Analysis
-
max time kernel
42s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 22:20
Static task
static1
Behavioral task
behavioral1
Sample
adobe-air-51-1-1-3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
adobe-air-51-1-1-3.exe
Resource
win10v2004-20241007-en
General
-
Target
adobe-air-51-1-1-3.exe
-
Size
5.9MB
-
MD5
34dba7939065022ad74458acbae28abd
-
SHA1
5f4e6e7cc0f2970068ff1c05189a8dc6881b8d33
-
SHA256
da506fa70f7953e840f3eba28faf557a2038e0b3d0a5105a0ebe3434ee5e9e61
-
SHA512
6271f67b486c7273fd391e4379f987fcce3042947909e97d05290d04469588a94bd501685f686037a400b788d6693e73f7d7799069c772b80da9556322c6cc79
-
SSDEEP
98304:FOB7drLD5C522D5K6O6DWT9dCrVodEdhIW5LkrNcBByeTTC3qdqH2pjin6uYRjUI:gB7drxU22DJVAbAeOIyBBNiKqMbZUI
Malware Config
Signatures
-
Panda Stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x000400000001c9ee-4372.dat family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Pandastealer family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 85 3084 msiexec.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Drops file in Program Files directory 28 IoCs
description ioc Process File created \??\c:\Program Files (x86)\Common Files\Adobe AIR\sentinel msiexec.exe File created \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe msiexec.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\digest.s msiexec.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe msiexec.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe msiexec.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe msiexec.exe File created \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Resources\Adobe Root Certificate.cer msiexec.exe File created \??\c:\Program Files (x86)\Adobe\Flash Player\AddIns\airappinstaller\digest.s msiexec.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe Root Certificate.cer msiexec.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\setup.msi adobe air installer.exe File created \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.swf msiexec.exe File created \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Resources\template.exe msiexec.exe File created \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Resources\setup.swf msiexec.exe File created \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Resources\stylesNative.swf msiexec.exe File created \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Resources\Thawte Root Certificate.cer msiexec.exe File created \??\c:\Program Files (x86)\Adobe\Flash Player\AddIns\airappinstaller\airappinstaller.exe msiexec.exe File created \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Resources\digest.s msiexec.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\setup.swf msiexec.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR.dll msiexec.exe File created \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Resources\airappinstaller.exe msiexec.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Thawte Root Certificate.cer msiexec.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\NPSWF32.dll msiexec.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.swf msiexec.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Adobe AIR\sentinel msiexec.exe File created \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR.dll msiexec.exe File created \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Resources\template.msi msiexec.exe File created \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Resources\Adobe AIR Updater.exe msiexec.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\WebKit.dll msiexec.exe -
Drops file in Windows directory 18 IoCs
description ioc Process File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\8663020007180A44EB446B23AFD487F0\1.0.8 msiexec.exe File opened for modification C:\Windows\Installer\MSI5F27.tmp msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\8663020007180A44EB446B23AFD487F0\1.0.8\AdobeAIR.dll msiexec.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\8663020007180A44EB446B23AFD487F0\1.0.8\AdobeAIR.dll msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\8663020007180A44EB446B23AFD487F0\1.0.8\air.swf msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\8663020007180A44EB446B23AFD487F0\1.0.8\air.exe msiexec.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\8663020007180A44EB446B23AFD487F0\CacheSize.txt msiexec.exe File created \??\c:\Windows\Installer\f775c85.ipi msiexec.exe File opened for modification \??\c:\Windows\Installer\ msiexec.exe File opened for modification \??\c:\Windows\Installer\f775c85.ipi msiexec.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\8663020007180A44EB446B23AFD487F0 msiexec.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\8663020007180A44EB446B23AFD487F0\1.0.8\air.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI60DD.tmp msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\8663020007180A44EB446B23AFD487F0\CacheSize.txt msiexec.exe File created \??\c:\Windows\Installer\f775c82.msi msiexec.exe File opened for modification \??\c:\Windows\Installer\f775c82.msi msiexec.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\8663020007180A44EB446B23AFD487F0\1.0.8\air.swf msiexec.exe File created \??\c:\Windows\Installer\f775c8b.msi msiexec.exe -
Executes dropped EXE 2 IoCs
pid Process 2924 Adobe AIR Installer.exe 1356 adobe air installer.exe -
Loads dropped DLL 7 IoCs
pid Process 2828 adobe-air-51-1-1-3.exe 2828 adobe-air-51-1-1-3.exe 2828 adobe-air-51-1-1-3.exe 2828 adobe-air-51-1-1-3.exe 2924 Adobe AIR Installer.exe 2924 Adobe AIR Installer.exe 1356 adobe air installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobe-air-51-1-1-3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adobe AIR Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobe air installer.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz adobe air installer.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Adobe AIR Installer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Adobe AIR Installer.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 adobe air installer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_OBJECT Adobe AIR Installer.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_OBJECT\Adobe AIR Installer.exe = "1" Adobe AIR Installer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT Adobe AIR Installer.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT\Adobe AIR Installer.exe = "1" Adobe AIR Installer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Adobe AIR Installer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_IMG Adobe AIR Installer.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_IMG\Adobe AIR Installer.exe = "1" Adobe AIR Installer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION Adobe AIR Installer.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Adobe AIR Installer.exe = "32767" Adobe AIR Installer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main Adobe AIR Installer.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2F msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\SourceList\Media\1 = ";" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8663020007180A44EB446B23AFD487F0\SourceList\Media msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8663020007180A44EB446B23AFD487F0\SourceList msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\.air msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AIR.InstallerPackage\DefaultIcon\ = "c:\\PROGRA~2\\COMMON~1\\ADOBEA~1\\Versions\\1.0\\ADOBEA~1.EXE,1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\ProductName = "Adobe AIR" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\SourceList msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\8663020007180A44EB446B23AFD487F0 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AIR.InstallerPackage\shell\open\command\ = "c:\\PROGRA~2\\COMMON~1\\ADOBEA~1\\Versions\\1.0\\ADOBEA~1.EXE \"%1\"" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.air\OpenWithProgids\AIR.InstallerPackage msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\5D029AD8C14C0E24FB1378AB9489E44E\EE6F249802136F443B6919B0C761E42A msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\AIR.InstallerPackage\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.air\Content Type = "application/vnd.adobe.air-application-installer-package+zip" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AIR.InstallerPackage\ = "Installer Package" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\PackageCode = "BBD26563A231C6047BF676630876766C" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\5D029AD8C14C0E24FB1378AB9489E44E msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\SourceList\Net msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AIR.InstallerPackage\shell\open\ = "Install" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.air\ = "AIR.InstallerPackage" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8663020007180A44EB446B23AFD487F0 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\EE6F249802136F443B6919B0C761E42A\Runtime msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\EE6F249802136F443B6919B0C761E42A\Management msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\SourceList\PackageName = "setup.msi" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\AIR.InstallerPackage\shell\open msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\EE6F249802136F443B6919B0C761E42A msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\SourceList\Net\1 = "c:\\users\\admin\\appdata\\local\\temp\\airf1fd.tmp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\AIR.InstallerPackage\DefaultIcon msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.air\OpenWithProgids msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\SourceList\LastUsedSource = "n;1;c:\\users\\admin\\appdata\\local\\temp\\airf1fd.tmp\\" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8663020007180A44EB446B23AFD487F0\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\AIR.InstallerPackage msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EE6F249802136F443B6919B0C761E42A\Version = "855703553" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2988 chrome.exe 2988 chrome.exe 3084 msiexec.exe 3084 msiexec.exe 3084 msiexec.exe 3084 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 1356 adobe air installer.exe Token: SeIncreaseQuotaPrivilege 1356 adobe air installer.exe Token: SeRestorePrivilege 3084 msiexec.exe Token: SeTakeOwnershipPrivilege 3084 msiexec.exe Token: SeSecurityPrivilege 3084 msiexec.exe Token: SeCreateTokenPrivilege 1356 adobe air installer.exe Token: SeAssignPrimaryTokenPrivilege 1356 adobe air installer.exe Token: SeLockMemoryPrivilege 1356 adobe air installer.exe Token: SeIncreaseQuotaPrivilege 1356 adobe air installer.exe Token: SeMachineAccountPrivilege 1356 adobe air installer.exe Token: SeTcbPrivilege 1356 adobe air installer.exe Token: SeSecurityPrivilege 1356 adobe air installer.exe Token: SeTakeOwnershipPrivilege 1356 adobe air installer.exe Token: SeLoadDriverPrivilege 1356 adobe air installer.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2924 Adobe AIR Installer.exe 2924 Adobe AIR Installer.exe 2924 Adobe AIR Installer.exe 1356 adobe air installer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2924 2828 adobe-air-51-1-1-3.exe 30 PID 2828 wrote to memory of 2924 2828 adobe-air-51-1-1-3.exe 30 PID 2828 wrote to memory of 2924 2828 adobe-air-51-1-1-3.exe 30 PID 2828 wrote to memory of 2924 2828 adobe-air-51-1-1-3.exe 30 PID 2828 wrote to memory of 2924 2828 adobe-air-51-1-1-3.exe 30 PID 2828 wrote to memory of 2924 2828 adobe-air-51-1-1-3.exe 30 PID 2828 wrote to memory of 2924 2828 adobe-air-51-1-1-3.exe 30 PID 2988 wrote to memory of 4660 2988 chrome.exe 32 PID 2988 wrote to memory of 4660 2988 chrome.exe 32 PID 2988 wrote to memory of 4660 2988 chrome.exe 32 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 5096 2988 chrome.exe 34 PID 2988 wrote to memory of 1564 2988 chrome.exe 35 PID 2988 wrote to memory of 1564 2988 chrome.exe 35 PID 2988 wrote to memory of 1564 2988 chrome.exe 35 PID 2988 wrote to memory of 2160 2988 chrome.exe 36 PID 2988 wrote to memory of 2160 2988 chrome.exe 36 PID 2988 wrote to memory of 2160 2988 chrome.exe 36 PID 2988 wrote to memory of 2160 2988 chrome.exe 36 PID 2988 wrote to memory of 2160 2988 chrome.exe 36 PID 2988 wrote to memory of 2160 2988 chrome.exe 36 PID 2988 wrote to memory of 2160 2988 chrome.exe 36 PID 2988 wrote to memory of 2160 2988 chrome.exe 36 PID 2988 wrote to memory of 2160 2988 chrome.exe 36 PID 2988 wrote to memory of 2160 2988 chrome.exe 36 PID 2988 wrote to memory of 2160 2988 chrome.exe 36 PID 2988 wrote to memory of 2160 2988 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\adobe-air-51-1-1-3.exe"C:\Users\Admin\AppData\Local\Temp\adobe-air-51-1-1-3.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\AIRF1FD.tmp\Adobe AIR Installer.exe"C:\Users\Admin\AppData\Local\Temp\AIRF1FD.tmp\Adobe AIR Installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924 -
C:\Users\Admin\appdata\local\temp\airf1fd.tmp\adobe air installer.exe"C:\Users\Admin\appdata\local\temp\airf1fd.tmp\adobe air installer.exe" -stdio \\.\pipe\AIR_2924_0 -ei3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1356
-
-
\??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Resources\Adobe AIR Updater.exe"c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Resources\Adobe AIR Updater.exe" -installupdatecheck3⤵PID:5552
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7ce9758,0x7fef7ce9768,0x7fef7ce97782⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:22⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1440 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:82⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2164 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:12⤵PID:648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2172 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:12⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1404 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:22⤵PID:5780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1176 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:12⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3696 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:82⤵PID:6060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3844 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:12⤵PID:328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3508 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:12⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3812 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:12⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3816 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:12⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3800 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:12⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2520 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:12⤵PID:700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1176 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:82⤵PID:6016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4020 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:82⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3472 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:12⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=2932 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:12⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4156 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:12⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1488 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4336 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:82⤵PID:5308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4344 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:82⤵PID:5332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3040 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:82⤵PID:5340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4324 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:82⤵PID:5632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3716 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:82⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4388 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:82⤵PID:5824
-
-
C:\Users\Admin\Downloads\Transformice.exe"C:\Users\Admin\Downloads\Transformice.exe"2⤵PID:6124
-
C:\Users\Admin\AppData\Local\Temp\AIRB71F.tmp\Install Transformice.exe"C:\Users\Admin\AppData\Local\Temp\AIRB71F.tmp\Install Transformice.exe"3⤵PID:2760
-
\??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe"Adobe AIR Application Installer.exe" "C:\Users\Admin\AppData\Local\Temp\AIRB71F.tmp\Transformice"4⤵PID:6276
-
C:\Program Files (x86)\Transformice\Transformice.exe"C:\Program Files (x86)\Transformice\Transformice.exe"5⤵PID:3124
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3024 --field-trial-handle=1392,i,2118482462540787997,16435485220778401418,131072 /prefetch:82⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5152
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD525d873612ffc5a2ca8ff7ad75eb62cc5
SHA193b9fc1f6fe99c4479906211bb19e4199da024c9
SHA256acc0746eea70c475a0c773bdc182ab13ac5ebebd8ac1e13803b74c242d8b29ba
SHA512ff58de03e5549e24829ac1a6c0699e6b49267a6d4732940c5a9441066bb5c8aae77693fd344f1c162a0e3ee7e5480ef6a6da233c82e346f606154827d12eaef5
-
Filesize
11KB
MD544ac7864cca107d37765ec2a402cc310
SHA180de7343b1e3804aa126c7569b9a08eb01b36560
SHA256fb0ad8a404f069426e2b54290797d13c8cace20ccad61db35c9b1957c0fc88f0
SHA512ffa2a2d5b28e23a192bb7737eeb52abd8744c6a7338e431eeec68f3672c5d84132c04de9d9deae7a3b24b17046f7f09c589e041eaefe7a52bff7dfa762b19557
-
Filesize
3B
MD521438ef4b9ad4fc266b6129a2f60de29
SHA15eb8e2242eeb4f5432beeec8b873f1ab0a6b71fd
SHA25613bf7b3039c63bf5a50491fa3cfd8eb4e699d1ba1436315aef9cbe5711530354
SHA51237436ced85e5cd638973e716d6713257d692f9dd2e1975d5511ae3856a7b3b9f0d9e497315a058b516ab31d652ea9950938c77c1ad435ea8d4b49d73427d1237
-
Filesize
9KB
MD512c13e24fe9f4e904b31ff4f72d25fb7
SHA1aa31f884ded174f860412cc282518c1cf57fec0d
SHA2565e26aa798f8cceb8d665fc30f1feb9176115ed6581a279bfa56e5628a6eec726
SHA5122e806d1ca9bc1759542bf90b2301c5cd82d5352caec86a23d6eff9d1b9e9e4084611471036edd03d147c8e4cb63e7e7e7e5f7d16e3d97b3e7c6f5e6353b350ec
-
Filesize
139KB
MD5055a34bd625727d3e1f9fc15e2ff6c3b
SHA1d9f23f91240c6ebdb6cb88f25b43ac68da40d6be
SHA256a0c992369f8bf35c5856d1fd4930ac72c682bb74d8f6764466e4630b1a6a9347
SHA51228afec89c505bc01592774e1a2eb14b4d104a13c2e351cd3c468cec7314be0af86561b8e1684765ef254f776416dd69009b9cdd1a577ce63e2ee5af4d44904ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50017a000df04c2679c25741ec4728b3e
SHA1f35043c7e196a2fa7ee23017bbfe0e7f6925f83c
SHA2561be3eda95b872c6ddb7d409f07f336f4843a8a8fd4aca435e932f7e57be62ce3
SHA5125cf60c66fb3c116d5aa27fc1d5542ddcec42846bca6f8a21e06d2491d783bc02e8e1033071c539a43d2ebc534220b7957aa28fe33f6f93980bf76024d42b716b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f7ea4d6458ee3da099f86404973b4d4
SHA1717cc14748427a361f2e4d2586240440f12f0338
SHA2569c15a0593b8a40fa12c80ba645e2b771e47b37371d08173b93098a4eabe28bf1
SHA512c63d98064ada539df466ac4a6454c8ea8d6d588630f0622bff95f5bd8d20392a5f493135906585ab80846483e2a341a2b43b4f637d6fbc7b6cde89669641d03a
-
Filesize
692B
MD5133c2a57db41285ad4d242492ba2bce6
SHA1e0c456b7a4679641bfcff7da1203e216ea5cf360
SHA25604ca9ed613b6ec8d47e6aa30d1f23f0caf5813d0aacd526b6686665e6eb5c97c
SHA5128d1f7a1603f443cec828df1ef303f9d53e7114732dbb2f1d0f63f58108ef48e8f654af5370d90ef16d4579f66676a842d5bb08c53d561902e4b0478c12d7b581
-
Filesize
1KB
MD5c952c3a953b94acc625fbd0d4e659828
SHA13ec76fdf18152bd361d3d92b3d9299c44ac095fa
SHA2564b9188e8b0a7e152201588a4ded606c5e9e768fdb2846c505d92337bd63c4067
SHA512d08c17bce616ba493e99b9c77d72124abd35cad407f231f3a2833558781fca61bf72a7ca64083cdb9c36ebda922fd5157ccd4bafeb60f258b653a31c5e4a1be5
-
Filesize
1KB
MD5bd81ad019c544cd1740f2062c61dd2bf
SHA181be6cf60d64ef8dc612ef964aa3af5d1c6afcb6
SHA256cae4bfb19dfe1dd3d1d7b0bd3c528bf0d864761fd58790ea5dfc963094851637
SHA512b3e9795f5163ff21f8c6be265a360f31b76d4df05a4977af7a400f080c3a386b85aa14d2337b3e754efc352f4c68438e8495b000148363cb6cf39e0ea8b2e3ce
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT~RFf773fde.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD5170d6383a42d4e66de70077fc1399290
SHA199c78085eabf6a257e66f038d5b39eeafc9c1c4f
SHA256562b5ecdf1e8db6386ba645fdf7ba6f01a69eb81059ca1367fcc030e8ef1b992
SHA5125fddaa835ddffdc82bccc4ecacb7ce8af8ccdc854bb02d693ec7d79de5d504bff001395810012e95c2adf2c5ca490e778c067f3071af543127b9a3b80f3652b0
-
Filesize
363B
MD5ffdf048b2c6c943b2e09b0434980512c
SHA193019949a0a114252c80ea543152d0d608ff285e
SHA256f161013820ef48a9b379bfad253d4a8f91017cf79c38d013c7325cddb094b8f7
SHA512873b4119ff20122c11a921ff8228eeda54f3d0b06e7d799fcd2e2051920d0894a77040c7aacd7b02f71e838d239d91705dc195d7adb708ffa311b56a7095a080
-
Filesize
6KB
MD5eba0fa3d9104d328b51a7c4660ac16f0
SHA145e3f397548ce68ccd7b2d427cd9607ad8ca326a
SHA256811795950ba7c8e25e6e4ebeb2bef89f436d6f40b62b9e6630b8d92edb5aad31
SHA5123caade10c3448330222b14a6db4d2164ef601c2e6d0d680fb87b29d18d93c7cfc6a7083d670f7976004a7970371bbe4e55abd12cccffd5b7d8f04375b2674362
-
Filesize
6KB
MD50fbf1fe88cd508ab6db5b7fc23dda3b7
SHA1ed2a808939e67a20e464669031989897de0b018e
SHA256a3df5cf52cba0581c2dcec7c25e6db890612be468a9082416d107b0478d78897
SHA5124a94d484623f3123db04d1967d3ec0485b58a84edb9a7f7d51a04f82906e0b8f2f10a8f0af5edd71e1343e78e6676620079f3ca5a9a00acba65679fa3825f18f
-
Filesize
5KB
MD576faecd5c4a3b9418efcf56e4b9b903b
SHA1e6b926d375b73195a670495b1e532aca995bdce8
SHA256db7905d0ff2206aee49d8b013097a12e8dbaee245165fc89310137c6ec43e693
SHA5128d5888a830704227d0459a5c59b6f7f1e4953513ffd1ad1bfe04fa804c1159618bf98c677a5350b66830ced54db5bb2a01bb5a7130f57783413f8a04e6a1a28b
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
344KB
MD51a396d1a7e56119031e03498a932aab0
SHA17b1494a23ea9fbb9e16a434997549e3b8e255a12
SHA256c731c3cf02e5570d80317d68653a7e611c9f28424a2a653eb02b4541d0dd8e2d
SHA512fa14ce0033bd4f27495779da75c2bdfca589ea953d8161e6d87cc2f94b3ade21856ec3d51d85002610f11ada1990e7a21cecf53ad7bc781361dd4878de5d9a76
-
Filesize
344KB
MD501632e136934bf5619d6fc8133e1da21
SHA1d4e155065f71f6a28454f6208613fc1082a5d7c4
SHA25657d873743230002733f14a0b8c381a37da7ec8dbdd488ad7b678f4bb32278ef1
SHA5123f5c5e43cb0b7d03610ac70a463876751a900de4e82244283210e19dda60fa3b2bce1624cc016684e40e9733c8db866c48f12edcdf6310af3ad542cfe40c8b70
-
Filesize
344KB
MD50843898c887db52c12ce9b6ebfc75446
SHA136c8c5f330cb9e5d2ff8110d63b314275eb87cad
SHA256537685fec4f105f5bc5a76f9aac0025754d15b6fa434e2b09ca4060deab3ace4
SHA512fd5a7c88b07d4a9720202562f1191fa99d995c0949853b758e0b4848fa248bfb3988c23b097ac18e7d464d8ae42dd34e29d504ef40c044fcd664c5d5b16c2b12
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q4648X1K\info[1].php
Filesize105B
MD5db6b7e0131993e003ac733a26a585995
SHA17f0380250b73c03433e5074662613b9fb8a02176
SHA2568227596b9cad5d2c266ac071ecc6cbad5f1ce026d38a172e7e007d38ece28162
SHA5128ebb5d0c04f7965cda0b2c70311bf42f7ae6f2d39cb0cca7bc48fa5af1e1fef484acad47f1b47bf76075cea0250a18ad5abcbc85a9b76bf8bfeace97dfdf6acd
-
Filesize
24B
MD571100a118618ca9623f517d7468278d1
SHA1d0bca87f671fc06774cb667cf8bef962a0278ccc
SHA256307a9865fd68d697675818cbd36f386102aae93b3ffc9526fa44deb0e541f2f0
SHA5120a1f22d1e03f6af658d6c0377238c48b8a99adc1eaa3137cfd6def40f655762cca40e7b48ad2a77dd53b869b333300a7c68762da3feeee86e7c4837416679ed7
-
Filesize
13.4MB
MD5b10e155460556fa4667536de7bb40e43
SHA1a17872d7ff29a307fac5b4ed98887a420f716964
SHA256371c442e9ce81a9514d25eccbe6e9c37a7b766bc5de1a7e03e50ac77cb8ce374
SHA5124a3d2b0ec3d3ae868c50530136da228d835234198a41aa47ef11c40843249bad29425d50967ce8205c948336d02107e69655900c071cb5b3cb0c63e57ea557d3
-
Filesize
512KB
MD5ad5f7d53caef368303bebde302582d92
SHA19efad61bf69e80d7468236695e0a108d360ae749
SHA2562b501bfdb378ba7130b8e4b4b2263adfb4f95887cf071ded134f4cffeee5f40d
SHA5128a31c0009c915dbb46c054388d793c1db8fc7b5ae1df419b3f284cad1d2f8db1f2ed759dcb126868d64af8a0a94c9e479776e6da86296af4e73a0850821c49e8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
268KB
MD5e0d19351dd3e1d5361def38659318249
SHA1e6824969ebea151c77080b445ac416b56dd8630d
SHA2566f378db45311af48c29fbd47550e7c181c748c1dab76cadd1f1f1c872ad288c8
SHA512a684739e9f9283f1ad6dea9747fe46fd2feb9fb7854d128cd34b3543109cfc7c1f9cd21890ca27e55afd88d082ba81507eb3382968ba09cd33afc8208f33ec4b
-
Filesize
8.0MB
MD5479dfeb6bfdb8035dd2bf79cabb39e65
SHA1e1b8a1363189abc7d3f7459bd6740682e43b30f2
SHA256814728159d8e316eb6bc09fb1dafef911b708d1d1f51e8e866fee8e7965ce05e
SHA5122650454e22176d31415c3be4dca4ed887bf30adf4f3655dde5d9cd538025b662ec9bf39657aff540c68aa1e4494c449099bc1a693ea2f835bd41ac51169778ca
-
Filesize
59KB
MD55e9d2fccad3b9edbc0a8ab0fe1e5e510
SHA14f74227b71e570f57e0bf611de8fe2b73cd3aba3
SHA256ba7cd3c2ef37746576ea934fbbfe6ce0f659977f604cb6528e642e6d82e60ff7
SHA5128e5ae33075564851f1534767558b1be79894858a912e5f53b00c98ad38e46bcdd17e225e32acea78b634221b506a312185ea155faaac976642c6fc8ed352f035
-
Filesize
352KB
MD58599589cb2f1cfad899f0e95c3cf2bc9
SHA15f749cd74d03b0d050be34eba34cfa11dabab3dc
SHA256101140c8df33cd81af64000549872ef9e48af5913a27367e0865a4f83becc509
SHA512216b21b7c373f083fbd4246555a94c8ade6c6d009a381d28b98a59028bc0eaf99ba937147c90184060ee3c6c6a95d9b0b249da3fb2ef16272eb881bb6e74e35d
-
Filesize
21KB
MD5164df4c65d8e4e8d910e2a1703ca3e75
SHA13531024204406e602e3157ff5ca8b9e36c1111fe
SHA2569566c1dddc1d0ad10071e9f260a05a96da4307f64a9ee59ab318aab823cfee15
SHA5123d14ff7274ba92cee9c1c25fe08bb03b9253b2ac8e316ebd738a935bb1ec6ad17042b3dc3a8ceacc15627d91cb4ff0885e326cb8bb11a1dd5408f9a571970636
-
\??\c:\users\admin\appdata\local\temp\airf1fd.tmp\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe
Filesize408KB
MD5277739413fb03b430b50d60d679f3d97
SHA1264da51d663ef366a19dca31faa83f2ae91c6e45
SHA25696cf2ed23e21169633d3a78f0677fd28754c1f491d590809506dc075bb49eda3
SHA5128429fa88b6e1eb072edaf28c79b320a6150f0579376d61c7f11a31b59a116848cff5315373a0393c238e1d19b4e4b5bd282f9de54a7749db658dda073f227cca
-
\??\c:\users\admin\appdata\local\temp\airf1fd.tmp\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.swf
Filesize491KB
MD5e9db98f0ab9334466bc94604c62e4c04
SHA1992642151c9ef76e338509b592e29cde69383751
SHA256c740ad52c9c1ab8d7762dd744f13742564cc1500b94d7a29bfc60311b7f22934
SHA5127dfe2dadabeb3159a91b70280e5ca773f37d45babbe2c6a37989fc2848ffd0ec4ef9e3d8b6af69853be6adab935126b94b45216fa395c7fa0755f969c44c8c71
-
\??\c:\users\admin\appdata\local\temp\airf1fd.tmp\Adobe AIR\Versions\1.0\Resources\Adobe AIR Updater.exe
Filesize383KB
MD5557de97331f10692a1d1a6d757587f6a
SHA19d12b14515b876047e42e119048a0de6f791ae7b
SHA256ee869bed7628dc2db4dd1ece9d2dcfb084cc803a08c007d3d88b0bf3343b15cb
SHA5128d94d98c54b457b99e2c00a99f209fecc93544b3bdb998561cc0f8dac6768e3ae93b4737e18ce51d9d9059d45fd3566be0cb67b80f067d6484d7ddfcb6670076
-
\??\c:\users\admin\appdata\local\temp\airf1fd.tmp\Adobe AIR\Versions\1.0\Resources\Adobe Root Certificate.cer
Filesize1KB
MD5bf70913ff8d6d60a47fe825330815db4
SHA16be8460639f5651848b2f83ab1463f5602be06c3
SHA256944e66aa967bd390952d22426bf1dfcd379a2c87a21b942fbca79f41f0354aac
SHA512108e3c8ec1d45de97a7efc5c6262602414bbb7a32477dd7d8aab4c9335365f2b95c52d4f708a4a7422f4d4e0877f222cd358411d7b78cebe83565954e4f465f0
-
\??\c:\users\admin\appdata\local\temp\airf1fd.tmp\Adobe AIR\Versions\1.0\Resources\Thawte Root Certificate.cer
Filesize677B
MD57f667a71d3eb6978209a51149d83da20
SHA1be36a4562fb2ee05dbb3d32323adf445084ed656
SHA2566b6c1e01f590f5afc5fcf85cd0b9396884048659fc2c6d1170d68b045216c3fd
SHA5127f7329f4f9a3fb45b8aaa8eac9191bef9db85a1bdb13ed66d1ece6a51531f216eeb736a96d8baa87e033f2b7f0b8879954bc261c4c8bd632563ba153bc07e0b0
-
\??\c:\users\admin\appdata\local\temp\airf1fd.tmp\Adobe AIR\Versions\1.0\Resources\airappinstaller.exe
Filesize53KB
MD59cec1614a59cecacd3d31274bf00a37f
SHA1b46af6fa2924b0c4d6e290ae0dcbc42e3d27ad1a
SHA256e277d2a94295506fe1574cf0b4e499b204f83293b290fc1139098d55e2b7c176
SHA51225f6c873bf406f3615bdf04aae5e66d3bd5b52bb77c7cda27a57cf5830012bcbec4cf5b0a563b868ec0fd47f1612fc4be6b6c355685db86b1da41b2bd856b64f
-
Filesize
2KB
MD50f5295089e4ef5a7396007407ee21113
SHA1e5731eaa83f4dec94fd51612beb8e72b42df8954
SHA2564571ead5d878568c4082003d21f50a39b8687f08e8f631aa20351014373ed2b1
SHA51249d02f3787454c9e0b77822de0f3761457eca4038fd7ba74e1c61232b5887b6f658161c7c088690641c33f4e0bad755b45886572e0cc1b468dc7d5c42f8257b3
-
Filesize
229KB
MD5bc2c33f2d32da05074e96ceafb8a25d1
SHA1ab5b93ff24f10dd6446690862b34281964e70d55
SHA256bbc0e77749778134698038ea107dd47e76e0cd849d34406eb960bf0c9f3c7a5a
SHA51283c7676816594e5931d8a36827d492e7a52b120f23a1e3375ec0535698dbfddf955833fbf17accbe2bba05214d73eeae8ab9c0e4b3f74f796322f174f745609e
-
Filesize
86KB
MD53c3024ded7007aa0d529555ac6754342
SHA15e3c3c583c14cc8207952bb18387e0ed852677af
SHA256ece64eaa90de0446dbdd7fc96c36e0ed784bba0920d807cd2aeb15ea6d38d057
SHA51238451c05dc7e65b9765dd28abe6ee8510f1e7b1f8cb683c833b601c95cb4151714a3b76581fe6841724805997db42e2e0d1f80228acf8985cd5131f64fbc9e0d
-
Filesize
36KB
MD5d4139b57677a2ad682938f60522e2b0f
SHA12ed0025422389df08373e056cd1dc6bd7295abc5
SHA256cb2954595c2ac2c5c0ad6db3471073ea67b27e17914072f3cbf6344c97d6592d
SHA512282db921c661601025f1c2b6e91e667ecc4f1595a85e23cd367b966df59470b910fd8e93ac4bbc1a4989f92d8245c140f8dc86036f25713951b5881acbd0c3f2
-
Filesize
11B
MD5a5c11ca014fe30b8085ea2e95f7196c4
SHA1594e00fa5eaeaa9f99f7e45d92bab7dd7ca8575a
SHA256096e4bfd9f7e1faf15058c0a0fe45e6dbd00e3e1360f21f2ca92bce16a9a919a
SHA5129b3dd555ac1ab5e8dafcffdb6e23ebfffafecfb908c204e88a369c9c8e0fce326caa3aa2ac71be6629f018191cc379e29b1a919dc787fe29bc16c5f0ee24b26b
-
Filesize
48KB
MD55f75a11c1eb98a022e087ba7eefc2ea6
SHA19f46877e58f4549bcb2c4f0fd903d9fb49ecfb8a
SHA2566f905ac0f120f11bfcf04496ae7cf6e3d0128f6cd6b08cf0cf5eab7ff9ce314b
SHA5125f45bdffe6880197af1ae1f6ed1b1483a4595c982c39e33f89c5972658809dbd3041f0f8105206534baf129e0f5a8a51e05a4aa69b08d52edee530a2018afff8
-
Filesize
130KB
MD5a5da8ba949718507dfda7a816326fdbe
SHA13af561103bfb62fb580ab44954cd56c0aefc275f
SHA25675eadf5339a379e93627e0a6659939d7b4f22b60849d8b906900255564ecb494
SHA512073decc81a69fe60ee059ac086434738e702fdee078a65f1497c54d9106665687ed88b60e29ad3d750bcd1447d1ed117095941232e6c1919c2e14511befaf5c6
-
Filesize
383KB
MD56ba34f521e2de430fa5ba108e399d12e
SHA1830ee63d8db0020201b6d0cb8d5a2ed2dd523256
SHA2561a54ac75b4b671657c4368c6a73143e63462be076312921bc6d1e94a12426c58
SHA5121e3826aa000abaa15d93e516b8398f31a9517d8dbbaa2ee671cfb2619af3818efe8b810e6fde3411c8b05b8c51afbd58b561c6d76e4383ac300bb7a3ce8f6401