Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
01/12/2024, 23:58
General
-
Target
Specter Screen Grabber.exe
-
Size
11.0MB
-
MD5
7918234c2953a1ef45480b1224371750
-
SHA1
ae40e7be6833b2d2cc54eb5f325771def35cb370
-
SHA256
2daa61ed02cf604312b1d91ba8c161bb31fdff082f849eb4e5c4000d90a40388
-
SHA512
ed41b069e9fe99159141a294393e8823be8f56e5ea1e89ce0f113e8d7646b9aef4d9aa80941669ff2da95a4c7c1fb378f9a9f5ea58db519e09f7f37ba9615587
-
SSDEEP
196608:GKWyhmducMnCUkFuRLuId3wpguRMV/DBU9AAwy2efaTqTpXoKIlQqe0Uz/Sr/lHW:GCEQcULPWguRM9FQwFWTpXoK+wSr/lCl
Malware Config
Extracted
xworm
24.ip.gl.ply.gg:2962
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/980-351-0x0000000003D20000-0x0000000003D36000-memory.dmp family_xworm -
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Specter Screen Grabber.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Screen graper.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Screen grapper.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3008 powershell.exe 4140 powershell.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DoSvc\ImagePath = "C:\\Windows\\System32\\svchost.exe -k NetworkService -p" WaaSMedicAgent.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Screen graper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Screen grapper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Screen grapper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Specter Screen Grabber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Specter Screen Grabber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Screen graper.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000\Control Panel\International\Geo\Nation Specter Screen Grabber.exe Key value queried \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000\Control Panel\International\Geo\Nation Screen graper.exe -
Executes dropped EXE 3 IoCs
pid Process 2964 Screen grapper.exe 980 Screen graper.exe 708 nrrnld2l.rio.exe -
resource yara_rule behavioral1/memory/3172-10-0x00000000004A0000-0x000000000151A000-memory.dmp themida behavioral1/memory/3172-11-0x00000000004A0000-0x000000000151A000-memory.dmp themida behavioral1/files/0x00290000000450e4-17.dat themida behavioral1/files/0x00280000000450e7-32.dat themida behavioral1/memory/3172-49-0x00000000004A0000-0x000000000151A000-memory.dmp themida behavioral1/memory/980-54-0x0000000000EF0000-0x0000000001802000-memory.dmp themida behavioral1/memory/980-55-0x0000000000EF0000-0x0000000001802000-memory.dmp themida behavioral1/memory/2964-341-0x00000000005C0000-0x0000000001448000-memory.dmp themida behavioral1/memory/2964-342-0x00000000005C0000-0x0000000001448000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Screen graper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Screen grapper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Specter Screen Grabber.exe -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 3172 Specter Screen Grabber.exe 980 Screen graper.exe 2964 Screen grapper.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Specter Screen Grabber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Screen graper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Screen grapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mousocoreworker.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 mousocoreworker.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mousocoreworker.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe -
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\ApplicationFlags = "1" mousocoreworker.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1733097635" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ExtendedProperties\LID = "00188010E59E96B6" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Property mousocoreworker.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\DeviceId = "00188010E59E96B6" mousocoreworker.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Mon, 02 Dec 2024 00:00:36 GMT" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={48F3852C-80C8-4EFC-8BC2-B3FC8C353B59}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Property\00188010E59E96B6 = 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 mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414} mousocoreworker.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\DeviceTicket = 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 mousocoreworker.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1464 SCHTASKS.exe 1832 SCHTASKS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3172 Specter Screen Grabber.exe 3172 Specter Screen Grabber.exe 980 Screen graper.exe 980 Screen graper.exe 2964 Screen grapper.exe 2964 Screen grapper.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe 708 nrrnld2l.rio.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 980 Screen graper.exe Token: SeDebugPrivilege 708 nrrnld2l.rio.exe Token: SeDebugPrivilege 2964 Screen grapper.exe Token: SeShutdownPrivilege 4588 mousocoreworker.exe Token: SeCreatePagefilePrivilege 4588 mousocoreworker.exe Token: SeShutdownPrivilege 4588 mousocoreworker.exe Token: SeCreatePagefilePrivilege 4588 mousocoreworker.exe Token: SeDebugPrivilege 3008 powershell.exe Token: SeShutdownPrivilege 4588 mousocoreworker.exe Token: SeCreatePagefilePrivilege 4588 mousocoreworker.exe Token: SeShutdownPrivilege 4080 RuntimeBroker.exe Token: SeShutdownPrivilege 4080 RuntimeBroker.exe Token: SeShutdownPrivilege 4588 mousocoreworker.exe Token: SeCreatePagefilePrivilege 4588 mousocoreworker.exe Token: SeIncreaseQuotaPrivilege 3008 powershell.exe Token: SeSecurityPrivilege 3008 powershell.exe Token: SeTakeOwnershipPrivilege 3008 powershell.exe Token: SeLoadDriverPrivilege 3008 powershell.exe Token: SeSystemProfilePrivilege 3008 powershell.exe Token: SeSystemtimePrivilege 3008 powershell.exe Token: SeProfSingleProcessPrivilege 3008 powershell.exe Token: SeIncBasePriorityPrivilege 3008 powershell.exe Token: SeCreatePagefilePrivilege 3008 powershell.exe Token: SeBackupPrivilege 3008 powershell.exe Token: SeRestorePrivilege 3008 powershell.exe Token: SeShutdownPrivilege 3008 powershell.exe Token: SeDebugPrivilege 3008 powershell.exe Token: SeSystemEnvironmentPrivilege 3008 powershell.exe Token: SeRemoteShutdownPrivilege 3008 powershell.exe Token: SeUndockPrivilege 3008 powershell.exe Token: SeManageVolumePrivilege 3008 powershell.exe Token: 33 3008 powershell.exe Token: 34 3008 powershell.exe Token: 35 3008 powershell.exe Token: 36 3008 powershell.exe Token: SeAssignPrimaryTokenPrivilege 2528 svchost.exe Token: SeIncreaseQuotaPrivilege 2528 svchost.exe Token: SeSecurityPrivilege 2528 svchost.exe Token: SeTakeOwnershipPrivilege 2528 svchost.exe Token: SeLoadDriverPrivilege 2528 svchost.exe Token: SeSystemtimePrivilege 2528 svchost.exe Token: SeBackupPrivilege 2528 svchost.exe Token: SeRestorePrivilege 2528 svchost.exe Token: SeShutdownPrivilege 2528 svchost.exe Token: SeSystemEnvironmentPrivilege 2528 svchost.exe Token: SeUndockPrivilege 2528 svchost.exe Token: SeManageVolumePrivilege 2528 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2528 svchost.exe Token: SeIncreaseQuotaPrivilege 2528 svchost.exe Token: SeSecurityPrivilege 2528 svchost.exe Token: SeTakeOwnershipPrivilege 2528 svchost.exe Token: SeLoadDriverPrivilege 2528 svchost.exe Token: SeSystemtimePrivilege 2528 svchost.exe Token: SeBackupPrivilege 2528 svchost.exe Token: SeRestorePrivilege 2528 svchost.exe Token: SeShutdownPrivilege 2528 svchost.exe Token: SeSystemEnvironmentPrivilege 2528 svchost.exe Token: SeUndockPrivilege 2528 svchost.exe Token: SeManageVolumePrivilege 2528 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2528 svchost.exe Token: SeIncreaseQuotaPrivilege 2528 svchost.exe Token: SeSecurityPrivilege 2528 svchost.exe Token: SeTakeOwnershipPrivilege 2528 svchost.exe Token: SeLoadDriverPrivilege 2528 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 232 Conhost.exe 400 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3172 wrote to memory of 2964 3172 Specter Screen Grabber.exe 87 PID 3172 wrote to memory of 2964 3172 Specter Screen Grabber.exe 87 PID 3172 wrote to memory of 2964 3172 Specter Screen Grabber.exe 87 PID 3172 wrote to memory of 980 3172 Specter Screen Grabber.exe 89 PID 3172 wrote to memory of 980 3172 Specter Screen Grabber.exe 89 PID 3172 wrote to memory of 980 3172 Specter Screen Grabber.exe 89 PID 980 wrote to memory of 708 980 Screen graper.exe 90 PID 980 wrote to memory of 708 980 Screen graper.exe 90 PID 980 wrote to memory of 1464 980 Screen graper.exe 91 PID 980 wrote to memory of 1464 980 Screen graper.exe 91 PID 708 wrote to memory of 624 708 nrrnld2l.rio.exe 5 PID 708 wrote to memory of 676 708 nrrnld2l.rio.exe 7 PID 708 wrote to memory of 956 708 nrrnld2l.rio.exe 12 PID 708 wrote to memory of 324 708 nrrnld2l.rio.exe 13 PID 708 wrote to memory of 408 708 nrrnld2l.rio.exe 14 PID 708 wrote to memory of 476 708 nrrnld2l.rio.exe 15 PID 708 wrote to memory of 876 708 nrrnld2l.rio.exe 16 PID 708 wrote to memory of 1028 708 nrrnld2l.rio.exe 17 PID 708 wrote to memory of 1108 708 nrrnld2l.rio.exe 18 PID 708 wrote to memory of 1180 708 nrrnld2l.rio.exe 19 PID 708 wrote to memory of 1228 708 nrrnld2l.rio.exe 21 PID 708 wrote to memory of 1252 708 nrrnld2l.rio.exe 22 PID 708 wrote to memory of 1260 708 nrrnld2l.rio.exe 23 PID 708 wrote to memory of 1312 708 nrrnld2l.rio.exe 24 PID 708 wrote to memory of 1456 708 nrrnld2l.rio.exe 25 PID 708 wrote to memory of 1508 708 nrrnld2l.rio.exe 26 PID 708 wrote to memory of 1532 708 nrrnld2l.rio.exe 27 PID 708 wrote to memory of 1548 708 nrrnld2l.rio.exe 28 PID 708 wrote to memory of 1592 708 nrrnld2l.rio.exe 29 PID 708 wrote to memory of 1672 708 nrrnld2l.rio.exe 30 PID 708 wrote to memory of 1732 708 nrrnld2l.rio.exe 31 PID 708 wrote to memory of 1860 708 nrrnld2l.rio.exe 32 PID 708 wrote to memory of 1880 708 nrrnld2l.rio.exe 33 PID 708 wrote to memory of 1900 708 nrrnld2l.rio.exe 34 PID 708 wrote to memory of 1908 708 nrrnld2l.rio.exe 35 PID 708 wrote to memory of 1920 708 nrrnld2l.rio.exe 36 PID 708 wrote to memory of 1984 708 nrrnld2l.rio.exe 37 PID 708 wrote to memory of 2076 708 nrrnld2l.rio.exe 38 PID 708 wrote to memory of 2260 708 nrrnld2l.rio.exe 40 PID 708 wrote to memory of 2280 708 nrrnld2l.rio.exe 41 PID 708 wrote to memory of 2528 708 nrrnld2l.rio.exe 42 PID 708 wrote to memory of 2552 708 nrrnld2l.rio.exe 43 PID 708 wrote to memory of 2560 708 nrrnld2l.rio.exe 44 PID 708 wrote to memory of 2568 708 nrrnld2l.rio.exe 45 PID 708 wrote to memory of 2624 708 nrrnld2l.rio.exe 46 PID 708 wrote to memory of 2768 708 nrrnld2l.rio.exe 47 PID 708 wrote to memory of 2800 708 nrrnld2l.rio.exe 48 PID 708 wrote to memory of 2816 708 nrrnld2l.rio.exe 49 PID 708 wrote to memory of 2840 708 nrrnld2l.rio.exe 50 PID 708 wrote to memory of 2868 708 nrrnld2l.rio.exe 51 PID 708 wrote to memory of 2884 708 nrrnld2l.rio.exe 52 PID 708 wrote to memory of 2980 708 nrrnld2l.rio.exe 54 PID 708 wrote to memory of 3080 708 nrrnld2l.rio.exe 55 PID 708 wrote to memory of 3556 708 nrrnld2l.rio.exe 56 PID 708 wrote to memory of 3644 708 nrrnld2l.rio.exe 57 PID 708 wrote to memory of 3748 708 nrrnld2l.rio.exe 58 PID 708 wrote to memory of 4080 708 nrrnld2l.rio.exe 60 PID 708 wrote to memory of 4104 708 nrrnld2l.rio.exe 62 PID 708 wrote to memory of 4336 708 nrrnld2l.rio.exe 63 PID 708 wrote to memory of 4624 708 nrrnld2l.rio.exe 65 PID 708 wrote to memory of 2916 708 nrrnld2l.rio.exe 67 PID 708 wrote to memory of 4572 708 nrrnld2l.rio.exe 68 PID 708 wrote to memory of 1584 708 nrrnld2l.rio.exe 69 PID 708 wrote to memory of 4872 708 nrrnld2l.rio.exe 70 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:624
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:876
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:324
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:1028
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1180 -
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2800
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1228
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1456
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2552
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1532
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1548
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1592
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1672
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1732
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1900
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1920
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1984
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2076
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2260
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2560
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2768
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2816
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2840
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2980
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3080
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3556
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\Specter Screen Grabber.exe"C:\Users\Admin\AppData\Local\Temp\Specter Screen Grabber.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\Screen grapper.exe"C:\Users\Admin\AppData\Local\Temp\Screen grapper.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:5084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Screen graper.exe"C:\Users\Admin\AppData\Local\Temp\Screen graper.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\nrrnld2l.rio.exe"C:\Users\Admin\AppData\Local\Temp\nrrnld2l.rio.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:708
-
-
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /create /tn "MasonScreen graper.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\Screen graper.exe'" /sc onlogon /rl HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1464
-
-
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /create /tn "MasonScreen graper.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\Screen graper.exe'" /sc onlogon /rl HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1832 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3720
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Screen graper.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3008 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:232
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Screen graper.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:4140 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:400
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3748
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4104
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4336
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4624
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:2916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:4572
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1584
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:4872
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3988
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
PID:4720
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:8
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4728
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca1⤵PID:3536
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 34cda96121fc08612769bea509a8912b jeBx4p2HikmEgec6TMiamw.0.1.0.0.01⤵
- Sets service image path in registry
PID:1244 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1216
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
PID:1484
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks BIOS information in registry
- Enumerates system info in registry
PID:4904
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:1624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:4568
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:2088
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5f811272c20ff6decbbd16ff364334427
SHA1cb31be66c972daa61d45920fa2fa824c1dfb194d
SHA256730aff8c9e430a9f9e5e44f1c376e57f42fa5adc744824df2f69855009473592
SHA5125c68bf3a41c3607cad5abe94f2bb3816f3e69426fa7d43bf7c9787c4e9ce6660b1843a2e505a22a93d7008b76fc564078513fe9ef47051e5b6fc344ab9d0a528
-
Filesize
21KB
MD55727e3261fc7217aedd89a52e2d3819b
SHA11015343a45938847253b960df254b7d7d091c5d7
SHA256c968585d5a6a9affc666994e97cf8c36015629564096185aaa5d8a34875d0f2d
SHA51297a3d05a69760f8fafad84e2f4d25b0901ddff2c3f75dd9a27d142440eae4cef8fae6923dc1a1f313b332a82390f99c27350b07af0fc6d507b2c6d86d4a0449e
-
Filesize
3.4MB
MD5ee1b1507fadd2b79c5b603b3bb723de7
SHA17680b3815f5d1d4cf87ff85d6675f5891ddef7ff
SHA2568dce11701ff3011f5cd463176c0fd14b32ecc7cedb3faff0cb9670f0fb77b1d7
SHA5124db689cde9977ae06cc54f2c9ac5d090d4929235640e6f8bc73dc5851d318c5030642e4e2e27809b12d8ebdfbea77f0b27e42b878114485518c4b326ad8cf310
-
Filesize
4.3MB
MD5ddb6425342a0f3f10ad15f320e528b94
SHA1edf799990c52f7b56cb5fcf00dbaa38d0b88278d
SHA25616750da2372c396cab7baa949b80cbe5bfce2900849d0006ccd1a423166b8537
SHA512420ca74797ca220b3eadb0e1ed0abf3901e897aff4caec7025fd3050a6c8f2866045992d004227bed8d23a58a214be774768c5f786c87190f5198a98f6c19b52
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
161KB
MD594f1ab3a068f83b32639579ec9c5d025
SHA138f3d5bc5de46feb8de093d11329766b8e2054ae
SHA256879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0
SHA51244d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c
-
Filesize
3KB
MD54838ee953dab2c7a1bf57e0c6620a79d
SHA18c39cd200f9ffa77739ff686036d0449984f1323
SHA25622c798e00c4793749eac39cfb6ea3dd75112fd4453a3706e839038a64504d45d
SHA512066782b16e6e580e2861013c530d22d62c5ba0f217428cc0228ad45b855e979a86d2d04f553f3751cf7d063c6863cb7ea9c86807e7f89c7e0ae12481af65af76
-
Filesize
3KB
MD58e64ab95d5d2c4c1e7a757624cb1fffa
SHA19889f93ad60bacb07683b4a23c40aa32954646d8
SHA256dff8902430dcae2fba05fc7f54157c4bc8a7445ed488c1d5727947a0c07075d6
SHA5123ecc166686c1d7d61e91ec972244118980bf626a88123b87136695ac206e159933ad9f9feb3fd565713dd5d99038f427b845637c51a57497f0ac716de3a7973c
-
Filesize
3KB
MD5c6086d02f8ce044f5fa07a98303dc7eb
SHA16116247e9d098b276b476c9f4c434f55d469129c
SHA2568901d9c9aea465da4ea7aa874610a90b8cf0a71eba0e321cf9675fceee0b54a0
SHA5121876d8fc1a8ac83aadb725100ea7a1791bd62d4d0edc1b78802e0bffe458f309a66dc97e1b9da60dd52b8cb80bf471ccb5f8480e6192c9eb2a13eac36462d27a
-
Filesize
3KB
MD539b9eb9d1a56bc1792c844c425bd1dec
SHA1db5a91082fa14eeb6550cbc994d34ebd95341df9
SHA256acade97e8a1d30477d0dc3fdfea70c2c617c369b56115ec708ed8a2cfdbc3692
SHA512255b1c1c456b20e6e3415540ef8af58e723f965d1fa782da44a6bbc81b43d8a31c5681777ba885f91ed2dae480bc2a4023e01fe2986857b13323f0459520eb51
-
Filesize
2KB
MD5a9124c4c97cba8a07a8204fac1696c8e
SHA11f27d80280e03762c7b16781608786f5a98ff434
SHA2568ad3d28aeff847bc5fb8035cbc7c71e88a4ee547821a8e1a3ea6661ee6014b21
SHA512537caaa75ac1e257c6b247f9680c3b9e79156ea1bcb3f1326e969a774db33b3c906800813ca6f79369c799a62f4260c91c6dd9a6cace3af25b7dbea5a73e0392