Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2022, 03:21
Behavioral task
behavioral1
Sample
056fdf28489513f08b431e51f7529852dfd2afc293f3ba0eef25f21c7befb77a.exe
Resource
win10v2004-20220812-en
General
-
Target
056fdf28489513f08b431e51f7529852dfd2afc293f3ba0eef25f21c7befb77a.exe
-
Size
1.3MB
-
MD5
4aeb8091bab32d106fb1382e16bfd583
-
SHA1
46b2e8b399e99213af909c1eae8a40f8325157af
-
SHA256
056fdf28489513f08b431e51f7529852dfd2afc293f3ba0eef25f21c7befb77a
-
SHA512
d183973ce0aef8d7aef95c0cab4f478071c116d178546892340ce9ea3006c997ac6f3ac82147bfda449cea21f2a8056db5ef4c205d7561b5ccb1bfe8a4fa4d05
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 27 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1008 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1064 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3160 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3396 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1136 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 976 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3268 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2244 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1188 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4420 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 112 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 224 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 220 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2112 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 700 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4192 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4336 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3408 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3564 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3376 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3496 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3096 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4412 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3116 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4588 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5068 3756 schtasks.exe 66 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 560 3756 schtasks.exe 66 -
resource yara_rule behavioral1/files/0x000300000001e64d-137.dat dcrat behavioral1/files/0x000300000001e64d-138.dat dcrat behavioral1/memory/4068-139-0x0000000000550000-0x0000000000660000-memory.dmp dcrat behavioral1/files/0x0006000000022e1d-153.dat dcrat behavioral1/files/0x0006000000022e1d-154.dat dcrat behavioral1/files/0x0006000000022e1d-192.dat dcrat behavioral1/files/0x0006000000022e1d-200.dat dcrat behavioral1/files/0x0006000000022e1d-207.dat dcrat behavioral1/files/0x0006000000022e1d-214.dat dcrat behavioral1/files/0x0006000000022e1d-221.dat dcrat behavioral1/files/0x0006000000022e1d-228.dat dcrat behavioral1/files/0x0006000000022e1d-235.dat dcrat behavioral1/files/0x0006000000022e1d-242.dat dcrat behavioral1/files/0x0006000000022e1d-249.dat dcrat behavioral1/files/0x0006000000022e1d-256.dat dcrat -
Executes dropped EXE 12 IoCs
pid Process 4068 DllCommonsvc.exe 3936 csrss.exe 2588 csrss.exe 4052 csrss.exe 4692 csrss.exe 5064 csrss.exe 4520 csrss.exe 1284 csrss.exe 2400 csrss.exe 3268 csrss.exe 4612 csrss.exe 3316 csrss.exe -
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 056fdf28489513f08b431e51f7529852dfd2afc293f3ba0eef25f21c7befb77a.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\Windows Mail\RuntimeBroker.exe DllCommonsvc.exe File created C:\Program Files\Windows Mail\9e8d7a4ca61bd9 DllCommonsvc.exe File created C:\Program Files\Windows Multimedia Platform\cmd.exe DllCommonsvc.exe File created C:\Program Files\Windows Multimedia Platform\ebf1f9fa8afd6d DllCommonsvc.exe File created C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Multimedia Platform\886983d96e3d3e DllCommonsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\PLA\System\DllCommonsvc.exe DllCommonsvc.exe File created C:\Windows\PLA\System\a76d7bf15d8370 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 27 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 224 schtasks.exe 2112 schtasks.exe 560 schtasks.exe 976 schtasks.exe 4420 schtasks.exe 700 schtasks.exe 3160 schtasks.exe 4588 schtasks.exe 3496 schtasks.exe 1064 schtasks.exe 1136 schtasks.exe 1008 schtasks.exe 3376 schtasks.exe 3096 schtasks.exe 3408 schtasks.exe 220 schtasks.exe 4412 schtasks.exe 3116 schtasks.exe 3268 schtasks.exe 3396 schtasks.exe 2244 schtasks.exe 112 schtasks.exe 4336 schtasks.exe 3564 schtasks.exe 5068 schtasks.exe 4192 schtasks.exe 1188 schtasks.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 056fdf28489513f08b431e51f7529852dfd2afc293f3ba0eef25f21c7befb77a.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings csrss.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 4068 DllCommonsvc.exe 1088 powershell.exe 1088 powershell.exe 2592 powershell.exe 2592 powershell.exe 2152 powershell.exe 2152 powershell.exe 1956 powershell.exe 1956 powershell.exe 3368 powershell.exe 3368 powershell.exe 1404 powershell.exe 1404 powershell.exe 2300 powershell.exe 2300 powershell.exe 4196 powershell.exe 4196 powershell.exe 984 powershell.exe 984 powershell.exe 1328 powershell.exe 1328 powershell.exe 3936 csrss.exe 3936 csrss.exe 1088 powershell.exe 3368 powershell.exe 1956 powershell.exe 2592 powershell.exe 1404 powershell.exe 2152 powershell.exe 2300 powershell.exe 984 powershell.exe 1328 powershell.exe 4196 powershell.exe 2588 csrss.exe 4052 csrss.exe 4692 csrss.exe 5064 csrss.exe 4520 csrss.exe 1284 csrss.exe 2400 csrss.exe 3268 csrss.exe 4612 csrss.exe 3316 csrss.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 4068 DllCommonsvc.exe Token: SeDebugPrivilege 1088 powershell.exe Token: SeDebugPrivilege 2592 powershell.exe Token: SeDebugPrivilege 2152 powershell.exe Token: SeDebugPrivilege 1956 powershell.exe Token: SeDebugPrivilege 3368 powershell.exe Token: SeDebugPrivilege 1404 powershell.exe Token: SeDebugPrivilege 2300 powershell.exe Token: SeDebugPrivilege 4196 powershell.exe Token: SeDebugPrivilege 984 powershell.exe Token: SeDebugPrivilege 1328 powershell.exe Token: SeDebugPrivilege 3936 csrss.exe Token: SeDebugPrivilege 2588 csrss.exe Token: SeDebugPrivilege 4052 csrss.exe Token: SeDebugPrivilege 4692 csrss.exe Token: SeDebugPrivilege 5064 csrss.exe Token: SeDebugPrivilege 4520 csrss.exe Token: SeDebugPrivilege 1284 csrss.exe Token: SeDebugPrivilege 2400 csrss.exe Token: SeDebugPrivilege 3268 csrss.exe Token: SeDebugPrivilege 4612 csrss.exe Token: SeDebugPrivilege 3316 csrss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 1788 1644 056fdf28489513f08b431e51f7529852dfd2afc293f3ba0eef25f21c7befb77a.exe 80 PID 1644 wrote to memory of 1788 1644 056fdf28489513f08b431e51f7529852dfd2afc293f3ba0eef25f21c7befb77a.exe 80 PID 1644 wrote to memory of 1788 1644 056fdf28489513f08b431e51f7529852dfd2afc293f3ba0eef25f21c7befb77a.exe 80 PID 1788 wrote to memory of 5088 1788 WScript.exe 84 PID 1788 wrote to memory of 5088 1788 WScript.exe 84 PID 1788 wrote to memory of 5088 1788 WScript.exe 84 PID 5088 wrote to memory of 4068 5088 cmd.exe 86 PID 5088 wrote to memory of 4068 5088 cmd.exe 86 PID 4068 wrote to memory of 1404 4068 DllCommonsvc.exe 114 PID 4068 wrote to memory of 1404 4068 DllCommonsvc.exe 114 PID 4068 wrote to memory of 1088 4068 DllCommonsvc.exe 115 PID 4068 wrote to memory of 1088 4068 DllCommonsvc.exe 115 PID 4068 wrote to memory of 2592 4068 DllCommonsvc.exe 121 PID 4068 wrote to memory of 2592 4068 DllCommonsvc.exe 121 PID 4068 wrote to memory of 2152 4068 DllCommonsvc.exe 117 PID 4068 wrote to memory of 2152 4068 DllCommonsvc.exe 117 PID 4068 wrote to memory of 3368 4068 DllCommonsvc.exe 118 PID 4068 wrote to memory of 3368 4068 DllCommonsvc.exe 118 PID 4068 wrote to memory of 1956 4068 DllCommonsvc.exe 123 PID 4068 wrote to memory of 1956 4068 DllCommonsvc.exe 123 PID 4068 wrote to memory of 2300 4068 DllCommonsvc.exe 124 PID 4068 wrote to memory of 2300 4068 DllCommonsvc.exe 124 PID 4068 wrote to memory of 4196 4068 DllCommonsvc.exe 126 PID 4068 wrote to memory of 4196 4068 DllCommonsvc.exe 126 PID 4068 wrote to memory of 1328 4068 DllCommonsvc.exe 128 PID 4068 wrote to memory of 1328 4068 DllCommonsvc.exe 128 PID 4068 wrote to memory of 984 4068 DllCommonsvc.exe 129 PID 4068 wrote to memory of 984 4068 DllCommonsvc.exe 129 PID 4068 wrote to memory of 3936 4068 DllCommonsvc.exe 135 PID 4068 wrote to memory of 3936 4068 DllCommonsvc.exe 135 PID 3936 wrote to memory of 1296 3936 csrss.exe 139 PID 3936 wrote to memory of 1296 3936 csrss.exe 139 PID 1296 wrote to memory of 2104 1296 cmd.exe 140 PID 1296 wrote to memory of 2104 1296 cmd.exe 140 PID 1296 wrote to memory of 2588 1296 cmd.exe 141 PID 1296 wrote to memory of 2588 1296 cmd.exe 141 PID 2588 wrote to memory of 2708 2588 csrss.exe 143 PID 2588 wrote to memory of 2708 2588 csrss.exe 143 PID 2708 wrote to memory of 3316 2708 cmd.exe 145 PID 2708 wrote to memory of 3316 2708 cmd.exe 145 PID 2708 wrote to memory of 4052 2708 cmd.exe 146 PID 2708 wrote to memory of 4052 2708 cmd.exe 146 PID 4052 wrote to memory of 3124 4052 csrss.exe 147 PID 4052 wrote to memory of 3124 4052 csrss.exe 147 PID 3124 wrote to memory of 4136 3124 cmd.exe 149 PID 3124 wrote to memory of 4136 3124 cmd.exe 149 PID 3124 wrote to memory of 4692 3124 cmd.exe 150 PID 3124 wrote to memory of 4692 3124 cmd.exe 150 PID 4692 wrote to memory of 2592 4692 csrss.exe 151 PID 4692 wrote to memory of 2592 4692 csrss.exe 151 PID 2592 wrote to memory of 1468 2592 cmd.exe 153 PID 2592 wrote to memory of 1468 2592 cmd.exe 153 PID 2592 wrote to memory of 5064 2592 cmd.exe 154 PID 2592 wrote to memory of 5064 2592 cmd.exe 154 PID 5064 wrote to memory of 748 5064 csrss.exe 155 PID 5064 wrote to memory of 748 5064 csrss.exe 155 PID 748 wrote to memory of 388 748 cmd.exe 157 PID 748 wrote to memory of 388 748 cmd.exe 157 PID 748 wrote to memory of 4520 748 cmd.exe 158 PID 748 wrote to memory of 4520 748 cmd.exe 158 PID 4520 wrote to memory of 4360 4520 csrss.exe 159 PID 4520 wrote to memory of 4360 4520 csrss.exe 159 PID 4360 wrote to memory of 1492 4360 cmd.exe 161 PID 4360 wrote to memory of 1492 4360 cmd.exe 161
Processes
-
C:\Users\Admin\AppData\Local\Temp\056fdf28489513f08b431e51f7529852dfd2afc293f3ba0eef25f21c7befb77a.exe"C:\Users\Admin\AppData\Local\Temp\056fdf28489513f08b431e51f7529852dfd2afc293f3ba0eef25f21c7befb77a.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\upfc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Mail\RuntimeBroker.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Multimedia Platform\cmd.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\RuntimeBroker.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Videos\sppsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4196
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\DllCommonsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PLA\System\DllCommonsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZfR0hqQ1j6.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:2104
-
-
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NiQtqM3qVs.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:3316
-
-
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"9⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tA3KztjMoN.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:4136
-
-
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"11⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\DegeIw2hse.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:1468
-
-
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"13⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4vYRXbn8bW.bat"14⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:388
-
-
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"15⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bbT3NvUu3s.bat"16⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:1492
-
-
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"17⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1284 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2zXOrWkEHk.bat"18⤵PID:64
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:2788
-
-
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"19⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LdHmevWlG3.bat"20⤵PID:4928
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:2168
-
-
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"21⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3268 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xAFUrPKKMy.bat"22⤵PID:2216
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:944
-
-
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"23⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4612 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mMyBvdYgq2.bat"24⤵PID:332
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:2448
-
-
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"25⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3316 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\MpmmxgpAh8.bat"26⤵PID:1992
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:1536
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\odt\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 7 /tr "'C:\odt\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\odt\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Mail\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Mail\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Multimedia Platform\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Multimedia Platform\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Videos\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Admin\Videos\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Videos\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 14 /tr "'C:\odt\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\odt\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 9 /tr "'C:\odt\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 13 /tr "'C:\Windows\PLA\System\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Windows\PLA\System\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 5 /tr "'C:\Windows\PLA\System\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:560
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
Filesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
Filesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
Filesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
Filesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
944B
MD517fbfbe3f04595e251287a6bfcdc35de
SHA1b576aabfd5e6d5799d487011506ed1ae70688987
SHA2562e61ae727ca01496c9418a65777d6d7e05a85cbdb6b3a19516857442e5bd2da0
SHA512449c68512d90a17f598e9dacfd6230e6e97bc6bfaaf2b06f3b91b370ece92e2322b81ee3721e288880fa1f05470156e519256e3f03d786c3b28a39788f5e0ad6
-
Filesize
225B
MD5dbbf81598fb85132b7f5f590548839d1
SHA1b82ec6f2c65f098e2082748e2bd9b06bec828145
SHA2566308f3a4c7c17d43dcc82388e3017c918929a855702063f7d3cc8e1335c1d1d2
SHA512270e4240fd34f60c01433baf8627bedb46d8d205f0284585066dda6c27ed1163f069b5cd5ced4c64456865510160892a9687a303738790877a35b29f4b1332c1
-
Filesize
225B
MD5c55d4ebddf0928ff70ae649d1adaa90f
SHA129ad0a46f15870bfdea225eb4c76fac64b4302f4
SHA2563d0c9a308418140f4fb385d56158657ab6beb1a4f226d9476b9119f18050a18c
SHA512bf663d7063bdf77f008e34f99601591875a706c528e1d838357d65f58fe2c5658887848f6e8b0f54b4f40d244388307eaaa1ee33d2e76cca09dfa7dbb594b152
-
Filesize
225B
MD55c76959a171f5ff6e5cefded5cc8762c
SHA126c66aa35412f77f84ef091c30e4f6d52ef06236
SHA2560ef6281f3ddbc38c70bcbfd221cc2eed438764c9a569b40515bd73af0621e917
SHA512d04e8745ba91b8f3651fdb43ef04bb7a5befd859d2849afbd227a8f75228e6859a4c9ba6bb7cf39d3fbbc6ce582b646d5892b3a5ae8f379359ba75ba8cdda362
-
Filesize
225B
MD55d08ca4f906d2a85e3ddb904bd352c48
SHA16a2f6791d1195b8cb66f98450a5688d5985756ad
SHA2566075448f07ae2a9d81dec913ae3c21a0be15773def6abc64aec2781a916c70b4
SHA51283e9786f46cfda02f1d75a1f8852ef5aeb8784db8c9844160619c7626abcfde06722666dce930992d2a24d7e1e8382729d91e363013cb14fd0edcf766f02fbcc
-
Filesize
225B
MD5de112bec2042cb30418fc4b263d31125
SHA1dc9ac63abec598f71150ff946bd7d6fa376ae6af
SHA2564b2fec55a0016524c9e6685c53ccf0007f2249a7fa5df25c7467955ed2754f2c
SHA512de7ba4b62969893198c893eb24490fbb0dbcb447ef98bc04721d2d7fc263a29dc83ff2e54b1d09f64490c098410fdf413c20070f2f6b1e23da6f730029ccffb8
-
Filesize
225B
MD593538549778b1ce47079ca277e8901d4
SHA161331633db9aa3056585b6093a8125638065e4e0
SHA256c81dbe95ca3700ae3681aa96ba1329d9d00b479b285ac3cb6043915ae8544f88
SHA5129b8e89d93c540297bdd87ca69404e9a3d43595cef24c2efa5331d25e688acb55e9202b9e44a1835d7ed7703556479907bd397b9c062ee16c6475798be1125884
-
Filesize
225B
MD5e573b68b32d6c6fc32134216a2259ee7
SHA1cdf8fd7355dddcb1c713e5f3bda9ea1b2baa154f
SHA2564ed4f65f29263a86d0c1a7c44dab54aba7c84d7f62ad1051440be9e72552d45d
SHA512d5a35ed132814d10196b56861ac7b2477e08d14cb74dbe7776080fe3e1be6e8540fdb22c0dab10bfef33e519c71de61b77c808d3d076f4f8e0b2db6981ce5073
-
Filesize
225B
MD511c46310b57ec3ee502c060ab28f1c59
SHA11c2741dd92f3294beadd3347ecef6badf3c5ebec
SHA256e8d9c9575d90ac6dfa5e571974c611976e2c3364d41e4ed1c7277a5626cdfb8b
SHA512015186fb574ef0eb888cd822f3776379c0408b465366c77ff31c46647b814ed842788be008b2514a11da80633484676f5620a624cc9380dfe7965ac7b1a159c0
-
Filesize
225B
MD5144434518c667c9cb93b29d30c593afb
SHA16a3677e77986a1b1a33766ceb1571d24fae20079
SHA2564ae2bba2b0d19d29e178193cb0abbcc9602c0cf0fc2154fc84bdd37de1acc3c0
SHA512bdb0395ab65535fc354b0a0f6398cb8a4a972c2564554b2cf3c60b0180a7b720488b23f410eb9cbead019d5fffac5701effe749d2ac5f73b18614cf6c9754801
-
Filesize
225B
MD5ac79887300bf5263b5b4f008e9e82589
SHA1243ff3f5b0aa6cd2f18ef8d17e9fa111bb5dd6c7
SHA2569954680443528db858ad08cc334582c288bc92eb2704230a0af68f87dc615c69
SHA512a35df495a787bf1f1acadc4e77bb684c0f304412422c3887815b7f36afa4e9e598cdb067ac14046cc93b4e4c591aa655028df5ae38e23f0e38a15363359dffc0
-
Filesize
225B
MD52fb030da8b245f03bbe7d3a2c8e919a7
SHA13ed7bc958e1eae43a487588878c687e0f280cfa7
SHA256a1752213263f976c7a949c14b1f568a83c649c0e0f87c529499338a84864b7a6
SHA5122e2aaf306395fd35c3cca27503d6d394458a4bb0bc551a9cf0e78ab2054d5131878d215d5d20e61f075e066cf676afbd7626861e85c3910696b63bea15d2fc47
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478