Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/01/2025, 05:42
Behavioral task
behavioral1
Sample
5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe
Resource
win10v2004-20241007-en
General
-
Target
5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe
-
Size
1.7MB
-
MD5
c50c35e409f7f805813e4ce6f1cc9d79
-
SHA1
57e8abebac7257fb14fb22ef794a3204540ef623
-
SHA256
5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164
-
SHA512
6aeeeaa5b491f3221db6b7afca69416ac46658d61c72e478c1ad817068e5ddb4617632b41c0aacf2b3d889300c56c0b762343fe6a4c1df668d5760d144a4bfdf
-
SSDEEP
49152:D+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvT:uTHUxUoh1IF9gl2K
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 48 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2552 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2588 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2632 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2156 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3048 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 736 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1712 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 444 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2536 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2164 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1656 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2256 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2204 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1696 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2892 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 672 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3012 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2268 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1788 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2080 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2464 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1136 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 532 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2372 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2160 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2352 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1968 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2296 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1936 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1880 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2376 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 596 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 820 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 888 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1680 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2116 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 860 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1516 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1536 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1464 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2520 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2532 2044 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1760 2044 schtasks.exe 30 -
resource yara_rule behavioral1/memory/2700-1-0x0000000001200000-0x00000000013C0000-memory.dmp dcrat behavioral1/files/0x0005000000019d5c-27.dat dcrat behavioral1/files/0x001000000001225f-99.dat dcrat behavioral1/files/0x000a0000000191ad-120.dat dcrat behavioral1/files/0x000700000001a020-133.dat dcrat behavioral1/files/0x000600000001a3e8-155.dat dcrat behavioral1/files/0x000700000001a423-164.dat dcrat behavioral1/files/0x000800000001a423-177.dat dcrat behavioral1/files/0x000a00000001a463-188.dat dcrat behavioral1/files/0x000800000001a470-212.dat dcrat behavioral1/files/0x000800000001a478-224.dat dcrat behavioral1/memory/2080-267-0x0000000001230000-0x00000000013F0000-memory.dmp dcrat behavioral1/memory/1916-340-0x0000000001250000-0x0000000001410000-memory.dmp dcrat behavioral1/memory/2224-375-0x00000000003E0000-0x00000000005A0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2908 powershell.exe 268 powershell.exe 1224 powershell.exe 2460 powershell.exe 1896 powershell.exe 2056 powershell.exe 1968 powershell.exe 2360 powershell.exe 2132 powershell.exe 2112 powershell.exe 968 powershell.exe 2984 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe -
Executes dropped EXE 7 IoCs
pid Process 2080 audiodg.exe 2940 audiodg.exe 1036 audiodg.exe 1916 audiodg.exe 2704 audiodg.exe 2256 audiodg.exe 2224 audiodg.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\RCX5A47.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\SysWOW64\RCX5AB5.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\SysWOW64\csrss.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Windows\SysWOW64\csrss.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Windows\SysWOW64\886983d96e3d3e 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe -
Drops file in Program Files directory 30 IoCs
description ioc Process File created C:\Program Files\Mozilla Firefox\browser\features\taskhost.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Program Files\7-Zip\Lang\Idle.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\RCX44B2.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files (x86)\Windows Mail\de-DE\RCX46B7.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\lua\RCX4DA1.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Program Files\VideoLAN\VLC\plugins\lua\886983d96e3d3e 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files\7-Zip\Lang\RCX5227.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Program Files\7-Zip\Lang\6ccacd8608530f 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Program Files\Uninstall Information\6203df4a6bafc7 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files\7-Zip\Lang\Idle.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files\Uninstall Information\RCX5498.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Program Files\Uninstall Information\lsass.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files\Uninstall Information\RCX5506.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Program Files (x86)\Windows Mail\de-DE\42af1c969fbb7b 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Program Files\Windows Journal\csrss.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files\Windows Journal\RCX4B2E.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files\Windows Journal\csrss.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Program Files\Mozilla Firefox\browser\features\b75386f1303e64 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Program Files\VideoLAN\VLC\plugins\lua\csrss.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files (x86)\Windows Mail\de-DE\RCX46B8.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\lua\csrss.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files\7-Zip\Lang\RCX5226.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files\Uninstall Information\lsass.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Program Files\Windows Journal\886983d96e3d3e 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\RCX44B3.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\taskhost.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files\Windows Journal\RCX4B2F.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\lua\RCX4D32.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe -
Drops file in Windows directory 26 IoCs
description ioc Process File created C:\Windows\IME\IMEJP10\System.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Windows\RemotePackages\RemoteApps\spoolsv.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Windows\ja-JP\dllhost.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\LiveKernelReports\RCX4222.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\IME\IMEJP10\RCX492A.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\ja-JP\RCX63D1.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Windows\IME\IMEJP10\27d1bcfc3c54e0 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Windows\RemotePackages\RemoteApps\f3b6ecef712a24 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Windows\AppCompat\Programs\csrss.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\IME\IMEJP10\RCX48BC.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\RemotePackages\RemoteApps\RCX5CB9.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Windows\LiveKernelReports\lsm.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\LiveKernelReports\lsm.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Windows\ja-JP\5940a34987c991 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\IME\IMEJP10\System.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\RemotePackages\RemoteApps\RCX5D27.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\AppCompat\Programs\RCX615F.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\ja-JP\dllhost.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Windows\LiveKernelReports\101b941d020240 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Windows\Boot\Fonts\spoolsv.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File created C:\Windows\AppCompat\Programs\886983d96e3d3e 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\LiveKernelReports\RCX4221.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\RemotePackages\RemoteApps\spoolsv.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\AppCompat\Programs\RCX61CD.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\AppCompat\Programs\csrss.exe 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe File opened for modification C:\Windows\ja-JP\RCX643F.tmp 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3048 schtasks.exe 1712 schtasks.exe 2464 schtasks.exe 1968 schtasks.exe 1936 schtasks.exe 1516 schtasks.exe 3020 schtasks.exe 2156 schtasks.exe 2268 schtasks.exe 2204 schtasks.exe 1696 schtasks.exe 2892 schtasks.exe 2116 schtasks.exe 860 schtasks.exe 2520 schtasks.exe 736 schtasks.exe 3012 schtasks.exe 1136 schtasks.exe 532 schtasks.exe 1880 schtasks.exe 1536 schtasks.exe 2532 schtasks.exe 1760 schtasks.exe 2256 schtasks.exe 2588 schtasks.exe 2632 schtasks.exe 1656 schtasks.exe 1788 schtasks.exe 2296 schtasks.exe 596 schtasks.exe 2992 schtasks.exe 2552 schtasks.exe 1464 schtasks.exe 2080 schtasks.exe 1684 schtasks.exe 2536 schtasks.exe 672 schtasks.exe 2372 schtasks.exe 2376 schtasks.exe 820 schtasks.exe 888 schtasks.exe 2860 schtasks.exe 2164 schtasks.exe 2160 schtasks.exe 2352 schtasks.exe 1680 schtasks.exe 1736 schtasks.exe 444 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe Token: SeDebugPrivilege 1968 powershell.exe Token: SeDebugPrivilege 2056 powershell.exe Token: SeDebugPrivilege 2908 powershell.exe Token: SeDebugPrivilege 1224 powershell.exe Token: SeDebugPrivilege 2080 audiodg.exe Token: SeDebugPrivilege 2112 powershell.exe Token: SeDebugPrivilege 1896 powershell.exe Token: SeDebugPrivilege 968 powershell.exe Token: SeDebugPrivilege 2460 powershell.exe Token: SeDebugPrivilege 2132 powershell.exe Token: SeDebugPrivilege 2360 powershell.exe Token: SeDebugPrivilege 268 powershell.exe Token: SeDebugPrivilege 2984 powershell.exe Token: SeDebugPrivilege 2940 audiodg.exe Token: SeDebugPrivilege 1036 audiodg.exe Token: SeDebugPrivilege 1916 audiodg.exe Token: SeDebugPrivilege 2704 audiodg.exe Token: SeDebugPrivilege 2256 audiodg.exe Token: SeDebugPrivilege 2224 audiodg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2700 wrote to memory of 1968 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 79 PID 2700 wrote to memory of 1968 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 79 PID 2700 wrote to memory of 1968 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 79 PID 2700 wrote to memory of 1224 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 80 PID 2700 wrote to memory of 1224 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 80 PID 2700 wrote to memory of 1224 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 80 PID 2700 wrote to memory of 2908 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 81 PID 2700 wrote to memory of 2908 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 81 PID 2700 wrote to memory of 2908 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 81 PID 2700 wrote to memory of 268 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 82 PID 2700 wrote to memory of 268 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 82 PID 2700 wrote to memory of 268 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 82 PID 2700 wrote to memory of 2360 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 84 PID 2700 wrote to memory of 2360 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 84 PID 2700 wrote to memory of 2360 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 84 PID 2700 wrote to memory of 2460 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 85 PID 2700 wrote to memory of 2460 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 85 PID 2700 wrote to memory of 2460 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 85 PID 2700 wrote to memory of 2132 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 86 PID 2700 wrote to memory of 2132 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 86 PID 2700 wrote to memory of 2132 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 86 PID 2700 wrote to memory of 2112 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 87 PID 2700 wrote to memory of 2112 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 87 PID 2700 wrote to memory of 2112 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 87 PID 2700 wrote to memory of 1896 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 88 PID 2700 wrote to memory of 1896 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 88 PID 2700 wrote to memory of 1896 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 88 PID 2700 wrote to memory of 2056 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 89 PID 2700 wrote to memory of 2056 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 89 PID 2700 wrote to memory of 2056 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 89 PID 2700 wrote to memory of 2984 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 90 PID 2700 wrote to memory of 2984 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 90 PID 2700 wrote to memory of 2984 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 90 PID 2700 wrote to memory of 968 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 92 PID 2700 wrote to memory of 968 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 92 PID 2700 wrote to memory of 968 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 92 PID 2700 wrote to memory of 2080 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 103 PID 2700 wrote to memory of 2080 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 103 PID 2700 wrote to memory of 2080 2700 5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe 103 PID 2080 wrote to memory of 2348 2080 audiodg.exe 104 PID 2080 wrote to memory of 2348 2080 audiodg.exe 104 PID 2080 wrote to memory of 2348 2080 audiodg.exe 104 PID 2080 wrote to memory of 1976 2080 audiodg.exe 105 PID 2080 wrote to memory of 1976 2080 audiodg.exe 105 PID 2080 wrote to memory of 1976 2080 audiodg.exe 105 PID 2348 wrote to memory of 2940 2348 WScript.exe 106 PID 2348 wrote to memory of 2940 2348 WScript.exe 106 PID 2348 wrote to memory of 2940 2348 WScript.exe 106 PID 2940 wrote to memory of 1404 2940 audiodg.exe 107 PID 2940 wrote to memory of 1404 2940 audiodg.exe 107 PID 2940 wrote to memory of 1404 2940 audiodg.exe 107 PID 2940 wrote to memory of 1708 2940 audiodg.exe 108 PID 2940 wrote to memory of 1708 2940 audiodg.exe 108 PID 2940 wrote to memory of 1708 2940 audiodg.exe 108 PID 1404 wrote to memory of 1036 1404 WScript.exe 109 PID 1404 wrote to memory of 1036 1404 WScript.exe 109 PID 1404 wrote to memory of 1036 1404 WScript.exe 109 PID 1036 wrote to memory of 2344 1036 audiodg.exe 110 PID 1036 wrote to memory of 2344 1036 audiodg.exe 110 PID 1036 wrote to memory of 2344 1036 audiodg.exe 110 PID 1036 wrote to memory of 2876 1036 audiodg.exe 111 PID 1036 wrote to memory of 2876 1036 audiodg.exe 111 PID 1036 wrote to memory of 2876 1036 audiodg.exe 111 PID 2344 wrote to memory of 1916 2344 WScript.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe"C:\Users\Admin\AppData\Local\Temp\5adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:968
-
-
C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe"C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a61d4766-7248-4c8a-a282-64250a2c67e8.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe"C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\718b38df-8191-4b47-a517-c6a1ef8cf988.vbs"5⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe"C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\32a842b2-9b15-4935-80c3-07f8320803de.vbs"7⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe"C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1916 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cf5133a6-8579-441f-8191-55dc506815e0.vbs"9⤵PID:2996
-
C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe"C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2704 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\98170968-d09b-4bfe-8036-3d30ba120346.vbs"11⤵PID:2860
-
C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe"C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2256 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8ffb8496-bf55-4eb0-ac89-64b0d1f9c51d.vbs"13⤵PID:1892
-
C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe"C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2224 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dadc179f-69ca-40e9-b7a4-489686e5d3e6.vbs"15⤵PID:1156
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5a1ce966-1bce-4d69-ba5b-22954f7814f4.vbs"15⤵PID:2896
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\25f283fa-97f8-4c88-a146-79cf7932333b.vbs"13⤵PID:2820
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8decfebd-fa45-446f-801e-9682bfccdc85.vbs"11⤵PID:2688
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d91bd46c-a886-4645-a21f-eeef9a97c34b.vbs"9⤵PID:1760
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\af7a08d3-4b8f-4d54-bd92-cfd49b72c908.vbs"7⤵PID:2876
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7fb4fbf0-6774-4abd-8277-d0ec58668950.vbs"5⤵PID:1708
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cee2e871-fc00-4749-9f54-10eb9d5de7ed.vbs"3⤵PID:1976
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Windows\LiveKernelReports\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\LiveKernelReports\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 6 /tr "'C:\Windows\LiveKernelReports\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Program Files\Mozilla Firefox\browser\features\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\browser\features\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\Program Files\Mozilla Firefox\browser\features\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Mail\de-DE\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Windows\IME\IMEJP10\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\IME\IMEJP10\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Windows\IME\IMEJP10\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2256
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Journal\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Journal\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Journal\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files\VideoLAN\VLC\plugins\lua\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\plugins\lua\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\VideoLAN\VLC\plugins\lua\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files\7-Zip\Lang\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files\7-Zip\Lang\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Program Files\Uninstall Information\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Program Files\Uninstall Information\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Templates\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Users\All Users\Templates\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Templates\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Windows\SysWOW64\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\SysWOW64\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Windows\SysWOW64\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Windows\RemotePackages\RemoteApps\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\RemotePackages\RemoteApps\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Windows\RemotePackages\RemoteApps\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Windows\AppCompat\Programs\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\AppCompat\Programs\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Windows\AppCompat\Programs\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Windows\ja-JP\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\ja-JP\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Windows\ja-JP\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 6 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD596dd1c5b0d2d27f26d6783ac31fe963f
SHA1de50104f89d278cf881f93b198f9d81288fec182
SHA2562c5421d676fcfba8c4a453fa733a5a6d5feea5462379ec16c39e700f186c1773
SHA5125b8d9fad7fc2651c21f2ed0cbd4f68ef87f96fa62ef3839bb9f857499153953f5cd535b957f57c38acee622bf3ce132e4f32285b2a010a2d45634ad9cb89c1da
-
Filesize
1.7MB
MD5341c1bc343c0aacb4ea14079b3fece65
SHA1363a5106a99de3626c6329de7873316e4ca481cf
SHA256f24a774409a8234b8e1b4ef9c8cf98e6dfbd484a91ff1694bff40070db22873e
SHA5127278ad0bdda8beefc253fd9e7367a0670c0b6e013608b8b5a1d911a31e87574fbc808e614e152de5aeaf46668c54a0b787aef21e1da5fa5c770b59b88a1215cb
-
Filesize
1.7MB
MD5c50c35e409f7f805813e4ce6f1cc9d79
SHA157e8abebac7257fb14fb22ef794a3204540ef623
SHA2565adfa270bb6f18bcfa609cec371928fa062bad30be9c5094f7dca9bf94274164
SHA5126aeeeaa5b491f3221db6b7afca69416ac46658d61c72e478c1ad817068e5ddb4617632b41c0aacf2b3d889300c56c0b762343fe6a4c1df668d5760d144a4bfdf
-
Filesize
1.7MB
MD5a7cdab2983db368a8ccd9b850e9027c9
SHA189500c17300be6dddf5cd3afc7a6c559950705cd
SHA256ea7859e38db34a8d4c95fc6c220abf033f8651bccb4b7413e0ef2d6abef63f30
SHA51220978b667073f2378c0d6de6ea26768937331fc44be85a8e12a297164d8f9656796cdff923c483125f9ea355379784d576fa3663933c982ca67d7021f9906bac
-
Filesize
1.7MB
MD5f0ff196738b697c04a3076b0e0bf800d
SHA1a0d1e7a98a384112b46b4e3f6b8fc36e5aac0252
SHA2565b88872dc12f2fa702881278de929b52d062e37a6fbabcf36ccbcb70ee1aac7e
SHA51290f7523d2f8d0f9e054804a0c3ef09813fc89f4aa84de7e56f7561f485a8471cc62f5940ad077cab7557a4ef826092355f1a2e4cba0293d648576b3e0f236ea4
-
Filesize
729B
MD5d14da8ebbd516aa8c2e7ab054a4dcc70
SHA17b7cc405efa5d730e0e4f8b68f42f57fe17a47b9
SHA256b504b9a2a204086b82cc9652319a2ec342d24cdebb6f3d94aa51392c45466d73
SHA5125577584d613a86418ed1d37d1b455101e23c4cc625b8a2e3c5fd830e32ed0d34935863d8432dfdfafd206ab4cecb437d5e8c7d0703be20a082aca0ff93f58891
-
Filesize
729B
MD56f232bf53bce47c30df7cee2608a53dd
SHA123b9a8eefb73dcba7d512977862ef8804e94a482
SHA25621e0d6de0308fed58dbe65ee6b3f8ba9037bc1828e6d1904c1d7c1cb4d1a5795
SHA512f7a7394539b4ffab97717dbe0bb4e0eb292950c51280027414062d8184f7a82a3c755a2fd7b160f82a5a3f6d850eda77bba20efaf21e2c264b823b0e80e188e7
-
Filesize
729B
MD5e959f68d678ce0f14555b06ebb1ba7d0
SHA1eb7ff80275804167393f17edd63c1a6befbf20d3
SHA256b51b7dbb054d2f5bad4259287bf3e4d4bfcce64b2144f5d095b2306a6735f402
SHA512eb5ef5f00660571367c1669f98c990394d43bea4aef76a6ce071c35784ed0ca5294983c7b1d266b0f88eb7d6a35485ff4e53ff2a0e84ac383a897b41fe88e5f2
-
Filesize
729B
MD5059e743e0d85526f61261c0c199d6e68
SHA1a036b7b129424e105772645df4924bcae3236d96
SHA2567c3bfcb08ca1371582ba08e5e6eee9e15af54b2958f9cd0a5e611158891219a5
SHA51236eceb42c435a0ca08f4740993c938b20e6af0f7f3a39d02537e3caaacd9c13aa7987e8b990a74a142e3970ed9fb4c620337b0aab3f8769e674362c747869cd3
-
Filesize
729B
MD5a68cb20f094a085dcd54880866031ac8
SHA1217ba5e0e2d43c1012addb33dedd12d394de4075
SHA2563554d0d96bf5a8c14e402efbcfb37434fde2b1f49c5aaede14df9804d78234bc
SHA512ab9d856936a3d68da9a4a53fa8138c1a77bc698823af84f9c262f6bb3c52fd7b48c90e95e057d968824b198a982340b9c537671aa36c3d79bf7f147d9fa15903
-
Filesize
505B
MD5bd93ee86b7c03f34164058211ed497e0
SHA1f6fabc2338c77b18b9242354b96a6e9feeb8d514
SHA2565f2b103c1babf941b9624f6624510fd31eb4740e146c88b83864ddd239ca924c
SHA51200595c266287d6fedd1c403ee3009c7b7491d777614e39f6b8af9f6f403ee1ef2595eff075e9f7d7d327b7f3b41c0a6c42c935978f3575bf0a22857b71c2d8e1
-
Filesize
729B
MD5e412df44a6f4576b1a4ea65c552185e3
SHA144c64becc93fb606237bc32f4d9a84b7ccf9c5aa
SHA256d6b653be8cf9b6eab2130968a619fc41faf2acefa408b358be7f614c7e3b20c4
SHA512d9be6b8382d1ed7f132c263a1ac4bf6f26e1fd975656d4c4ed229ccc5dcc524511273c2914f18b9433ca4a32f2feec1e3b91042c7deab270a6eed1d45f296961
-
Filesize
729B
MD56398c745ff4527a3154f72030b2f7727
SHA18ea1dd666bd307e62e32d18af031f7c34b7d860e
SHA2569a795ddb10aff9fb354760578a2c53fd25063b7da3085cdb86a6e0812a66b836
SHA512c4442504cd2ddcf83bf578fd2f42903be69c42f92e4f03ddc9135b8783b31419bb8b8c39a7cb494e229ce7f569b332bbc551936ba96d40602e1bb7bd426f70f4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59f4171f2a46175cf575c88d5567a1a62
SHA1ba557e11d7600fa67cc885bdbcdb52a0b7978c30
SHA256796e8fbbffe06caff2ee76122296899a9f0ab54fb96706a7d353c78b3b44eb49
SHA512b0bf0a8294d395216dd1b0d5ec944edd4490ba539b20eb19294b22ee6542893a38e31546024fbcc9ee02dcb21c1d136c733c898dcac32fe079bfc36586aae7c8
-
Filesize
1.7MB
MD5df3f748a0a7c53a897301bf2ad9c907c
SHA12cb10732e468458f508a31bb6ec239b1a2972a67
SHA256ba6db366d4aca3137688890e46e119d4c7381a59f699fe3f533e30906a09349f
SHA5129a95e7cdffb4c2f02d15bdb1fd233c28656554cb30c5747b9343d897bc826d244d8bcb947828d4aec3193340ee1136d664d5516062e0a4e9be87986de828aff6
-
Filesize
1.7MB
MD52731bd4d41da91f925ef4b70e9fa4228
SHA178a5beb657b31691ee6d470559eff499760055b5
SHA256119e4542a010f011d538d976e3a0b4eaf300a6148677ac7f78618a9287809eef
SHA5120971bed2c1f652397eb66b4e93a4c6e953379eb147e6897784865cffd833ca6e17814afee08d35dbe4e0013d9e651752366bbc52f032eb1ae36e42350f102f6a
-
Filesize
1.7MB
MD50a2812abc142454aa8502736da49c399
SHA1952c0669ba55742fcd6d376c452bd7c7bac725b2
SHA2561434f8ebbd375b1d9be498213934eb0d9eff099fa16bee66d904f33fd7d5d480
SHA5120f12ae58cf48f517de190c7f635ea4e8293cb9bc9ff0418ecf63be972800737eccc41382c2dec406f4731e010d7720bfbb237271d31f5dbb53082e54fdeec97d
-
Filesize
1.7MB
MD54f540f96e936ce9bf57d25ce4251d82b
SHA1042897381ac1381d17093a778ff4e8740c1d5668
SHA256c127d842c8946412bd14562c27c2b74b146f7943024e70764959dd22949e382e
SHA512d5c617825d4a21421ed12eea1db69c0c0304af0087293aaadc847503b4b1d676011bbeaf54b5932f81b3e8c790e4b989515af1ef3e67da60b216c76c92c348df
-
Filesize
1.7MB
MD5e702bf00254ce0751b7b2b45cd7f60bf
SHA1b1add3ee25ba94c48c70f6cf867e9aa3820cd52a
SHA256a2739b8cdb01c8806f27956e35f30d43105ac7dd5962c39282b2b014e77138e9
SHA5127db299065a8aef103bd049c86bda4208b0ab4be749baf142499986503fc38c449492b5c673fefcdbdb41949a1d353de25eca3a4cb52017aa7a08f36fb9bfc993