Analysis
-
max time kernel
92s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 23:22
Behavioral task
behavioral1
Sample
6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe
Resource
win10v2004-20241007-en
General
-
Target
6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe
-
Size
2.6MB
-
MD5
0163b78fa3d6908eb367abed8f3e9e94
-
SHA1
240609d82a62a8017ad3d81ac4271cd7606b5573
-
SHA256
6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773
-
SHA512
f0258f74d10b9d1f3cfab6c36afe7e411b9c3cea7641529b5fc3e62706787c9685b6dfccf3fdde708102b43f517a734572da77407f9f4f1d94754fdec1554748
-
SSDEEP
49152:Z35SQwOGHHy3Gv6KelFCGDZPU542T5eYfn4jmnHwDKni5JsJ:ZpSQEHIKqFCGDZs54+5eYfnCMQ+i5Ja
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 51 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3060 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4424 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4520 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1884 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 664 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 884 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3536 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3608 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4344 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2460 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 876 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1700 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3392 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3472 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4856 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3216 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2120 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 760 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2060 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 544 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2780 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4368 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2400 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2832 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4508 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4360 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 840 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2724 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3544 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1980 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 896 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1804 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4060 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 524 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4544 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 860 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4916 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1304 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1448 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3612 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2532 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4016 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4436 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3356 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4176 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3144 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1648 3960 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1752 3960 schtasks.exe 82 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe -
resource yara_rule behavioral2/memory/1620-1-0x00000000007F0000-0x0000000000A98000-memory.dmp dcrat behavioral2/files/0x000a000000023b9a-29.dat dcrat behavioral2/files/0x000c000000023bab-207.dat dcrat behavioral2/files/0x000f000000023c2d-268.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe -
Executes dropped EXE 1 IoCs
pid Process 2964 dllhost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe -
Drops file in Program Files directory 45 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\RCX7CB3.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\RCX7F35.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\System.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\RCX897F.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Internet Explorer\RCX8DD8.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files\Reference Assemblies\121e5b5079f7c0 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files\Internet Explorer\e6c9b481da804f 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Reference Assemblies\RCX7A7F.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Google\Chrome\RCX72F6.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Java\dllhost.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\RCX7F36.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files\Google\Chrome\5b884080fd4f94 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files\Java\dllhost.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files\Windows Defender\27d1bcfc3c54e0 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Reference Assemblies\RCX7A7E.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\RCX8901.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Internet Explorer\OfficeClickToRun.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Windows Multimedia Platform\RCX8FEC.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\RuntimeBroker.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\62a6f6c287429c 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files (x86)\Windows NT\Accessories\9e8d7a4ca61bd9 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Java\RCX75B7.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Internet Explorer\RCX8DC7.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files\Java\5940a34987c991 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files\Windows Multimedia Platform\27d1bcfc3c54e0 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Java\RCX75C7.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files\Windows Defender\System.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files\Internet Explorer\OfficeClickToRun.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Google\Chrome\RCX7306.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files (x86)\Windows NT\Accessories\RuntimeBroker.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Google\Chrome\fontdrvhost.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Windows Defender\System.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Windows Multimedia Platform\System.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\System.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\27d1bcfc3c54e0 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files\Windows Multimedia Platform\System.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Windows Defender\RCX7CA2.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Windows Multimedia Platform\RCX8FED.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\RCX9202.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\RCX9203.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files\Google\Chrome\fontdrvhost.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files\Reference Assemblies\sysmon.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\Reference Assemblies\sysmon.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\Branding\shellbrd\StartMenuExperienceHost.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Windows\WaaS\lsass.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\Branding\shellbrd\RCX7859.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\Branding\shellbrd\RCX7869.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Windows\appcompat\encapsulation\dwm.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Windows\appcompat\encapsulation\6cb0b6c459d5d3 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\appcompat\encapsulation\RCX866E.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\appcompat\encapsulation\RCX866F.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\appcompat\encapsulation\dwm.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Windows\Branding\shellbrd\StartMenuExperienceHost.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Windows\Branding\shellbrd\55b276f4edf653 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Windows\LanguageOverlayCache\csrss.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 51 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4060 schtasks.exe 1448 schtasks.exe 1884 schtasks.exe 3536 schtasks.exe 876 schtasks.exe 3392 schtasks.exe 2780 schtasks.exe 2400 schtasks.exe 2532 schtasks.exe 3356 schtasks.exe 4176 schtasks.exe 2460 schtasks.exe 1700 schtasks.exe 524 schtasks.exe 3060 schtasks.exe 4856 schtasks.exe 4508 schtasks.exe 4360 schtasks.exe 1648 schtasks.exe 4544 schtasks.exe 4520 schtasks.exe 664 schtasks.exe 760 schtasks.exe 2832 schtasks.exe 3544 schtasks.exe 1980 schtasks.exe 3612 schtasks.exe 2300 schtasks.exe 4344 schtasks.exe 3216 schtasks.exe 2120 schtasks.exe 544 schtasks.exe 1804 schtasks.exe 860 schtasks.exe 2060 schtasks.exe 4368 schtasks.exe 840 schtasks.exe 1328 schtasks.exe 3144 schtasks.exe 4424 schtasks.exe 884 schtasks.exe 2724 schtasks.exe 4916 schtasks.exe 1304 schtasks.exe 4436 schtasks.exe 3608 schtasks.exe 3472 schtasks.exe 896 schtasks.exe 2760 schtasks.exe 4016 schtasks.exe 1752 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 2964 dllhost.exe 2964 dllhost.exe 2964 dllhost.exe 2964 dllhost.exe 2964 dllhost.exe 2964 dllhost.exe 2964 dllhost.exe 2964 dllhost.exe 2964 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2964 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Token: SeDebugPrivilege 2964 dllhost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1620 wrote to memory of 4080 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 140 PID 1620 wrote to memory of 4080 1620 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 140 PID 4080 wrote to memory of 1980 4080 cmd.exe 142 PID 4080 wrote to memory of 1980 4080 cmd.exe 142 PID 4080 wrote to memory of 2964 4080 cmd.exe 143 PID 4080 wrote to memory of 2964 4080 cmd.exe 143 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe"C:\Users\Admin\AppData\Local\Temp\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1620 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Dn8Em9rir7.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1980
-
-
C:\Program Files\Java\dllhost.exe"C:\Program Files\Java\dllhost.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2964
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\USOShared\Logs\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\All Users\USOShared\Logs\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\USOShared\Logs\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\WindowsHolographicDevices\SpatialStore\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\All Users\WindowsHolographicDevices\SpatialStore\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\WindowsHolographicDevices\SpatialStore\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Program Files\Google\Chrome\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Program Files\Google\Chrome\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files\Java\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Java\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Java\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 7 /tr "'C:\Windows\Branding\shellbrd\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Windows\Branding\shellbrd\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 14 /tr "'C:\Windows\Branding\shellbrd\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 13 /tr "'C:\Program Files\Reference Assemblies\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 5 /tr "'C:\Program Files\Reference Assemblies\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Defender\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Defender\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Music\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Public\Music\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Music\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Windows\appcompat\encapsulation\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\appcompat\encapsulation\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Windows\appcompat\encapsulation\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e817736" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e817736" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 5 /tr "'C:\Program Files\Internet Explorer\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Program Files\Internet Explorer\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Multimedia Platform\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Multimedia Platform\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows NT\Accessories\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows NT\Accessories\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1752
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Windows NT\Accessories\en-US\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe
Filesize2.6MB
MD5cc4c90509327b695641a128f8c0f622c
SHA11d82a9ff9807e9885e64de67f2a047ecac04d7a6
SHA256645979be7cffb1f266a7dabf604c38bc878e5241d4fb82830595d8fbb9efc6b0
SHA512eda88da0d1483dcffa418edcb2a045b96b4e1667a9cdd95b3164f1e2ffe957758d93eade4d90a58441cd7b99b51be62c40479127d84f34bfa73d0a429f967c51
-
Filesize
2.6MB
MD50163b78fa3d6908eb367abed8f3e9e94
SHA1240609d82a62a8017ad3d81ac4271cd7606b5573
SHA2566a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773
SHA512f0258f74d10b9d1f3cfab6c36afe7e411b9c3cea7641529b5fc3e62706787c9685b6dfccf3fdde708102b43f517a734572da77407f9f4f1d94754fdec1554748
-
Filesize
2.6MB
MD5c48a32fe9ab79809fd6921ec76072980
SHA1974d3211e7e6b8a51025eab1a172d07068c8c8c4
SHA25662e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960
SHA512385d9cbf1604a9ffa12b762b80f23f5a47517c8f2522c745af3ce2121da72fbc37b1dd88e5ba4733dbbaefd4fdbc823b5d9ed07b3584bba75e22b0445e85584f
-
Filesize
198B
MD5128acdf112a2688737267c9aa03f442f
SHA1977c18dda26a4138ab4fa6375d89680215e2f9d1
SHA256b45eb86620c5aea083daa09722430b735131a9f78f32ab13f896d13ae11e806b
SHA51268d5399ddaf1bb56ca1d71375f8b6dbe5ddfd296ab19eff4b37f6df216677c3e2b2e237cd7384650de83ca015b129e007e1b3a877264b7be55a76c645c1396b4