Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/10/2024, 13:14
Static task
static1
General
-
Target
Lowx ULP (3).txt
-
Size
193.2MB
-
MD5
e10c6ea5ab170c21210bb2118994756c
-
SHA1
6fffa814632f89ed586f4378ae136cf69b4faef4
-
SHA256
37b5e44f7394fbc1263d053482c71406e8dcac97ede0f682750941227868a186
-
SHA512
f310483b6404850b91eaedc6c4b55e5bb294f8713f5f16d81af129bca73b157b22675ba93023f9ac1dcba6e3b209df99156d58bc3c12c71882d36c4549da3d51
-
SSDEEP
393216:eNvyHFXclcqMb1Z75dttWJzMe4eIencimZkJ/2SI34+JZrF:MvyHFXcrMbn7Ptt4zMe4ehnL3ZwlZ5
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.56.1:4782
93eaae4f-2916-40db-9679-8f9946015308
-
encryption_key
906C0450C271523704E6192252A966F36F9EBE6F
-
install_name
Windowupdata.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
windowupdata
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x001900000002ab8f-217.dat family_quasar behavioral1/memory/996-219-0x0000000000110000-0x0000000000434000-memory.dmp family_quasar -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 996 latest.ver.exe 3264 Windowupdata.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\latest.ver.exe:Zone.Identifier chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133742494430078255" chrome.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\latest.ver.exe:Zone.Identifier chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3932 schtasks.exe 2376 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4900 chrome.exe 4900 chrome.exe 696 taskmgr.exe 696 taskmgr.exe 3856 chrome.exe 3856 chrome.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 3856 chrome.exe 3856 chrome.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe Token: SeShutdownPrivilege 4900 chrome.exe Token: SeCreatePagefilePrivilege 4900 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe -
Suspicious use of SendNotifyMessage 61 IoCs
pid Process 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 4900 chrome.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe 696 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1592 MiniSearchHost.exe 3264 Windowupdata.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1184 wrote to memory of 4356 1184 cmd.exe 81 PID 1184 wrote to memory of 4356 1184 cmd.exe 81 PID 4900 wrote to memory of 3572 4900 chrome.exe 86 PID 4900 wrote to memory of 3572 4900 chrome.exe 86 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2868 4900 chrome.exe 87 PID 4900 wrote to memory of 2076 4900 chrome.exe 88 PID 4900 wrote to memory of 2076 4900 chrome.exe 88 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 PID 4900 wrote to memory of 4512 4900 chrome.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Lowx ULP (3).txt"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Lowx ULP (3).txt2⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7ffe3133cc40,0x7ffe3133cc4c,0x7ffe3133cc582⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1944 /prefetch:22⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1776,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2152 /prefetch:32⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1976,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2220 /prefetch:82⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4532 /prefetch:12⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4524,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4604 /prefetch:82⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4580,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4588 /prefetch:82⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4740,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4880 /prefetch:82⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4612,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5028 /prefetch:82⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5108,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4324 /prefetch:82⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4788,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4736 /prefetch:82⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5028,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:3548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4516,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4512 /prefetch:12⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4592,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=4860,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3472,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4504 /prefetch:12⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5328,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:82⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3284,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5404 /prefetch:82⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5292,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3456 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:4948
-
-
C:\Users\Admin\Downloads\latest.ver.exe"C:\Users\Admin\Downloads\latest.ver.exe"2⤵
- Executes dropped EXE
PID:996 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "windowupdata" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windowupdata.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3932
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Windowupdata.exe"C:\Users\Admin\AppData\Roaming\SubDir\Windowupdata.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3264 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "windowupdata" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windowupdata.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2376
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4948,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4488 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3004
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:3576
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:1580
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:696
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\728fe350-bec9-4592-a019-664e62886dbe.tmp
Filesize649B
MD593ca870bafdfcc0b268f12fae26438a1
SHA1c3fc8c893c2ace109b6d4d779bde1fbe4901395a
SHA256fa50990f68795d7bc9d0c38a419f82683ad7ef4101ad72db5bbbb13fe46b03ae
SHA512348cec1cc7142e35b0b6841dc8c997d5a6d6472dcb6037373cb8bb1fd75f92a10be9f324879f0008235f6366d8fc803ec249af9d297274089139944428d190a3
-
Filesize
480B
MD52e087d17385b6c6e2eef314a4b628ce9
SHA1906e716b6935f8e0c2e4d161ac323378666717b7
SHA256b7cf39b8c05d4e2148a79b078808e030b2a4c05c7723ff9d516e9c3b256a1fd3
SHA5120d73b997fa761ff71f30681135584d8d7eedd3e2ae120b09a743bbac53733849c1da239151be88cbbba5a6c3fcdecca8813620c380ebd4e4e43b0a174014f123
-
Filesize
4KB
MD51fb5fee34384511a9adfa8497fdcabdc
SHA153d7f2fc321b1c0da266a377973972a268650a08
SHA2566c8c0ec6251feac9655b837bb97d8868b2ae7fd421d93a6a866dae2a5a59d9d2
SHA512c24e833d07a1b6b2f1b04d3921f28a9ac5dd6892196bc7ba7c73d584b09d5f8f5bf648c6eadeefdd807e4472e7b4b5c86bae530de1426f91d9c0fb226252bf97
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD54291b590999cacce8bb765eefc0cf3b6
SHA1138080c71eee4c8690389e3188e9c6b53b8db681
SHA256702339a371286e14c1646c4d6fc9bb0655db610a2dfdd3d6f8ccd9da0d2a135b
SHA51283fdc430979e760dcd29b0915e9d77b311320a87d3c5d6720a8babfd90c994ff56ba74831a2d07b8908ddd4554b097478bf2b894189068fd743194c6809ca775
-
Filesize
690B
MD564f209958371338e6ef8964cf89954b4
SHA1ce5ff7ad7ade9de0d144c0a7f7a1d0d2914d2133
SHA256ba9347e9a04710a8f76ded52c329baf8b5417b482dbde030e59e02fcb66c5e37
SHA512115636a256fb5a8b56be39c4bd7d591b1fca78a2b65c0cca08f8b935efded316c7dc36b2512a35aa3a29f91c6ccc1f6a3e26432753aa4b2ec9d4debce80d7f8e
-
Filesize
858B
MD53fd1b0375faa875ce616a6c6cb71ec69
SHA1f0b62a380a826328a9a6bee75a2eab134b0446b2
SHA2561d434f7a7229cf0dda7fd8592d03d226f9327a36df9665e33adb3131a230b3c3
SHA51239be50678bcc46248122633d782677af04fe4e7e0c0d54e4e03db7dbd652e6fc730fec36d4ce7ad9522ec3514f1086258ee321752227ae1275fee4e3904b2a9e
-
Filesize
9KB
MD5eb4d53f2c6cc5900e34eac9f4f001726
SHA1f7ddd0bc1c7903cb57bbc89090364cfd963bbbc1
SHA2565985325dd583a1d2c48ebd337f872e82b6491ff0e7cf234364f834826f7e79fd
SHA512460a7ac96852f27d7242576ee2455134ad15b294610d721b46daf812d6be142dc70a488758ab0e4b1c459d25fcf3b76a724719e4293d7078ecaf7e9692ccf03d
-
Filesize
9KB
MD5874184dad987efd5fc8a859179a6d7f8
SHA1ad2e3df877b872d2b6c6fa7d26fb1640b97c0652
SHA2569102df4d9ee92ea8d121dc06080bb64bf4c6c92c680f8a0749468aaa606a65a6
SHA512dceb40e7956f9f75e3c3d0c914c449fca71bba94881c9b9ca42d1ad991209fd805a79a79adecade1365538c9cc28bf4385c275fe90cc448d3470c2f7bd1d0913
-
Filesize
8KB
MD542a8a13110bc7912ba4ab56e3919d352
SHA1b0d86598c017bcf816904c98e7e02ae4fc4a5689
SHA256d45d09cd33c1214e22381b62b9e8abc18735c32159820ef2cca23992fefce17c
SHA512544813972ece57e3acb4f024a650eb98d16f4f03cdc18db33df4a4ab4033af1fd31014d5af6ef8c74c286a71cf0298bb9e222300721616c06c597fd26d84b072
-
Filesize
9KB
MD5604a4a741fbd6557420af9ce75de2bab
SHA1d2f7c167d814f53d3c73315845e3f1e47f600d08
SHA2567f4ad9615f67abdc76c2588f376faa11ac1be4ce5429fd4cc752fcb0865df637
SHA512ee0c012e81d9a0d39b4575672dbb463ba547da7718e2ecfaacb9057df12db5d092fa274e25b000bccc95f02a91b59085b14b62e3a5b0a468616fa79837db970a
-
Filesize
9KB
MD5a5098d5957bd7f7f3b8ef75312c5adcd
SHA1f4b956e78e427c74dd1336186d30b6eebb378aa7
SHA25682d38bba1e8d8b222b1881314bf9eac6f04485e162beb3a53b914030f5313207
SHA5126a3df240d9ea9f7649694fe2e999dc670d2b8d7fbfc0cda87a1819f6be3093b6df49e69f5173d7d59441f081427c281ab2ff2c69f81f66971361b3f878c9fefb
-
Filesize
9KB
MD574fd3c6ba62f804650eee4210a8f3332
SHA113b1e069c1afbc50d6474012bf79bec2671b2219
SHA25602ab47f96c0852c31fcab1892afa07fb3fe0fb50d06ee8c1105b9cb03eff0649
SHA51236eeba2ac4c9c73820c4498733646584c215ebb76851c0984db8a9f3c7cb3390b3d7b98e4cc8900462cb4f29b1727910bf36825ead521a55a0300227e0797919
-
Filesize
9KB
MD53b22cc97a6195c2f877ff7fad093dc8d
SHA1dfe813173465e126b624428a3648e28c1e90a414
SHA2566eff4b1b144ed5c676c1cfbc0f3af613bffa5393b4dd86e128fffedb4450529f
SHA5121d46d8b75a165e494586530558428460352e4bcaeb2e1ccdac11c661e921a7c2752fd6236306c5f9da1aab6aa5dfdbdd452a3cbc3f3e250b0b85ffee172b6c20
-
Filesize
9KB
MD5eff55c638c737405d05e19ba53d934cb
SHA10bf71e535c1a8f95af7699d1390935a42818ebc5
SHA256747a7517d5ce2cd525235ac8dbc09b5d9d9d792156ae0494a810d4f2414e62c9
SHA5128fd12ebf3cfe253b8fba51a05b92fa0a4790abff6f9def4e6e92cc4162a4dc5952772e60b963bf4055ee579b942ef600906f1f3318cd678ec8b4b6c12888f55d
-
Filesize
9KB
MD5bb357181a5cab3b9edee62e6ac918c78
SHA180ea5e7a5c14639223eda324e1acc867947848dc
SHA256a3cd628bba9845e74fa6bcce1a7795e893d267a137822242b68bcab75261bf67
SHA51204b3a4ef3f286fc0c5baa7b6315c78a358a5a62e5c516690de8fe8ee3c19d62e0bb8380be70fb18ba912611811c12491aca8deb1702ba4353a7b16904fe316ed
-
Filesize
9KB
MD50aa3cea9ed94af794ae20d94fc2638f1
SHA138f15116201e44013309f0e331d281a4048fae34
SHA2561572fa01f56614bc003b9d8b66d2585b48e59dad6439c09877e88070c223be0b
SHA51230edd4da19eaa482663f1f1b7d6a7c8a2400012783259f027dd19113f9de53a63dc9725eab8312f4accc4d3179f263d0a20f82ca8e3658fa339af0f3d2067ad6
-
Filesize
15KB
MD5b924cd6c0ae589e74644c509d69da6bb
SHA197495065cd79f18f23c827f3999554d90585374c
SHA2561e609a4a2e34ec218cff6a141c98623f694210d9f0441afe6d2987f659c648b1
SHA512d9699b847a935be93596af5278e9de01013e5aebdcc7c46a958ccba41a03cca4ff8f8a767d056ceaa1309b674b16f006fdb7481dcbaea9ee1afa6a80ca5d61e8
-
Filesize
231KB
MD5f71713eb5b747d8f429c03fb75e31b53
SHA1f463d1a776d4a8c046a96657bf498ccf4407e47c
SHA256f9a1f3a6238fe269b0cd3e9c2a944cc254ff45ce0f9a8674a2e253be5b26fc8f
SHA51201a2b445258e1e4626540059add537f4ade20bbb07195b2672342623f43eaaaba1e8d8e208c843005d9465555650cd957667d025a1e8d9fbd7843440211f9af5
-
Filesize
231KB
MD51d6fcbbd6f52d309f1a6ec53972e155a
SHA1b627cb066ec2a0853fe37fd8e5368e9b38d9d674
SHA25600521ae0a6a3445b362c458221000b5738f1e323895ee26afecf8d334b6efaeb
SHA512c6530a9966290227bf940bfc167d7a3921d77e78bae22eccbfe8d59574e091e62f95168fd4565c6873c0ad3fdc09c6e8d9682dceae0307383be5eba2a063137a
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\b43be17e-76b0-4ac7-a3ba-30e7d438c30f.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5327975ba2c226434c0009085b3702a06
SHA1b7b8b25656b3caefad9c5a657f101f06e2024bbd
SHA2566fa9064f304b70d6dcebee643ca017c2417ff325106917058f6e11341678583c
SHA512150a57c143fc5ff2462f496f5a9451310b8d99e32c4d570641204c8062a78590f14bed438ac981e8b0609a0c87b859a1f8502a78687bc36c3a9529d633a58e51
-
Filesize
3.1MB
MD5caa15ef5ae634f3cd954ea48e3de19cc
SHA189f07d4e05af483ad3853656090c1d6266a07bb5
SHA256a06081a7f02734ff073c7746db76d57031cab7b6ad9c591256d3e6c98fd51373
SHA512cf418a9d1ead95fa71540fc0b1b1a6524149441be439878490fc810237e6e31eaa5abce2b26ad53952dcad1f6adf3f1e0a0b2ee2db978615fd5a7a8c3ad70320
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98