.dmp xmrig behavioral1/memory/2432-57-0x000000013F660000-0x000000013F9B1000-memory.dmp xmrig behavioral1/memory/2632-101-0x000000013F560000-0x000000013F8B1000-memory.dmp xmrig behavioral1/memory/1480-110-0x000000013F0B0000-0x000000013F401000-memory.dmp xmrig behavioral1/memory/2704-141-0x000000013FEF0000-0x0000000140241000-memory.dmp xmrig behavioral1/memory/2944-100-0x000000013F140000-0x000000013F491000-memory.dmp xmrig behavioral1/memory/2992-88-0x000000013FEC0000-0x0000000140211000-memory.dmp xmrig behavioral1/memory/2928-87-0x000000013FF40000-0x0000000140291000-memory.dmp xmrig behavioral1/memory/1956-93-0x000000013FCC0000-0x0000000140011000-memory.dmp xmrig behavioral1/memory/2632-79-0x000000013FC90000-0x000000013FFE1000-memory.dmp xmrig behavioral1/memory/2584-63-0x000000013F370000-0x000000013F6C1000-memory.dmp xmrig behavioral1/memory/2580-59-0x000000013F9E0000-0x000000013FD31000-memory.dmp xmrig behavioral1/memory/1064-143-0x000000013FE80000-0x00000001401D1000-memory.dmp xmrig behavioral1/memory/2632-144-0x000000013F560000-0x000000013F8B1000-memory.dmp xmrig behavioral1/memory/2032-145-0x000000013F560000-0x000000013F8B1000-memory.dmp xmrig behavioral1/memory/2632-146-0x000000013FC90000-0x000000013FFE1000-memory.dmp xmrig behavioral1/memory/468-161-0x000000013FAA0000-0x000000013FDF1000-memory.dmp xmrig behavioral1/memory/2308-167-0x000000013F810000-0x000000013FB61000-memory.dmp xmrig behavioral1/memory/2204-165-0x000000013F620000-0x000000013F971000-memory.dmp xmrig behavioral1/memory/1972-164-0x000000013F990000-0x000000013FCE1000-memory.dmp xmrig behavioral1/memory/536-163-0x000000013FD20000-0x0000000140071000-memory.dmp xmrig behavioral1/memory/1212-162-0x000000013F580000-0x000000013F8D1000-memory.dmp xmrig behavioral1/memory/2832-166-0x000000013F9F0000-0x000000013FD41000-memory.dmp xmrig behavioral1/memory/2632-168-0x000000013FC90000-0x000000013FFE1000-memory.dmp xmrig behavioral1/memory/2800-217-0x000000013FE00000-0x0000000140151000-memory.dmp xmrig behavioral1/memory/2872-219-0x000000013F730000-0x000000013FA81000-memory.dmp xmrig behavioral1/memory/2812-221-0x000000013FE70000-0x00000001401C1000-memory.dmp xmrig behavioral1/memory/2992-234-0x000000013FEC0000-0x0000000140211000-memory.dmp xmrig behavioral1/memory/2432-236-0x000000013F660000-0x000000013F9B1000-memory.dmp xmrig behavioral1/memory/2580-240-0x000000013F9E0000-0x000000013FD31000-memory.dmp xmrig behavioral1/memory/1956-239-0x000000013FCC0000-0x0000000140011000-memory.dmp xmrig behavioral1/memory/2584-242-0x000000013F370000-0x000000013F6C1000-memory.dmp xmrig behavioral1/memory/1480-244-0x000000013F0B0000-0x000000013F401000-memory.dmp xmrig behavioral1/memory/2944-246-0x000000013F140000-0x000000013F491000-memory.dmp xmrig behavioral1/memory/2704-248-0x000000013FEF0000-0x0000000140241000-memory.dmp xmrig behavioral1/memory/2928-250-0x000000013FF40000-0x0000000140291000-memory.dmp xmrig behavioral1/memory/1064-252-0x000000013FE80000-0x00000001401D1000-memory.dmp xmrig behavioral1/memory/2032-254-0x000000013F560000-0x000000013F8B1000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 2800 NgJJWyw.exe 2872 KcPcltd.exe 2812 zZKFziN.exe 2992 vrsVftG.exe 2432 hiEHhTf.exe 2580 ZFrdkSZ.exe 1956 hirLawD.exe 2584 yTlFcTf.exe 2944 UIqVwpx.exe 1480 wDkeifO.exe 2704 ChfEiZF.exe 2928 KqeUauW.exe 1064 YqhiYaQ.exe 2032 DlzUFGm.exe 468 tGXdVBZ.exe 1212 qoVbLEf.exe 536 xOzGKAN.exe 1972 PPlpeGG.exe 2204 oTVjAkp.exe 2308 jeTTvUM.exe 2832 FmMNNYG.exe -
Loads dropped DLL 21 IoCs
pid Process 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe -
resource yara_rule behavioral1/memory/2632-0-0x000000013FC90000-0x000000013FFE1000-memory.dmp upx behavioral1/files/0x000a00000001202b-6.dat upx behavioral1/files/0x000800000001707e-8.dat upx behavioral1/files/0x0008000000017226-16.dat upx behavioral1/memory/2812-23-0x000000013FE70000-0x00000001401C1000-memory.dmp upx behavioral1/memory/2800-22-0x000000013FE00000-0x0000000140151000-memory.dmp upx behavioral1/memory/2872-20-0x000000013F730000-0x000000013FA81000-memory.dmp upx behavioral1/memory/2432-57-0x000000013F660000-0x000000013F9B1000-memory.dmp upx behavioral1/files/0x00080000000187a7-40.dat upx behavioral1/memory/2944-64-0x000000013F140000-0x000000013F491000-memory.dmp upx behavioral1/files/0x00050000000194ab-83.dat upx behavioral1/files/0x0005000000019516-114.dat upx behavioral1/files/0x0005000000019533-131.dat upx behavioral1/files/0x0005000000019529-124.dat upx behavioral1/files/0x00050000000195b3-137.dat upx behavioral1/files/0x000500000001952c-130.dat upx behavioral1/files/0x000500000001951e-119.dat upx behavioral1/memory/1480-110-0x000000013F0B0000-0x000000013F401000-memory.dmp upx behavioral1/files/0x000500000001950e-107.dat upx behavioral1/memory/2704-141-0x000000013FEF0000-0x0000000140241000-memory.dmp upx behavioral1/memory/2032-102-0x000000013F560000-0x000000013F8B1000-memory.dmp upx behavioral1/memory/2944-100-0x000000013F140000-0x000000013F491000-memory.dmp upx behavioral1/files/0x00050000000194df-99.dat upx behavioral1/memory/1064-95-0x000000013FE80000-0x00000001401D1000-memory.dmp upx behavioral1/memory/2992-88-0x000000013FEC0000-0x0000000140211000-memory.dmp upx behavioral1/memory/2928-87-0x000000013FF40000-0x0000000140291000-memory.dmp upx behavioral1/memory/1956-93-0x000000013FCC0000-0x0000000140011000-memory.dmp upx behavioral1/files/0x00050000000194c1-91.dat upx behavioral1/memory/2632-79-0x000000013FC90000-0x000000013FFE1000-memory.dmp upx behavioral1/memory/1480-69-0x000000013F0B0000-0x000000013F401000-memory.dmp upx behavioral1/files/0x00050000000193f7-67.dat upx behavioral1/memory/2704-78-0x000000013FEF0000-0x0000000140241000-memory.dmp upx behavioral1/files/0x0005000000019426-75.dat upx behavioral1/memory/2584-63-0x000000013F370000-0x000000013F6C1000-memory.dmp upx behavioral1/files/0x000700000001756f-35.dat upx behavioral1/files/0x0006000000018708-31.dat upx behavioral1/memory/2580-59-0x000000013F9E0000-0x000000013FD31000-memory.dmp upx behavioral1/memory/1956-53-0x000000013FCC0000-0x0000000140011000-memory.dmp upx behavioral1/files/0x00060000000193da-51.dat upx behavioral1/files/0x000600000001870a-50.dat upx behavioral1/files/0x00070000000174f7-24.dat upx behavioral1/memory/2992-39-0x000000013FEC0000-0x0000000140211000-memory.dmp upx behavioral1/memory/1064-143-0x000000013FE80000-0x00000001401D1000-memory.dmp upx behavioral1/memory/2032-145-0x000000013F560000-0x000000013F8B1000-memory.dmp upx behavioral1/memory/2632-146-0x000000013FC90000-0x000000013FFE1000-memory.dmp upx behavioral1/memory/468-161-0x000000013FAA0000-0x000000013FDF1000-memory.dmp upx behavioral1/memory/2308-167-0x000000013F810000-0x000000013FB61000-memory.dmp upx behavioral1/memory/2204-165-0x000000013F620000-0x000000013F971000-memory.dmp upx behavioral1/memory/1972-164-0x000000013F990000-0x000000013FCE1000-memory.dmp upx behavioral1/memory/536-163-0x000000013FD20000-0x0000000140071000-memory.dmp upx behavioral1/memory/1212-162-0x000000013F580000-0x000000013F8D1000-memory.dmp upx behavioral1/memory/2832-166-0x000000013F9F0000-0x000000013FD41000-memory.dmp upx behavioral1/memory/2632-168-0x000000013FC90000-0x000000013FFE1000-memory.dmp upx behavioral1/memory/2800-217-0x000000013FE00000-0x0000000140151000-memory.dmp upx behavioral1/memory/2872-219-0x000000013F730000-0x000000013FA81000-memory.dmp upx behavioral1/memory/2812-221-0x000000013FE70000-0x00000001401C1000-memory.dmp upx behavioral1/memory/2992-234-0x000000013FEC0000-0x0000000140211000-memory.dmp upx behavioral1/memory/2432-236-0x000000013F660000-0x000000013F9B1000-memory.dmp upx behavioral1/memory/2580-240-0x000000013F9E0000-0x000000013FD31000-memory.dmp upx behavioral1/memory/1956-239-0x000000013FCC0000-0x0000000140011000-memory.dmp upx behavioral1/memory/2584-242-0x000000013F370000-0x000000013F6C1000-memory.dmp upx behavioral1/memory/1480-244-0x000000013F0B0000-0x000000013F401000-memory.dmp upx behavioral1/memory/2944-246-0x000000013F140000-0x000000013F491000-memory.dmp upx behavioral1/memory/2704-248-0x000000013FEF0000-0x0000000140241000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\zZKFziN.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\hiEHhTf.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\UIqVwpx.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\ChfEiZF.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\qoVbLEf.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\PPlpeGG.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\KcPcltd.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\yTlFcTf.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\KqeUauW.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\DlzUFGm.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\jeTTvUM.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\FmMNNYG.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\NgJJWyw.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\vrsVftG.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\ZFrdkSZ.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\wDkeifO.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\YqhiYaQ.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\tGXdVBZ.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\hirLawD.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\xOzGKAN.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\oTVjAkp.exe 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe Token: SeLockMemoryPrivilege 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2800 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 32 PID 2632 wrote to memory of 2800 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 32 PID 2632 wrote to memory of 2800 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 32 PID 2632 wrote to memory of 2872 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 33 PID 2632 wrote to memory of 2872 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 33 PID 2632 wrote to memory of 2872 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 33 PID 2632 wrote to memory of 2812 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 34 PID 2632 wrote to memory of 2812 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 34 PID 2632 wrote to memory of 2812 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 34 PID 2632 wrote to memory of 2992 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 35 PID 2632 wrote to memory of 2992 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 35 PID 2632 wrote to memory of 2992 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 35 PID 2632 wrote to memory of 2432 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 36 PID 2632 wrote to memory of 2432 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 36 PID 2632 wrote to memory of 2432 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 36 PID 2632 wrote to memory of 2584 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 37 PID 2632 wrote to memory of 2584 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 37 PID 2632 wrote to memory of 2584 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 37 PID 2632 wrote to memory of 2580 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 38 PID 2632 wrote to memory of 2580 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 38 PID 2632 wrote to memory of 2580 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 38 PID 2632 wrote to memory of 2944 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 39 PID 2632 wrote to memory of 2944 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 39 PID 2632 wrote to memory of 2944 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 39 PID 2632 wrote to memory of 1956 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 40 PID 2632 wrote to memory of 1956 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 40 PID 2632 wrote to memory of 1956 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 40 PID 2632 wrote to memory of 1480 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 41 PID 2632 wrote to memory of 1480 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 41 PID 2632 wrote to memory of 1480 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 41 PID 2632 wrote to memory of 2704 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 42 PID 2632 wrote to memory of 2704 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 42 PID 2632 wrote to memory of 2704 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 42 PID 2632 wrote to memory of 2928 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 43 PID 2632 wrote to memory of 2928 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 43 PID 2632 wrote to memory of 2928 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 43 PID 2632 wrote to memory of 1064 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 44 PID 2632 wrote to memory of 1064 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 44 PID 2632 wrote to memory of 1064 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 44 PID 2632 wrote to memory of 2032 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 45 PID 2632 wrote to memory of 2032 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 45 PID 2632 wrote to memory of 2032 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 45 PID 2632 wrote to memory of 468 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 46 PID 2632 wrote to memory of 468 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 46 PID 2632 wrote to memory of 468 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 46 PID 2632 wrote to memory of 1212 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 47 PID 2632 wrote to memory of 1212 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 47 PID 2632 wrote to memory of 1212 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 47 PID 2632 wrote to memory of 536 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 48 PID 2632 wrote to memory of 536 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 48 PID 2632 wrote to memory of 536 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 48 PID 2632 wrote to memory of 1972 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 49 PID 2632 wrote to memory of 1972 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 49 PID 2632 wrote to memory of 1972 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 49 PID 2632 wrote to memory of 2204 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 50 PID 2632 wrote to memory of 2204 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 50 PID 2632 wrote to memory of 2204 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 50 PID 2632 wrote to memory of 2832 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 51 PID 2632 wrote to memory of 2832 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 51 PID 2632 wrote to memory of 2832 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 51 PID 2632 wrote to memory of 2308 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 52 PID 2632 wrote to memory of 2308 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 52 PID 2632 wrote to memory of 2308 2632 202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe"C:\Users\Admin\AppData\Local\Temp\202408256a36c491031ad8fc1d2b7476dda62f8acobaltstrikecobaltstrikepoetrat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\System\NgJJWyw.exeC:\Windows\System\NgJJWyw.exe2⤵
- Executes dropped EXE
PID:2800
-
-
C:\Windows\System\KcPcltd.exeC:\Windows\System\KcPcltd.exe2⤵
- Executes dropped EXE
PID:2872
-
-
C:\Windows\System\zZKFziN.exeC:\Windows\System\zZKFziN.exe2⤵
- Executes dropped EXE
PID:2812
-
-
C:\Windows\System\vrsVftG.exeC:\Windows\System\vrsVftG.exe2⤵
- Executes dropped EXE
PID:2992
-
-
C:\Windows\System\hiEHhTf.exeC:\Windows\System\hiEHhTf.exe2⤵
- Executes dropped EXE
PID:2432
-
-
C:\Windows\System\yTlFcTf.exeC:\Windows\System\yTlFcTf.exe2⤵
- Executes dropped EXE
PID:2584
-
-
C:\Windows\System\ZFrdkSZ.exeC:\Windows\System\ZFrdkSZ.exe2⤵
- Executes dropped EXE
PID:2580
-
-
C:\Windows\System\UIqVwpx.exeC:\Windows\System\UIqVwpx.exe2⤵
- Executes dropped EXE
PID:2944
-
-
C:\Windows\System\hirLawD.exeC:\Windows\System\hirLawD.exe2⤵
- Executes dropped EXE
PID:1956
-
-
C:\Windows\System\wDkeifO.exeC:\Windows\System\wDkeifO.exe2⤵
- Executes dropped EXE
PID:1480
-
-
C:\Windows\System\ChfEiZF.exeC:\Windows\System\ChfEiZF.exe2⤵
- Executes dropped EXE
PID:2704
-
-
C:\Windows\System\KqeUauW.exeC:\Windows\System\KqeUauW.exe2⤵
- Executes dropped EXE
PID:2928
-
-
C:\Windows\System\YqhiYaQ.exeC:\Windows\System\YqhiYaQ.exe2⤵
- Executes dropped EXE
PID:1064
-
-
C:\Windows\System\DlzUFGm.exeC:\Windows\System\DlzUFGm.exe2⤵
- Executes dropped EXE
PID:2032
-
-
C:\Windows\System\tGXdVBZ.exeC:\Windows\System\tGXdVBZ.exe2⤵
- Executes dropped EXE
PID:468
-
-
C:\Windows\System\qoVbLEf.exeC:\Windows\System\qoVbLEf.exe2⤵
- Executes dropped EXE
PID:1212
-
-
C:\Windows\System\xOzGKAN.exeC:\Windows\System\xOzGKAN.exe2⤵
- Executes dropped EXE
PID:536
-
-
C:\Windows\System\PPlpeGG.exeC:\Windows\System\PPlpeGG.exe2⤵
- Executes dropped EXE
PID:1972
-
-
C:\Windows\System\oTVjAkp.exeC:\Windows\System\oTVjAkp.exe2⤵
- Executes dropped EXE
PID:2204
-
-
C:\Windows\System\FmMNNYG.exeC:\Windows\System\FmMNNYG.exe2⤵
- Executes dropped EXE
PID:2832
-
-
C:\Windows\System\jeTTvUM.exeC:\Windows\System\jeTTvUM.exe2⤵
- Executes dropped EXE
PID:2308
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD518b7b0531569ba73827344bd1c3cc4fa
SHA1b37491d5553c3b690606feb3ec6cc547deef8902
SHA25674930187c04f060bec85dd56128d7af9f6c586dd4199beca2f9cee9a53143a17
SHA5123d41d42cb829c78e2af4ac40dd229debcce254e09459fb55115bddc2d81740b2be3d8e2edb29bdcf23c897b2064538e4fe61f2ba3d314c55a961e264c70a2b96
-
Filesize
5.2MB
MD5640d43630b0883d7b46069bc9f2d6836
SHA180ed270294fa098393246e9aec1ae0562cc3062e
SHA2566de2a6b61f18777d892742720718e1b395a292e7f7fa7368bf1896f0bee2ca9d
SHA5128cd041878602cc7aa3d746e4bef8718ad8e562aee0b5218ab3efc691af031af04712583842cfc36801e6de336a3a94fed2b51b467ac6167881343fdcd5310011
-
Filesize
5.2MB
MD5a6619b23442a8414f32f46ccfe3bbe44
SHA19f24520d9b96a7d674913bf1c96d57923917b458
SHA256b15205dcf068642ea6274b2aa460afdc8473cb943b299025b230abbdc167f2b7
SHA512644c81c90a8e177a917480485d8956a42c3418b2b7a8f363e5c50a8bc4a0dece11434bf2276a92731889fb5d308cfae892177f16d3be66bfd86703b8bf080e28
-
Filesize
5.2MB
MD5ae2f0199b30aff82321f4a25ce5aabfe
SHA1bf59488d0644419da453a49e33883d076856e608
SHA256e3e59579ff27fcaffab39c21c95c88b182e951ec5781cfa0dcf3838ccb8fa781
SHA512050d7ab6360520d1dad2ee7cdc554f514d6d0c3b5e9d96e0dfbb534bc1416e6a4095a5c8be691cf572c0671af5c07b4d76fd62d36c119b3180480c85608bdf40
-
Filesize
5.2MB
MD56745ca6b78da411033cf57c7ba1fba69
SHA1da94551d18852c225f0ea237b66352c2db9c052e
SHA25603b076857c729ee34a0625158bc4a387f6c64af009bdeafa4a4ed571f3c27fb1
SHA512e0a9f536f74b945d7fab675e1e25176fdab670473cb5e4d0f4e90c9a0f6cc1f27f00f624c135feda94a34bbf2014a49585a23f47fb3bb1519c0e1254a35869a8
-
Filesize
5.2MB
MD5c54d67a8430c0b34ec4f490e0ac0bfc7
SHA1047e86a0a21f41a64abd4dc14f72ab471cc8fb05
SHA2565cc9774f18bb1232590d2e1d075a1c6eacbff74ad80bb9d6d15b4500abc1e119
SHA512f19e2614925398dfe6d8eae3a8d5a93640f013d3e72a89ffe8b63b3c967cf4eee3f9771dfed88a3aeb0866a65b612bf43f3f7dc3396d6ee0fbadc9e6a37aa3f9
-
Filesize
5.2MB
MD5f8c9da7dfc510ff4d4eb5b227b10a3c4
SHA1274d18ec3f1074dc9cd5bc2c38acac06191f7887
SHA2563018307e6b1211e51350f24b1bbbf21532f3e79e36fb9a5a4fa7569c2358fe06
SHA512143eb097f43ae7f0aa4cec99a250d8ea9b3f8b9f90471853aa6c91c50989f288a71478c9fcfedccae91ea776ce723db72cdbd87cf4569d1616d626f80b350bd1
-
Filesize
5.2MB
MD599b1efe7d39f3e529d868b68aed2b3c3
SHA1624b0abbbabeb81e3bcb50d7e5f7ebaba9c46dcd
SHA256fd499945ca98e04957d991f589481e38d9da8938929af3ee47957370c392a0e8
SHA512eec826e05c4ebdf85602a78af137763f307af1b04c765b1136a62a0599bd5688301c754376ce20d450af34634d5b56121c183881ab214202f68a585f060b3625
-
Filesize
5.2MB
MD5b117e5998a9a7c4875c10a14b9c570c8
SHA1317c564f074b80074257130a7c0e31398ee1a3b3
SHA2562d83a02ac2a4fdc56dd3c4e1230f88ff59d21dbfc30027470a133481c68d6cca
SHA512f570671a2858c59ef70bb3766bc23d3846dc8e9c22ce815157793b4ea8e8444cbfd7b70876b4c503902f442e6675916270617d4adbed211be38825ab04a83ee6
-
Filesize
5.2MB
MD55733a043039e008f0fa49cbc8b271ab7
SHA10a5825b39735d644400170b259480ae2fa063b79
SHA25663b6d6a2d09307e136244df5c04ce467a662487c6720d6b4d62e845d3ce0c5cc
SHA5122a35f0f25bf15e8f39324ddfcf1a912caf90ac1fa5f1903f3659ef24e55e0c72247699ed27da0be47150291f8ccce5e84f30dbe6662b7a37d088fa9f75de961b
-
Filesize
5.2MB
MD5ac9da8b48fe486dbf29a757cbf371f84
SHA1eba1eef21c6243a6f0472d0d4699ebcc0f22c4f3
SHA256c1e399c3a77cf38511576fb75be62184ed01465763309bc8bb28f69d61f3289a
SHA512a16a8bb27ec1fb03e984620b6b82d97b66602840e9796028c643a9bfb45f81aaf6d3aee3543ce1013808bb31caa40ceed4bec96a7350cd9a300971c82a14125d
-
Filesize
5.2MB
MD5dd66d6ebd1260a0b6a63f155a8bf40f6
SHA101882bf70de576bfac96511ded318c62e1bd620e
SHA2561fc6d2100afb3e895104c3323c0f845dd69b4a0993d8e52b23c2405863049e09
SHA512b38929dd118388bdb05b3f9c36e820b7608cfba00848e0c0f525d8d5d390ef515bbd1d60e604b0686e9c9021b7a90817af29f27f4e7ce70817b13d2f31d8718c
-
Filesize
5.2MB
MD5a9c25203de36cb4004cc78ef81fc9a67
SHA1618977f0f58380be98e02960c5b130f20e6b0837
SHA256440e7b9afb775d8290d97c37bbb1542250bdaeab41b15b3491f719753fdccc1c
SHA512484c9a6514aa97c79d28697f682c55e59a36de036ed067cfed013f4dcfc28845c9770e0f495e908dedb15cd74524c3d689a1c520fe8ec12a226b688c70173ca4
-
Filesize
5.2MB
MD50da6e68d2831fab151255e397e09c442
SHA1b9443a467670bc8033759a6c41bff9fb7c731c67
SHA25628f5c2253625515353830798dea63315d81bebba1bfede815460e9ae367e34ea
SHA512118a7bbeb4ea0f9ef298dfef9315604d90eef4259d6da77663c4f847b6f078d6b161acabd79ac4118dc52e0370978b7191a30f708c8b9dce5caddbc5f98f8e8b
-
Filesize
5.2MB
MD58f3d7fc01f80f578c8e8fac3735ae821
SHA1f94c730e070c59d0a22685e0111684383b06c696
SHA256f305cdd8983f69ed6f165b7232e85406f633251829e196b172ff96a89f7eed4c
SHA51205e69293e8b7e6f7ba48c45ee3d3d0b48b88c63fdcb02aded2eaa08bda3fb5fc2c63a2357345cfa889aa6a725d0024429fb4016c02214152fb9fa0e7e3df51d9
-
Filesize
5.2MB
MD598dc583d8be3c54bca4035b598600f98
SHA17677ce94b58010cc5b7002f26768361d6323c634
SHA256b7ece3c0be8a17281f1ce9452f0f41cb970ee4861f9b145868ffa1ff73d41c1f
SHA512c08983827311983d4f9d09f854ee2e6d455c15c28f989cf9b8bc9839828d6a0f5242eb2fbb291aee6f107a014637e837f8472c67eb9a2f6ac1726192fe075349
-
Filesize
5.2MB
MD5206821a52fc606854ac300f33792c39a
SHA139619cb3e439c0c9b7cb55c7519bbd2c5fbf1cd8
SHA256ea28535cd6263cc484973cf22fc904e496257e1c98a61b37b46df7776f387451
SHA51270d288127811d7cfd99040f95de1d934f1b53cfa2b9f2da5e61fa081a3153ef458986d9d4a164a21a3e82717949c937ea291d84efa730f6befb878193ea8a8ca
-
Filesize
5.2MB
MD5fca763529a05d717ca89f169fe7888f8
SHA190ef5c46ffff78941ce52bc8f5d226be4f7ff2ad
SHA25680b0d32a2ebb975318de924420b0f162add9d44a0981d60d5f3944048cd8b611
SHA51210ce102fd7d5e3ad661742a18ac02012271e70da900ebe39a58b65d821bffab02cb00e15bfe1d849c0d97c44a034461174687021979db949718157ebe693a701
-
Filesize
5.2MB
MD56c27b7ea2eb78113e9b72ed96340483d
SHA1abfdca70718975c100181c35308c4da1e301cb10
SHA256c24023bf185b6b218450dc3a5c257cc0c2798776e4cc6ddec1e758f5e270df28
SHA5126f1e027089dbf58af9825fe8beb88472f064061635fd8fbe656e7d83216c633f3bc00768b754489264b543632f0868fda4733b325e69676c814becf39f5f3d5a
-
Filesize
5.2MB
MD5428493bd8fe4319c1a35574700e492d8
SHA199b17470c9b8157f42745b5f6d9f75e4901e8385
SHA256955f8f68a7f22b8fded2e44d89c8f6efadcbc538617ccf0778aef1eaf4e04be0
SHA5127aba2619f85171b5cf7a8d4c6dfd0d92a139b1ba08c456170889d569dd2b011c2b759d803e74a3ea6e985ca055550206ee6817dd2b09edee4e2b2417b04de227
-
Filesize
5.2MB
MD5cc6f84b46bd63d3c72933b511f4e77e3
SHA18e3b203acf57e108f2cbfe85bd47cc897deb49b6
SHA256116ccd748b29bc406217202aa7e3703a89e30f1ffb65fafcd17d95e3c11ee12e
SHA512857c379d54718f9031ae863ea9664faea9be81ddae70ccba9179f16dd4f50cee0068304fc76b87726612e1f2ceae3b9606c9a5ca030f9d4c0091fc6ca6ad8e75