Resubmissions
06-12-2024 18:24
241206-w2jhxs1jax 1006-12-2024 18:22
241206-wzy6lawnen 706-12-2024 18:15
241206-wwd19azqas 906-12-2024 18:09
241206-wrmgtszngy 6Analysis
-
max time kernel
110s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 18:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/kh4sh3i/Ransomware-Samples
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/kh4sh3i/Ransomware-Samples
Malware Config
Signatures
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Jigsaw family
-
Renames multiple (741) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 4532 drpbx.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" jigsaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" jigsaw.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 31 raw.githubusercontent.com 55 raw.githubusercontent.com 30 raw.githubusercontent.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\FileExtension.targetsize-336.png drpbx.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.scale-80.png.fun drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionLargeTile.scale-400.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-64_altform-unplated_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosWideTile.contrast-white_scale-200.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-60.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-32_altform-lightunplated.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-36_altform-unplated.png drpbx.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\TelemetryDashboard.xltx.fun drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.contrast-black_scale-80.png drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\Word 2010 look.dotx drpbx.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\InsiderHubLargeTile.scale-125_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\MediumTile.scale-200_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\tinytile.targetsize-24_altform-unplated_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\ExchangeWideTile.scale-150.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-64_altform-unplated_contrast-white.png drpbx.exe File created C:\Program Files\Microsoft Office\root\vreg\onenotemui.msi.16.en-us.vreg.dat.fun drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Consolas-Verdana.xml drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\proof.en-us.msi.16.en-us.boot.tree.dat drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteReplay_white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-GoogleCloudCache.scale-150.png drpbx.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue Green.xml.fun drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-white_scale-100.png drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\osmux.x-none.msi.16.x-none.boot.tree.dat drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-20_altform-unplated_contrast-high.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Images\BlankImage.png drpbx.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\ext\sunpkcs11.jar drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\7734_36x36x32.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptySearch.scale-400.png drpbx.exe File created C:\Program Files\Microsoft Office\root\Office16\Configuration\card_expiration_terms_dict.txt.fun drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-20_altform-unplated_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\InsiderHubSplashWideTile.scale-125_contrast-black.png drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.officemuiset.msi.16.en-us.xml drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ClippingTool.targetsize-64.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-16_altform-unplated_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-72_altform-unplated_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxManifest.xml drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\WorldClockSmallTile.contrast-black_scale-100.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-black_targetsize-96.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Store\LargeTile.scale-400.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageSmallTile.scale-125_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SplashWideTile.scale-100_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-40_altform-unplated.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.contrast-black_scale-200.png drpbx.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\SalesReport.xltx.fun drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-80_altform-unplated_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-72.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\Attribution\weatherdotcom.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\Assets\AppIcon.png drpbx.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad.xml drpbx.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\DMR_120.png drpbx.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwritalm.dat drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AlarmsLargeTile.contrast-black_scale-100.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\StopwatchWideTile.contrast-white_scale-200.png drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.contrast-white_scale-80.png drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.scale-180.png drpbx.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-black_scale-80.png.fun drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\Weather_BadgeLogo.scale-100.png drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNewNoteWideTile.scale-100.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\WorldClockSmallTile.contrast-white_scale-200.png drpbx.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\jfxswt.jar.fun drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\SplashScreen.scale-400.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-20_altform-fullcolor.png drpbx.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133779831191989295" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3928 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4932 chrome.exe 4932 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3928 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4932 chrome.exe 4932 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 3928 vlc.exe 3928 vlc.exe 3928 vlc.exe 3928 vlc.exe 3928 vlc.exe 3928 vlc.exe 3928 vlc.exe 3928 vlc.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 3928 vlc.exe 3928 vlc.exe 3928 vlc.exe 3928 vlc.exe 3928 vlc.exe 3928 vlc.exe 3928 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3928 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4932 wrote to memory of 1952 4932 chrome.exe 83 PID 4932 wrote to memory of 1952 4932 chrome.exe 83 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 2888 4932 chrome.exe 84 PID 4932 wrote to memory of 476 4932 chrome.exe 85 PID 4932 wrote to memory of 476 4932 chrome.exe 85 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86 PID 4932 wrote to memory of 2960 4932 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/kh4sh3i/Ransomware-Samples1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffff0e8cc40,0x7ffff0e8cc4c,0x7ffff0e8cc582⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2004,i,13122260769285777280,1671000734356384110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1992 /prefetch:22⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1864,i,13122260769285777280,1671000734356384110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2204 /prefetch:32⤵PID:476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,13122260769285777280,1671000734356384110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,13122260769285777280,1671000734356384110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,13122260769285777280,1671000734356384110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4432,i,13122260769285777280,1671000734356384110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4632 /prefetch:82⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4916,i,13122260769285777280,1671000734356384110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4340 /prefetch:82⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:704
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2344
-
C:\Users\Admin\Downloads\jigsaw.exe"C:\Users\Admin\Downloads\jigsaw.exe"1⤵
- Adds Run key to start application
PID:3896 -
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\Downloads\jigsaw.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4532
-
-
C:\Users\Admin\Downloads\jigsaw.exe"C:\Users\Admin\Downloads\jigsaw.exe"1⤵
- Adds Run key to start application
PID:1220
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\OptimizeExport.mpe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3928
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Downloads\UnblockEnable.html1⤵PID:4808
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0xf8,0x134,0x7fffd02346f8,0x7fffd0234708,0x7fffd02347182⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,11260808142948716668,256845364118317640,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,11260808142948716668,256845364118317640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,11260808142948716668,256845364118317640,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,11260808142948716668,256845364118317640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,11260808142948716668,256845364118317640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD52773e3dc59472296cb0024ba7715a64e
SHA127d99fbca067f478bb91cdbcb92f13a828b00859
SHA2563ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
SHA5126ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\0fe18321-72cc-4209-ac34-9fea4b5c8a0a.tmp
Filesize10KB
MD516a711dabf2c0ddde98b62b5368b92df
SHA14cf84f0ecd60186c81c44f83f194b373d11e2912
SHA256b5c36d3dc1287af8c56a5256162b5351e58d3ab357c55917745e94903ec91dfe
SHA512f21d1c6d0e1af9c829c27ae4ee012c4d5beb6e909b01f03ec8736d491381ac0743eca2fbff47b3abd33fc545d90526005b809a961121ae239429707186cd3bb8
-
Filesize
649B
MD50a4208cfc5903c41e26401b03cf2b4e8
SHA1f6bc9a520960f9e7937adc4b6eaf690b0c3cb02e
SHA256cd7c179a53e50a73ae2278e97dbd0786f54112c25891dc3e574f5acc0b9b39d2
SHA51288068a6a54cf8850dca7edcdfad987da724c9b2a1aff4e1018dc48c70bb426cb0530f54d1abd3184bd92bfbb3f1b1d1dbcd7d5d23380d6e3110073aaf6b0855e
-
Filesize
2KB
MD5730a8a77629404e79021fcfc2b700405
SHA113b46ad642a46fe1f806f31bdc7ed4316e498de1
SHA256a6c4fdfc30b10f9e9b2944a5bee544006f49f185199d9b55d1c6ce6dd4634fbc
SHA512e9158d985e117c5290c66abf07c9cf8e4cdbece24fec39261d5c2ea77b8ffd635c418faca565d5a3e9bd25bde88b19456b19721bfc64baa39fed366bbf5a08a8
-
Filesize
264KB
MD5e745dd941628fcc8f5564e70d5984186
SHA1f2dd1824d4802f285ccc1ac6656c2bb0a8f4f408
SHA2564ff2faa21f5adbaad051bdfcf9b76e74213b3d876d698cc2e3e1a538ecd6d691
SHA5129c16b6c2fc8a735f53655f1317a1aa0e0c4e5635bfacdbc7dc05a6b487c972fe950683f3504a4e368794e36e6c2017f554780b2947fe0717f91dfcb283eea549
-
Filesize
2KB
MD595c2a7ef801534243a2ded94aed5da62
SHA1da91ab581f3f2fc4f9fda2d1e0c27d62063fd3a5
SHA256de9104a0efb654c42b23ec848b2667352d8c83304bf48fae835cb54db4424ff4
SHA512d0310e7ad45bb07b7a7f5eaa2a86f6c6f0fb1be5a53b048fab1bc9fb68c8812777fb108097c3b75b8a40f101a81f23d87be88645658f01913b88ce7862feda2c
-
Filesize
2KB
MD521a215f22b9cf388fecb565b19c212b2
SHA1826f95282523a3aad895b76a80fca4fd9ed2cbde
SHA256aca271353410e04557a8284dcfd4a8dcf4c57586f2a039886bdc779892b1deb5
SHA51224a061d9050f3d8db3c4cf7157a016ca8c9981e07bf4cdf109ea9aa809e41120eff73b97d6c80b71c5b083d1bc3b197c4103f77742ef1afcdcd823656a3888c4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5d644f214531398087277c346714828ab
SHA1908f363a1c1d155ff417a6b33b6133b8e63bb185
SHA2569d27e9333dd42efa6316cb9e6d4e90bc8645d62d1d98fd4e30b998f6743f90a4
SHA512ff6d84baf782c807dd3cedcdf2228251347b939fe7b9d26da6b890ccd9dc8525c23b87168f0676b072418fe2b58bebf5e8d879431fef015e7819fde3ba4f6f7f
-
Filesize
1KB
MD5834bb51ab142e42ae444461b6184006d
SHA18ab074f9d4dba38bcdce36fddea6e600389e3a5b
SHA25635fac0a786fbf9ec650c7c5f83e84ca42b7d40da34d56896c9dcabcc93f8871b
SHA512b8402d57a63144a2a3a51f57b532c310e497ce6c7893dcf9a46255d4b827c1245f021411362cff956b2cb02f125975d4aebb60c08383b2916b45d1a1ad2c2bf7
-
Filesize
9KB
MD579a370aaef5e6c29a5dfa625453ff06b
SHA13ef6fca46e403b375a7cd94ba794e3696c93d123
SHA256a96b887494d47ada5d57be6ba5a3ab813c5572eded3b1c4bf063e62665af5fcd
SHA512beffa58ca850b72e274fc0caecfea45e720f782ad76963f7fdbb835f990dcebc2005f7d91e7795764eac255bde1e517b293189810971651a619f3f2f7f51e5ee
-
Filesize
9KB
MD5d5ee7d6743c3047597cdc6e96ace533a
SHA1f5bb20d59b4b4e4cfd3c857760e2e5ba19de8120
SHA2569feb55b72b0cf490ed45744dd5310c9b69aa3a98beb6f4e8be1a4b3f5abc7a32
SHA5123ea5f3582a28fa3ff1c04c18ece77a0a819032b0034184d26a8c96eb69f4d7251eb2421f86005103966d09d0023fc00a7325302e40c0183c5bfb8a8ba26c23a3
-
Filesize
10KB
MD53144da8afcbe071e8e5e87fd4fc4c4c3
SHA13c095251a5ed8a0440a6b213155c3062cda3cc2b
SHA2565fd8130e010d9e6bd6ff0b1211defae646386c2cb069c91446437e4f8ba32a79
SHA5124ce8df9a226849434758977178142b42cb98e694b450689938aa82f4e6984815db0d98cabfd147832e74bdde7fdb8f318bd1fa3ade781b22fa7bd9992ddecc6c
-
Filesize
10KB
MD58af2937cf58e6c497e22273e6b17b1a0
SHA14d48d1bffee9faed392a2becac0228b99068270c
SHA256d28f88779fa0cc7eb8583e750b0a590b1eeb5a87d6996fe932b4bf7f7f9a7796
SHA5129905ae293fb6e5d77c3472144ae906aebceb932dfd205ca5f91e24ae731fad39c3ccf3aeafb02964f5c6c36398a6519ee7472b99237efd792f10460c7b24cc1d
-
Filesize
116KB
MD5b9a278e53fbd2fad04d17a81db83d1d3
SHA15e743a74385e2dbe8a54edebe71605536f2328b7
SHA2560bdb1ceed7278137e350263f4e62a85f2cb0696641d25dd51b4166b63e3fb131
SHA512b9d25be97083dd8a04230c6b1ef46838861980d659d634f3f15acc4c45e78b679a593dacf2561de0873de5b6caa9a30faaa5c6182ba7a216fef3e9ceb840f1ec
-
Filesize
116KB
MD5aaf0cd3f875aadbf5ac3bb6310a95283
SHA15dd95c63709a0d1d2555dcce4e647bb8b03d4cc1
SHA25692f446f36da9ed921573053d9c49787428ba6155e42b10d16e788ef842c01d89
SHA512b116032bb486117505ec58713e10c733d821d230d713a746f4ffebc605be5473e8c0836d2c8065c3da48c41226aa9e92da8fda76a3a19b5cd1d77048a36149f7
-
Filesize
116KB
MD57dbd7f97fea6130ff5c7c564b61a7114
SHA1737a598837a0bfc0f479da1845c6ff45c32cabc0
SHA256c9d1345760c8b47f69b5d166ef75661f8a3e44c83fec28a27127422b8c73a342
SHA5120db574b794257afcd74b5176a2162448c57cd2ef0025c8c951b780a261fc6a2469d27518402f5eb06097755eaf5f230219ab0ad218096be73502d32b11e522b6
-
Filesize
430B
MD5de04f2e81c0501dee6d2f449fb6f3885
SHA1761a51e13b7958c5ec2e51de258428eedec0ae51
SHA25692e5dd3c966959c5a39d98226668f5a2745e16db2ebf034eb5ee5d5f160ed8bb
SHA51265e64986ec8b0681d72b7ec9590abe4ed443be492a4085dc4d9a6428e8f2e92d9bf46733f95bdf6de8e9efc97f035ab66d4400e83ac75d359dacecd7870161a8
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
5KB
MD5071f2dd33198557eededc54cee62fba5
SHA19822191e3412720dd508c9176bd32f739e3eba94
SHA256eb9da493d08e91ee9553cb02feb78ab0e443f4389179cbc2fcda04dee6aa99a5
SHA51299fc66931988a5f9fba4a416cd8f054efd68bd399625e6ed03a4cbc444f9b44a894df8f18a89145f45be3d14a51c91eb963b5930942e8f86d0bf1c226b0d2cf5
-
Filesize
16B
MD58ebcc5ca5ac09a09376801ecdd6f3792
SHA181187142b138e0245d5d0bc511f7c46c30df3e14
SHA256619e246fc0ac11320ff9e322a979948d949494b0c18217f4d794e1b398818880
SHA512cec50bfc6ad2f57f16da99459f40f2d424c6d5691685fa1053284f46c8c8c8a975d7bcb1f3521c4f3fbdc310cf4714e29404aa23be6021e2e267c97b090dc650
-
Filesize
239KB
MD53ad6374a3558149d09d74e6af72344e3
SHA1e7be9f22578027fc0b6ddb94c09b245ee8ce1620
SHA25686a391fe7a237f4f17846c53d71e45820411d1a9a6e0c16f22a11ebc491ff9ff
SHA51221c21b36be200a195bfa648e228c64e52262b06d19d294446b8a544ff1d81f81eb2af74ddbdebc59915168db5dba76d0f0585e83471801d9ee37e59af0620720