Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10b4d16a23c4...cd.exe
windows7-x64
10b4d16a23c4...cd.exe
windows10-2004-x64
10b4eca0b762...e1.exe
windows7-x64
1b4eca0b762...e1.exe
windows10-2004-x64
1b4f9f36ada...07.exe
windows7-x64
10b4f9f36ada...07.exe
windows10-2004-x64
10b5002c08a1...bc.exe
windows7-x64
10b5002c08a1...bc.exe
windows10-2004-x64
10b55e92f4a2...a6.exe
windows7-x64
10b55e92f4a2...a6.exe
windows10-2004-x64
10b5687bfac8...82.exe
windows7-x64
10b5687bfac8...82.exe
windows10-2004-x64
10b580ffe62d...98.exe
windows7-x64
7b580ffe62d...98.exe
windows10-2004-x64
7b599b9b1d6...6f.exe
windows7-x64
7b599b9b1d6...6f.exe
windows10-2004-x64
10b5ac1858b7...1a.exe
windows7-x64
5b5ac1858b7...1a.exe
windows10-2004-x64
5b65e1ac2a1...74.exe
windows7-x64
10b65e1ac2a1...74.exe
windows10-2004-x64
10b67576c827...e2.exe
windows7-x64
10b67576c827...e2.exe
windows10-2004-x64
10b68768d198...a8.exe
windows7-x64
7b68768d198...a8.exe
windows10-2004-x64
7b6982d011a...3b.exe
windows7-x64
10b6982d011a...3b.exe
windows10-2004-x64
10b6b7f4db83...cc.exe
windows7-x64
3b6b7f4db83...cc.exe
windows10-2004-x64
3b6baedc86e...7b.exe
windows7-x64
10b6baedc86e...7b.exe
windows10-2004-x64
10b6cd4cbecb...e2.exe
windows7-x64
10b6cd4cbecb...e2.exe
windows10-2004-x64
10Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:15
Behavioral task
behavioral1
Sample
b4d16a23c4f84119b08271727b504dc277cc03929f4437c01640b9fe610474cd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4d16a23c4f84119b08271727b504dc277cc03929f4437c01640b9fe610474cd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
b4eca0b7629d60f6cf396e664ca50add98b7376955d993c98d1399bab2da9ae1.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
b4eca0b7629d60f6cf396e664ca50add98b7376955d993c98d1399bab2da9ae1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
b4f9f36ada3d9d3cf8af85679ea3a007.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
b4f9f36ada3d9d3cf8af85679ea3a007.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
b55e92f4a25bac9a1f90a8cf3d7ef9c91d1649598d692eb497d8fed1f20a97a6.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
b55e92f4a25bac9a1f90a8cf3d7ef9c91d1649598d692eb497d8fed1f20a97a6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
b5687bfac89811969dd02dad17352b82.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
b5687bfac89811969dd02dad17352b82.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
b580ffe62d19e702d07e69a2f421a298.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
b580ffe62d19e702d07e69a2f421a298.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
b599b9b1d6311136ef7c416782fdd16f.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
b599b9b1d6311136ef7c416782fdd16f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
b5ac1858b7313eca6ad65f6506620f1a.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
b5ac1858b7313eca6ad65f6506620f1a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
b65e1ac2a1c32fcf66f67031ebe907e9ca4e1a7cbae7589979b1eba091b6e174.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
b65e1ac2a1c32fcf66f67031ebe907e9ca4e1a7cbae7589979b1eba091b6e174.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
b67576c827f1d682c6863ee2e1b096afb845073be33737653fa7754565634ce2.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
b67576c827f1d682c6863ee2e1b096afb845073be33737653fa7754565634ce2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
b68768d198b634640052e1541b761c4940795292cb1bc0cd4349a7c9d1292da8.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
b68768d198b634640052e1541b761c4940795292cb1bc0cd4349a7c9d1292da8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
b6982d011a327e88728cfc8b6305503b.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
b6982d011a327e88728cfc8b6305503b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
b6b7f4db83367b212cbd15bcfaa2eacc.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
b6b7f4db83367b212cbd15bcfaa2eacc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
b6baedc86ebdd4c9c3cc812f509f777b.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
b6baedc86ebdd4c9c3cc812f509f777b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
b6cd4cbecbd20d06768408f952a13721fb22fdbeca097913deeebe41a41b3ae2.exe
Resource
win7-20240903-en
General
-
Target
b6982d011a327e88728cfc8b6305503b.exe
-
Size
999KB
-
MD5
b6982d011a327e88728cfc8b6305503b
-
SHA1
062fa217e9e470a4519cf52317103cebe8df8d20
-
SHA256
219bf63bcfc9f321c2a5c0ca3aca0e5dfff80d7dd75537ebf2e7df9aac879ec1
-
SHA512
32523771889fa8ad9bba0b0a4537ec8794b29a4ef68d3084e3886162bb2fdefd8251924a042bad7b5b28ef14b08aa3b81478195530c6875e78878c7355bee910
-
SSDEEP
12288:H9pLLk45WSSY1BX6f4bIS7rMNetPfC9Vs6IFGs0jxAqXj9xPSI0dzNgCoD7WX+Iu:H9pP5WS3lrMNyC9TJPCXBi
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\", \"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\ProgramData\\Microsoft\\lsass.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\WmiPrvSE.exe\", \"C:\\Program Files\\Windows Defender\\es-ES\\csrss.exe\", \"C:\\ProgramData\\Start Menu\\explorer.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\", \"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\ProgramData\\Microsoft\\lsass.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\WmiPrvSE.exe\", \"C:\\Program Files\\Windows Defender\\es-ES\\csrss.exe\", \"C:\\ProgramData\\Start Menu\\explorer.exe\", \"C:\\Windows\\debug\\services.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\Users\\Default\\Cookies\\smss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\de-DE\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\System.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\", \"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\ProgramData\\Microsoft\\lsass.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\WmiPrvSE.exe\", \"C:\\Program Files\\Windows Defender\\es-ES\\csrss.exe\", \"C:\\ProgramData\\Start Menu\\explorer.exe\", \"C:\\Windows\\debug\\services.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\", \"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\ProgramData\\Microsoft\\lsass.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\WmiPrvSE.exe\", \"C:\\Program Files\\Windows Defender\\es-ES\\csrss.exe\", \"C:\\ProgramData\\Start Menu\\explorer.exe\", \"C:\\Windows\\debug\\services.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\Users\\Default\\Cookies\\smss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\de-DE\\OSPPSVC.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\", \"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\ProgramData\\Microsoft\\lsass.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\WmiPrvSE.exe\", \"C:\\Program Files\\Windows Defender\\es-ES\\csrss.exe\", \"C:\\ProgramData\\Start Menu\\explorer.exe\", \"C:\\Windows\\debug\\services.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\Users\\Default\\Cookies\\smss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\de-DE\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\WmiPrvSE.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\", \"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\ProgramData\\Microsoft\\lsass.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\WmiPrvSE.exe\", \"C:\\Program Files\\Windows Defender\\es-ES\\csrss.exe\", \"C:\\ProgramData\\Start Menu\\explorer.exe\", \"C:\\Windows\\debug\\services.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\Users\\Default\\Cookies\\smss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\de-DE\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Windows\\Logs\\HomeGroup\\wininit.exe\", \"C:\\Users\\Default\\Downloads\\csrss.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\", \"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\b6982d011a327e88728cfc8b6305503b.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\", \"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\ProgramData\\Microsoft\\lsass.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\", \"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\ProgramData\\Microsoft\\lsass.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\WmiPrvSE.exe\", \"C:\\Program Files\\Windows Defender\\es-ES\\csrss.exe\", \"C:\\ProgramData\\Start Menu\\explorer.exe\", \"C:\\Windows\\debug\\services.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\WmiPrvSE.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\", \"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\ProgramData\\Microsoft\\lsass.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\WmiPrvSE.exe\", \"C:\\Program Files\\Windows Defender\\es-ES\\csrss.exe\", \"C:\\ProgramData\\Start Menu\\explorer.exe\", \"C:\\Windows\\debug\\services.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\b6982d011a327e88728cfc8b6305503b.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\", \"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\", \"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\ProgramData\\Microsoft\\lsass.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\WmiPrvSE.exe\", \"C:\\Program Files\\Windows Defender\\es-ES\\csrss.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\", \"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\ProgramData\\Microsoft\\lsass.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\WmiPrvSE.exe\", \"C:\\Program Files\\Windows Defender\\es-ES\\csrss.exe\", \"C:\\ProgramData\\Start Menu\\explorer.exe\", \"C:\\Windows\\debug\\services.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\Users\\Default\\Cookies\\smss.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\", \"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\ProgramData\\Microsoft\\lsass.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\WmiPrvSE.exe\", \"C:\\Program Files\\Windows Defender\\es-ES\\csrss.exe\", \"C:\\ProgramData\\Start Menu\\explorer.exe\", \"C:\\Windows\\debug\\services.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\Users\\Default\\Cookies\\smss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\de-DE\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Windows\\Logs\\HomeGroup\\wininit.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\", \"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\ProgramData\\Microsoft\\lsass.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\csrss.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\Favorites\\spoolsv.exe\", \"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\b6982d011a327e88728cfc8b6305503b.exe\", \"C:\\ProgramData\\Microsoft\\lsass.exe\", \"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\WmiPrvSE.exe\"" b6982d011a327e88728cfc8b6305503b.exe -
Process spawned unexpected child process 64 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2808 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2796 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2788 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3060 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2856 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2832 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2692 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2396 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2732 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2112 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2208 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1856 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1772 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 908 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1804 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1872 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2116 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3044 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2848 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2732 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2808 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1140 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2968 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2988 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2428 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1136 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2952 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1544 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3012 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1904 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1200 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2040 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2856 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2636 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2820 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2560 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2388 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 584 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1908 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1184 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2368 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1816 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1256 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2176 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2088 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1640 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2484 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1092 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 844 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 760 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1060 2324 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2304 2324 schtasks.exe 30 -
Executes dropped EXE 2 IoCs
pid Process 1580 b6982d011a327e88728cfc8b6305503b.exe 2480 services.exe -
Adds Run key to start application 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\ProgramData\\Microsoft\\lsass.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\System.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Users\\Public\\Favorites\\spoolsv.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\csrss.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Windows Defender\\es-ES\\csrss.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Program Files\\VideoLAN\\VLC\\WmiPrvSE.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b6982d011a327e88728cfc8b6305503b = "\"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\b6982d011a327e88728cfc8b6305503b.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\WmiPrvSE.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b6982d011a327e88728cfc8b6305503b = "\"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\b6982d011a327e88728cfc8b6305503b.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Users\\Default\\Cookies\\smss.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files (x86)\\Windows Mail\\de-DE\\OSPPSVC.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\WmiPrvSE.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\Logs\\HomeGroup\\wininit.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files\\Internet Explorer\\images\\OSPPSVC.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\ProgramData\\Start Menu\\explorer.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Windows\\debug\\services.exe\"" b6982d011a327e88728cfc8b6305503b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\Default\\Downloads\\csrss.exe\"" b6982d011a327e88728cfc8b6305503b.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\images\1610b97d3ab4a7 b6982d011a327e88728cfc8b6305503b.exe File created C:\Program Files\VideoLAN\VLC\WmiPrvSE.exe b6982d011a327e88728cfc8b6305503b.exe File created C:\Program Files\VideoLAN\VLC\24dbde2999530e b6982d011a327e88728cfc8b6305503b.exe File created C:\Program Files (x86)\Windows Mail\de-DE\1610b97d3ab4a7 b6982d011a327e88728cfc8b6305503b.exe File created C:\Program Files (x86)\Windows Mail\fr-FR\24dbde2999530e b6982d011a327e88728cfc8b6305503b.exe File created C:\Program Files\Internet Explorer\images\OSPPSVC.exe b6982d011a327e88728cfc8b6305503b.exe File opened for modification C:\Program Files\Internet Explorer\images\OSPPSVC.exe b6982d011a327e88728cfc8b6305503b.exe File created C:\Program Files\Windows Defender\es-ES\886983d96e3d3e b6982d011a327e88728cfc8b6305503b.exe File created C:\Program Files (x86)\Windows Mail\de-DE\OSPPSVC.exe b6982d011a327e88728cfc8b6305503b.exe File opened for modification C:\Program Files (x86)\Windows Mail\fr-FR\WmiPrvSE.exe b6982d011a327e88728cfc8b6305503b.exe File opened for modification C:\Program Files\Windows Defender\es-ES\csrss.exe b6982d011a327e88728cfc8b6305503b.exe File opened for modification C:\Program Files\VideoLAN\VLC\WmiPrvSE.exe b6982d011a327e88728cfc8b6305503b.exe File opened for modification C:\Program Files\Internet Explorer\images\RCXC1BD.tmp b6982d011a327e88728cfc8b6305503b.exe File opened for modification C:\Program Files\Internet Explorer\images\RCXC1BE.tmp b6982d011a327e88728cfc8b6305503b.exe File created C:\Program Files (x86)\Windows Mail\fr-FR\WmiPrvSE.exe b6982d011a327e88728cfc8b6305503b.exe File created C:\Program Files\Windows Defender\es-ES\csrss.exe b6982d011a327e88728cfc8b6305503b.exe File opened for modification C:\Program Files (x86)\Windows Mail\de-DE\OSPPSVC.exe b6982d011a327e88728cfc8b6305503b.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\debug\services.exe b6982d011a327e88728cfc8b6305503b.exe File created C:\Windows\debug\c5b4cb5e9653cc b6982d011a327e88728cfc8b6305503b.exe File created C:\Windows\Logs\HomeGroup\wininit.exe b6982d011a327e88728cfc8b6305503b.exe File created C:\Windows\Logs\HomeGroup\56085415360792 b6982d011a327e88728cfc8b6305503b.exe File opened for modification C:\Windows\debug\services.exe b6982d011a327e88728cfc8b6305503b.exe File opened for modification C:\Windows\Logs\HomeGroup\wininit.exe b6982d011a327e88728cfc8b6305503b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2484 schtasks.exe 908 schtasks.exe 1804 schtasks.exe 2988 schtasks.exe 2856 schtasks.exe 2908 schtasks.exe 2848 schtasks.exe 1904 schtasks.exe 1640 schtasks.exe 760 schtasks.exe 2304 schtasks.exe 2760 schtasks.exe 2396 schtasks.exe 2856 schtasks.exe 1656 schtasks.exe 2368 schtasks.exe 1060 schtasks.exe 3036 schtasks.exe 2968 schtasks.exe 844 schtasks.exe 2808 schtasks.exe 2748 schtasks.exe 2440 schtasks.exe 2788 schtasks.exe 2640 schtasks.exe 2116 schtasks.exe 1136 schtasks.exe 3012 schtasks.exe 1628 schtasks.exe 1816 schtasks.exe 2692 schtasks.exe 3044 schtasks.exe 1544 schtasks.exe 2640 schtasks.exe 2832 schtasks.exe 1856 schtasks.exe 1200 schtasks.exe 1140 schtasks.exe 2384 schtasks.exe 2636 schtasks.exe 1888 schtasks.exe 2820 schtasks.exe 1872 schtasks.exe 2428 schtasks.exe 2388 schtasks.exe 1908 schtasks.exe 1256 schtasks.exe 1092 schtasks.exe 2668 schtasks.exe 3060 schtasks.exe 3020 schtasks.exe 584 schtasks.exe 2112 schtasks.exe 2208 schtasks.exe 2040 schtasks.exe 2732 schtasks.exe 1684 schtasks.exe 2176 schtasks.exe 2140 schtasks.exe 2088 schtasks.exe 2796 schtasks.exe 1772 schtasks.exe 2904 schtasks.exe 2560 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2428 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe 1580 b6982d011a327e88728cfc8b6305503b.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2428 b6982d011a327e88728cfc8b6305503b.exe Token: SeDebugPrivilege 1580 b6982d011a327e88728cfc8b6305503b.exe Token: SeDebugPrivilege 2480 services.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2976 2428 b6982d011a327e88728cfc8b6305503b.exe 43 PID 2428 wrote to memory of 2976 2428 b6982d011a327e88728cfc8b6305503b.exe 43 PID 2428 wrote to memory of 2976 2428 b6982d011a327e88728cfc8b6305503b.exe 43 PID 2976 wrote to memory of 2384 2976 cmd.exe 102 PID 2976 wrote to memory of 2384 2976 cmd.exe 102 PID 2976 wrote to memory of 2384 2976 cmd.exe 102 PID 2976 wrote to memory of 1580 2976 cmd.exe 47 PID 2976 wrote to memory of 1580 2976 cmd.exe 47 PID 2976 wrote to memory of 1580 2976 cmd.exe 47 PID 1580 wrote to memory of 2596 1580 b6982d011a327e88728cfc8b6305503b.exe 104 PID 1580 wrote to memory of 2596 1580 b6982d011a327e88728cfc8b6305503b.exe 104 PID 1580 wrote to memory of 2596 1580 b6982d011a327e88728cfc8b6305503b.exe 104 PID 2596 wrote to memory of 2724 2596 cmd.exe 106 PID 2596 wrote to memory of 2724 2596 cmd.exe 106 PID 2596 wrote to memory of 2724 2596 cmd.exe 106 PID 2596 wrote to memory of 2480 2596 cmd.exe 107 PID 2596 wrote to memory of 2480 2596 cmd.exe 107 PID 2596 wrote to memory of 2480 2596 cmd.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6982d011a327e88728cfc8b6305503b.exe"C:\Users\Admin\AppData\Local\Temp\b6982d011a327e88728cfc8b6305503b.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ar0OY31ljn.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\b6982d011a327e88728cfc8b6305503b.exe"C:\Users\Admin\AppData\Local\Temp\b6982d011a327e88728cfc8b6305503b.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\faDLbbQ0dW.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵PID:2724
-
-
C:\Windows\debug\services.exe"C:\Windows\debug\services.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Favorites\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Public\Favorites\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONSTART /tr "'C:\Users\Public\Favorites\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Favorites\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc MINUTE /mo 13 /tr "'C:\Program Files\Internet Explorer\images\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\images\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONSTART /tr "'C:\Program Files\Internet Explorer\images\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 13 /tr "'C:\Program Files\Internet Explorer\images\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
PID:2808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "b6982d011a327e88728cfc8b6305503b" /sc MINUTE /mo 7 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\b6982d011a327e88728cfc8b6305503b.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "b6982d011a327e88728cfc8b6305503b" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\b6982d011a327e88728cfc8b6305503b.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "b6982d011a327e88728cfc8b6305503b" /sc ONSTART /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\b6982d011a327e88728cfc8b6305503b.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "b6982d011a327e88728cfc8b6305503bb" /sc MINUTE /mo 10 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\b6982d011a327e88728cfc8b6305503b.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc MINUTE /mo 8 /tr "'C:\ProgramData\Microsoft\lsass.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:3036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\ProgramData\Microsoft\lsass.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:2668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONSTART /tr "'C:\ProgramData\Microsoft\lsass.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:2140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\ProgramData\Microsoft\lsass.exe'" /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:1656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc MINUTE /mo 6 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONSTART /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Mail\fr-FR\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\fr-FR\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONSTART /tr "'C:\Program Files (x86)\Windows Mail\fr-FR\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Mail\fr-FR\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Defender\es-ES\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\es-ES\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONSTART /tr "'C:\Program Files\Windows Defender\es-ES\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender\es-ES\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc MINUTE /mo 14 /tr "'C:\ProgramData\Start Menu\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\ProgramData\Start Menu\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONSTART /tr "'C:\ProgramData\Start Menu\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\ProgramData\Start Menu\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc MINUTE /mo 13 /tr "'C:\Windows\debug\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\debug\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1256
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONSTART /tr "'C:\Windows\debug\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Windows\debug\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc MINUTE /mo 9 /tr "'C:\Program Files\VideoLAN\VLC\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:1184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONSTART /tr "'C:\Program Files\VideoLAN\VLC\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Program Files\VideoLAN\VLC\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "b6982d011a327e88728cfc8b6305503b" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\b6982d011a327e88728cfc8b6305503b.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "b6982d011a327e88728cfc8b6305503b" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\b6982d011a327e88728cfc8b6305503b.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "b6982d011a327e88728cfc8b6305503b" /sc ONSTART /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\b6982d011a327e88728cfc8b6305503b.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "b6982d011a327e88728cfc8b6305503bb" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\b6982d011a327e88728cfc8b6305503b.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Cookies\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Default\Cookies\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONSTART /tr "'C:\Users\Default\Cookies\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Cookies\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Mail\de-DE\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\de-DE\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:2732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONSTART /tr "'C:\Program Files (x86)\Windows Mail\de-DE\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Mail\de-DE\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc MINUTE /mo 6 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONSTART /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONSTART /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc MINUTE /mo 11 /tr "'C:\Windows\Logs\HomeGroup\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\Logs\HomeGroup\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONSTART /tr "'C:\Windows\Logs\HomeGroup\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Windows\Logs\HomeGroup\wininit.exe'" /f1⤵
- Process spawned unexpected child process
PID:2952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Downloads\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default\Downloads\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONSTART /tr "'C:\Users\Default\Downloads\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Downloads\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2988
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
999KB
MD5b6982d011a327e88728cfc8b6305503b
SHA1062fa217e9e470a4519cf52317103cebe8df8d20
SHA256219bf63bcfc9f321c2a5c0ca3aca0e5dfff80d7dd75537ebf2e7df9aac879ec1
SHA51232523771889fa8ad9bba0b0a4537ec8794b29a4ef68d3084e3886162bb2fdefd8251924a042bad7b5b28ef14b08aa3b81478195530c6875e78878c7355bee910
-
Filesize
234B
MD5d4b33b534514f4636f99da0cd9b0f3db
SHA154f999d98d7941d8f591baf89164db83891d2054
SHA256648f4683e86350a30fc6c0bc6c452dc98333af0abd9c720574fb30a8b27a1430
SHA512047531f7b01d2e4c03a50515e30d68604addd93bdf5f5798f867ca7b6b2fc48201066ff9259fd27c9f3c96da9e102a8069df442e6b1613fb55aeda5201931f97
-
Filesize
193B
MD5e12c290752d3030ec7368837b844e61d
SHA12f8817fac8c8eae252cec635f0f703c494f7a0e4
SHA2564d573cefba2b2f9d02ec9d78de91a052c1a90cf94683b51c4ff2c90742ca9c98
SHA512a30e1b01c0f1e464a9050368b288f54f90876ca0c774adbe8a31bbac36296764fe18c5c0c97dbc5d7cdd381260a35cce74a67bd7c03dbc739f8a9d550c36e7e5