Analysis
-
max time kernel
7s -
max time network
9s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02/03/2025, 20:57
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral3
Sample
XClient.exe
Resource
win11-20250217-en
Errors
General
-
Target
XClient.exe
-
Size
336KB
-
MD5
5fcc047b04b088650ffab33ab0d3a991
-
SHA1
310de3660d360e55e02aeabc2bb96fe1a00fbeb1
-
SHA256
227dbbb256d5236819196deda5707bc6abd1df5ba9a483edf82443ad12f26930
-
SHA512
5bc2803bb1fbcd18b33f7c23120fa144cb29c07376c40622f20d69386932bbf82e8160ec7ec11c781a0624a875ee198369c7b2cf8b2464986054d7c5d94c4cf4
-
SSDEEP
6144:gv9QxBt25x/5bTgVziHzZnSKrCbYM+2ba8Mq:NxBt8/5/gVziHlBrCbYP85
Malware Config
Extracted
xworm
5.0
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/4888-1-0x000002B31DCA0000-0x000002B31DCFA000-memory.dmp family_xworm behavioral2/memory/4888-424-0x000002B338520000-0x000002B338548000-memory.dmp family_xworm -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 1840 created 1056 1840 WerFault.exe 17 PID 4848 created 620 4848 WerFault.exe 5 -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 4640 created 1056 4640 svchost.exe 17 PID 4640 created 620 4640 svchost.exe 5 PID 4640 created 1056 4640 svchost.exe 17 -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1992 powershell.exe 4116 powershell.exe 5032 powershell.exe 800 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000\Control Panel\International\Geo\Nation XClient.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XClient.exe -
Executes dropped EXE 1 IoCs
pid Process 4344 41lxku4l.lo5.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-WindowsUpdateClient%4Operational.evtx svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" XClient.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\A: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\B: svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 14 pastebin.com 15 pastebin.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 wmiprvse.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache\26\52C64B7E svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ExtendedProperties\LID = "0018401296910988" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2340 SCHTASKS.exe 4356 SCHTASKS.exe 236 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 864 WerFault.exe 864 WerFault.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 1420 WerFault.exe 1420 WerFault.exe 4640 svchost.exe 4640 svchost.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4640 svchost.exe 4640 svchost.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4040 WerFault.exe 4040 WerFault.exe 4640 svchost.exe 4640 svchost.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe 4344 41lxku4l.lo5.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4888 XClient.exe Token: SeDebugPrivilege 4344 41lxku4l.lo5.exe Token: SeShutdownPrivilege 3552 Explorer.EXE Token: SeCreatePagefilePrivilege 3552 Explorer.EXE Token: SeShutdownPrivilege 3552 Explorer.EXE Token: SeCreatePagefilePrivilege 3552 Explorer.EXE Token: SeAuditPrivilege 2272 svchost.exe Token: SeShutdownPrivilege 3552 Explorer.EXE Token: SeCreatePagefilePrivilege 3552 Explorer.EXE Token: SeShutdownPrivilege 3552 Explorer.EXE Token: SeCreatePagefilePrivilege 3552 Explorer.EXE Token: SeShutdownPrivilege 3552 Explorer.EXE Token: SeCreatePagefilePrivilege 3552 Explorer.EXE Token: SeShutdownPrivilege 3552 Explorer.EXE Token: SeCreatePagefilePrivilege 3552 Explorer.EXE Token: SeShutdownPrivilege 3552 Explorer.EXE Token: SeCreatePagefilePrivilege 3552 Explorer.EXE Token: SeShutdownPrivilege 3552 Explorer.EXE Token: SeCreatePagefilePrivilege 3552 Explorer.EXE Token: SeShutdownPrivilege 3552 Explorer.EXE Token: SeCreatePagefilePrivilege 3552 Explorer.EXE Token: SeShutdownPrivilege 3552 Explorer.EXE Token: SeCreatePagefilePrivilege 3552 Explorer.EXE Token: SeShutdownPrivilege 3552 Explorer.EXE Token: SeCreatePagefilePrivilege 3552 Explorer.EXE Token: SeShutdownPrivilege 3552 Explorer.EXE Token: SeCreatePagefilePrivilege 3552 Explorer.EXE Token: SeShutdownPrivilege 3552 Explorer.EXE Token: SeCreatePagefilePrivilege 3552 Explorer.EXE Token: SeShutdownPrivilege 3552 Explorer.EXE Token: SeCreatePagefilePrivilege 3552 Explorer.EXE Token: SeShutdownPrivilege 4460 svchost.exe Token: SeCreatePagefilePrivilege 4460 svchost.exe Token: SeShutdownPrivilege 4460 svchost.exe Token: SeCreatePagefilePrivilege 4460 svchost.exe Token: SeShutdownPrivilege 4460 svchost.exe Token: SeCreatePagefilePrivilege 4460 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2072 svchost.exe Token: SeIncreaseQuotaPrivilege 2072 svchost.exe Token: SeSecurityPrivilege 2072 svchost.exe Token: SeTakeOwnershipPrivilege 2072 svchost.exe Token: SeLoadDriverPrivilege 2072 svchost.exe Token: SeBackupPrivilege 2072 svchost.exe Token: SeRestorePrivilege 2072 svchost.exe Token: SeShutdownPrivilege 2072 svchost.exe Token: SeSystemEnvironmentPrivilege 2072 svchost.exe Token: SeManageVolumePrivilege 2072 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2072 svchost.exe Token: SeIncreaseQuotaPrivilege 2072 svchost.exe Token: SeSecurityPrivilege 2072 svchost.exe Token: SeTakeOwnershipPrivilege 2072 svchost.exe Token: SeLoadDriverPrivilege 2072 svchost.exe Token: SeSystemtimePrivilege 2072 svchost.exe Token: SeBackupPrivilege 2072 svchost.exe Token: SeRestorePrivilege 2072 svchost.exe Token: SeShutdownPrivilege 2072 svchost.exe Token: SeSystemEnvironmentPrivilege 2072 svchost.exe Token: SeUndockPrivilege 2072 svchost.exe Token: SeManageVolumePrivilege 2072 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2072 svchost.exe Token: SeIncreaseQuotaPrivilege 2072 svchost.exe Token: SeSecurityPrivilege 2072 svchost.exe Token: SeTakeOwnershipPrivilege 2072 svchost.exe Token: SeLoadDriverPrivilege 2072 svchost.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3552 Explorer.EXE 3552 Explorer.EXE 3552 Explorer.EXE -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3552 Explorer.EXE 3552 Explorer.EXE 3552 Explorer.EXE 3552 Explorer.EXE 3552 Explorer.EXE 3552 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3552 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 4344 4888 XClient.exe 84 PID 4888 wrote to memory of 4344 4888 XClient.exe 84 PID 4888 wrote to memory of 2340 4888 XClient.exe 85 PID 4888 wrote to memory of 2340 4888 XClient.exe 85 PID 4344 wrote to memory of 620 4344 41lxku4l.lo5.exe 5 PID 4344 wrote to memory of 684 4344 41lxku4l.lo5.exe 7 PID 4344 wrote to memory of 968 4344 41lxku4l.lo5.exe 12 PID 4344 wrote to memory of 472 4344 41lxku4l.lo5.exe 13 PID 4344 wrote to memory of 764 4344 41lxku4l.lo5.exe 14 PID 4344 wrote to memory of 628 4344 41lxku4l.lo5.exe 15 PID 4344 wrote to memory of 868 4344 41lxku4l.lo5.exe 16 PID 4344 wrote to memory of 1056 4344 41lxku4l.lo5.exe 17 PID 4344 wrote to memory of 1080 4344 41lxku4l.lo5.exe 18 PID 4344 wrote to memory of 1172 4344 41lxku4l.lo5.exe 19 PID 4344 wrote to memory of 1216 4344 41lxku4l.lo5.exe 20 PID 4344 wrote to memory of 1288 4344 41lxku4l.lo5.exe 22 PID 4344 wrote to memory of 1344 4344 41lxku4l.lo5.exe 23 PID 4344 wrote to memory of 1472 4344 41lxku4l.lo5.exe 24 PID 4344 wrote to memory of 1496 4344 41lxku4l.lo5.exe 25 PID 4344 wrote to memory of 1504 4344 41lxku4l.lo5.exe 26 PID 4344 wrote to memory of 1516 4344 41lxku4l.lo5.exe 27 PID 4344 wrote to memory of 1592 4344 41lxku4l.lo5.exe 28 PID 4344 wrote to memory of 1708 4344 41lxku4l.lo5.exe 29 PID 4344 wrote to memory of 1748 4344 41lxku4l.lo5.exe 30 PID 4344 wrote to memory of 1792 4344 41lxku4l.lo5.exe 31 PID 4344 wrote to memory of 1916 4344 41lxku4l.lo5.exe 32 PID 4344 wrote to memory of 2044 4344 41lxku4l.lo5.exe 33 PID 4344 wrote to memory of 1152 4344 41lxku4l.lo5.exe 34 PID 4344 wrote to memory of 1212 4344 41lxku4l.lo5.exe 35 PID 4344 wrote to memory of 1656 4344 41lxku4l.lo5.exe 36 PID 4344 wrote to memory of 2072 4344 41lxku4l.lo5.exe 37 PID 4344 wrote to memory of 2116 4344 41lxku4l.lo5.exe 38 PID 4344 wrote to memory of 2264 4344 41lxku4l.lo5.exe 39 PID 4344 wrote to memory of 2412 4344 41lxku4l.lo5.exe 41 PID 4344 wrote to memory of 2420 4344 41lxku4l.lo5.exe 42 PID 4344 wrote to memory of 2688 4344 41lxku4l.lo5.exe 43 PID 4344 wrote to memory of 2700 4344 41lxku4l.lo5.exe 44 PID 4344 wrote to memory of 2836 4344 41lxku4l.lo5.exe 46 PID 4344 wrote to memory of 2844 4344 41lxku4l.lo5.exe 47 PID 4344 wrote to memory of 2876 4344 41lxku4l.lo5.exe 48 PID 4344 wrote to memory of 2884 4344 41lxku4l.lo5.exe 49 PID 4344 wrote to memory of 3032 4344 41lxku4l.lo5.exe 50 PID 4344 wrote to memory of 2272 4344 41lxku4l.lo5.exe 51 PID 4344 wrote to memory of 3076 4344 41lxku4l.lo5.exe 52 PID 4344 wrote to memory of 3104 4344 41lxku4l.lo5.exe 53 PID 4344 wrote to memory of 3124 4344 41lxku4l.lo5.exe 54 PID 4344 wrote to memory of 3376 4344 41lxku4l.lo5.exe 55 PID 4344 wrote to memory of 3432 4344 41lxku4l.lo5.exe 56 PID 4344 wrote to memory of 3552 4344 41lxku4l.lo5.exe 57 PID 4344 wrote to memory of 3812 4344 41lxku4l.lo5.exe 58 PID 4344 wrote to memory of 4052 4344 41lxku4l.lo5.exe 60 PID 4344 wrote to memory of 4132 4344 41lxku4l.lo5.exe 62 PID 4344 wrote to memory of 4376 4344 41lxku4l.lo5.exe 63 PID 4344 wrote to memory of 2360 4344 41lxku4l.lo5.exe 66 PID 4344 wrote to memory of 5060 4344 41lxku4l.lo5.exe 68 PID 4344 wrote to memory of 4756 4344 41lxku4l.lo5.exe 69 PID 4344 wrote to memory of 1192 4344 41lxku4l.lo5.exe 70 PID 4344 wrote to memory of 4968 4344 41lxku4l.lo5.exe 71 PID 4344 wrote to memory of 1200 4344 41lxku4l.lo5.exe 72 PID 4344 wrote to memory of 3388 4344 41lxku4l.lo5.exe 73 PID 4344 wrote to memory of 3736 4344 41lxku4l.lo5.exe 74 PID 4344 wrote to memory of 4464 4344 41lxku4l.lo5.exe 75 PID 4344 wrote to memory of 3584 4344 41lxku4l.lo5.exe 76 PID 4344 wrote to memory of 992 4344 41lxku4l.lo5.exe 77 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:620
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1056
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1056 -s 25883⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1420
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1056 -s 37923⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 620 -s 4082⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:864
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:968
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:472
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:764
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:1080
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1288
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2836
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1472
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1496
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1504
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1516
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2688
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:1168
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:1892
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:3520
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:1668
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:3232
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:3408
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1708
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1748
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1792
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2044
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1152
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2116
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2264
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2412
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2844
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2876
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3032
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:3076
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:3104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:3124
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"2⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\41lxku4l.lo5.exe"C:\Users\Admin\AppData\Local\Temp\41lxku4l.lo5.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4344
-
-
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /create /tn "MasonXClient.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\XClient.exe'" /sc onlogon /rl HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2340
-
-
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /create /tn "MasonXClient.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\XClient.exe'" /sc onlogon /rl HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4356 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3212
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:1992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:4116 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2056
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:5032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:800
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:236
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3812
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4052
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4132
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4376
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:2360
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:5060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:4756
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1192
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:4968
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1200
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3388
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3736
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca1⤵PID:4464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:3584
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:992
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:3740
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2464
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:4640 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 504 -p 1056 -ip 10562⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1840
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 528 -p 620 -ip 6202⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4848
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 620 -p 1056 -ip 10562⤵PID:4368
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 532 -p 4888 -ip 48882⤵PID:1832
-
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 7678d5c5ebb4a641684c421d04f452e4 iUJhg3MNo0GLiq/pW/cUGw.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
PID:4768 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4720
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Writes to the Master Boot Record (MBR)
PID:2524
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Indicator Removal
1Clear Windows Event Logs
1Modify Registry
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5b0c989bff842e6d66645ec9af86d8568
SHA16c7f62e8894c59759f6e45d5544257bbd1df3443
SHA256174d252117a332fd8d9d521637d3d39bdece8c0e8ea4afc850c5140ca1d937af
SHA5126bdd71d67cc074ed0b244edf9414c65a2de0526ad5cb823381e18dc7a2539948742fe2f81090f2974c35007b1007e44f4894edb11b0de9729aad66bae6fa62af
-
Filesize
13KB
MD51dd6ce079aef2449a6841fd63440dbc4
SHA18a30e3870608ba41533128eb8d40fd0bd800ff87
SHA256cbcaddfd9b1467e5d400d52a49604e1fd4c288a4b3fa49aaaafe012b0ac27213
SHA5127a223421149b84d82f9e60c26c1d585a707635a462906578f0abb2f5d1835efa1acbff91d966148c70832b563bdc9531c73fdb2ee937902cf98897b71e9ca155
-
Filesize
36KB
MD5b7516b7967f51c24c486d78fe3337699
SHA1eab4727942cf66f0c8e9262fa59af2394fe6b40d
SHA25648b9117f4d2083851824b9086dc36e6b2ecbf30faf4063e4afcafc0a7e93a4fc
SHA512b360595d17e58cf7c2ffcecafd70002a2c37c22ad61a694b0b75c7248456687f52ac889b2af55ce5dc6c19604bf372390cd593d5ead082f041df3924dd77d207
-
Filesize
13KB
MD5b3b43cc667730d6d3b7c079d0cee4c6a
SHA153e467f9ddca1d2a60e3c5ba1420fa9b33c08775
SHA256aefd7eddc68cdbc86fc4361884ce3e146f109cdb2f83bc9cfecb404b5c763e23
SHA51267d96c2e343f3592c1080f9a6fb5147065c7d3f1d80c0c43acae1cbf0b954a92906b6579b8746a81d8cf6ff3798c80aa48ec8f44560cd280f18646efd6f364b1
-
Filesize
35KB
MD54792ac2c90578290a070ac4959f21023
SHA119609fb4369a0d0ce7d709e27439fd827be5c9c4
SHA2569444960d231dbaa253396130e28c78aa96340db8239dd45fab4f9b691fe7ddb8
SHA512e9c4e672d48374becf7097b39179a60811b83b88bac4465d8a28c3fc578714622f9213023afeecdba93112c1050fdf7677c4988aa15e7bbd16f87628c438d16a
-
Filesize
13KB
MD5dbf51cb1a15ad456526834fe1560cf01
SHA1bc067fc6d12e153668a88b8195cb27f7dccb43ed
SHA2565b6ad16622f4376ba0fa330eaa43f8db04abbbdfae9bb0216d974d834f1cf460
SHA512d29df95a863ff7147de08afd3d958ab7bd6b63def68780de59b0948b4a56a74aa96777b238c02f85697cc47e8c756dacb459b017ecd6799b9cd5f5db181197eb
-
Filesize
35KB
MD59eae59c40b6a4c0a3f7f4256dab1c561
SHA15789b821c2050ae25e2c398f1c16d495fc73e0b1
SHA256da869c729148eae4d25ae16a7a8679c99927721fc5929bbfa55442e3e64fe268
SHA512afb00cf4510aa8e5aa226a7d5dba9f237dccf6c697a505ef1e7b026d63bbdb0a9b84d9a7667ae9ccfec3efb174cf241e6b42a371da24ea71d252f022b68bfb2a
-
Filesize
13KB
MD5d0c28da256036c1aa9b7a93dc333001a
SHA1771a4b1c49468bace979cb93566b3eb565dce989
SHA256562f8debd517f05fc7914a23428ed631753697e2626a432232834b713cd4b22e
SHA5121225d88ccf57822c76d0bb69c66efb97973f046fe583d07710963637f47c3f77899a9e74873cf6921d09d08e93ce508707bf8efc1039d7aa57355a09c28d9dd3
-
Filesize
161KB
MD594f1ab3a068f83b32639579ec9c5d025
SHA138f3d5bc5de46feb8de093d11329766b8e2054ae
SHA256879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0
SHA51244d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c