Overview
overview
10Static
static
100ce8e2125c...fa.exe
windows7-x64
100ce8e2125c...fa.exe
windows10-2004-x64
100d08fd5994...a1.exe
windows7-x64
100d08fd5994...a1.exe
windows10-2004-x64
100d39a7ade0...a9.exe
windows7-x64
100d39a7ade0...a9.exe
windows10-2004-x64
100d7cbc8822...d3.exe
windows7-x64
100d7cbc8822...d3.exe
windows10-2004-x64
100da351d641...30.exe
windows7-x64
100da351d641...30.exe
windows10-2004-x64
100dcb9d68dd...81.exe
windows7-x64
100dcb9d68dd...81.exe
windows10-2004-x64
100de35a9720...08.exe
windows7-x64
30de35a9720...08.exe
windows10-2004-x64
30df2367bf9...81.exe
windows7-x64
100df2367bf9...81.exe
windows10-2004-x64
100df7144ed5...52.exe
windows7-x64
100df7144ed5...52.exe
windows10-2004-x64
100df97b99ca...e3.exe
windows7-x64
10df97b99ca...e3.exe
windows10-2004-x64
40e48a47f40...30.exe
windows7-x64
100e48a47f40...30.exe
windows10-2004-x64
100e820aad5e...54.exe
windows7-x64
100e820aad5e...54.exe
windows10-2004-x64
100ea0e36c70...d3.exe
windows7-x64
100ea0e36c70...d3.exe
windows10-2004-x64
100eb27c6385...3a.exe
windows7-x64
100eb27c6385...3a.exe
windows10-2004-x64
100ee8580c3e...ef.exe
windows7-x64
100ee8580c3e...ef.exe
windows10-2004-x64
100eed307263...f5.exe
windows7-x64
100eed307263...f5.exe
windows10-2004-x64
10Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:08
Behavioral task
behavioral1
Sample
0ce8e2125cf9b2549eeb18b14754aa2158878fc9eabcde0f54d75556492048fa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ce8e2125cf9b2549eeb18b14754aa2158878fc9eabcde0f54d75556492048fa.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
0d08fd5994f0570ef78ba20f575849b2e9c9eb01aeb29c0cd7b5c534552870a1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
0d08fd5994f0570ef78ba20f575849b2e9c9eb01aeb29c0cd7b5c534552870a1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
0d39a7ade0eaa19a185fc11508caeba9.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
0d39a7ade0eaa19a185fc11508caeba9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
0d7cbc882298f639d31191a03ec81bd3.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
0d7cbc882298f639d31191a03ec81bd3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
0da351d641066e6d8ebb95e8bcb6e030.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
0da351d641066e6d8ebb95e8bcb6e030.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
0dcb9d68dd68eefabbec3c03cc3e8381.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
0dcb9d68dd68eefabbec3c03cc3e8381.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
0de35a97204bf9ccbe98450bbae38fe0e7c92d608328b2e600bf5484b0a3b908.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
0de35a97204bf9ccbe98450bbae38fe0e7c92d608328b2e600bf5484b0a3b908.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
0df2367bf99523e1510e59310538d736cd3b125dcf0d76a09644fe7c65402f81.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
0df2367bf99523e1510e59310538d736cd3b125dcf0d76a09644fe7c65402f81.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
0df7144ed5104422c08fe0b6de1e2452.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
0df7144ed5104422c08fe0b6de1e2452.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
0df97b99ca90dd92e313196ed212ed8bb7931ed5ff381a3dbce0e0479f820ae3.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
0df97b99ca90dd92e313196ed212ed8bb7931ed5ff381a3dbce0e0479f820ae3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
0e48a47f400685a0d5ded8ad220d8f30.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
0e48a47f400685a0d5ded8ad220d8f30.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
0e820aad5e8af67e2f996c9261b1b8c500e26eab8fd99d9ec67dfecceb43aa54.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
0e820aad5e8af67e2f996c9261b1b8c500e26eab8fd99d9ec67dfecceb43aa54.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
0ea0e36c7047f7b2bf48101f2d9f62467b4bbf3749386f53ed607061ad0f0ed3.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
0ea0e36c7047f7b2bf48101f2d9f62467b4bbf3749386f53ed607061ad0f0ed3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
0eb27c638574f831cab876ce13b9043a.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
0eb27c638574f831cab876ce13b9043a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
0ee8580c3e8ccbefcf4d8b060189dd2dadfdb559b420c4a732270d7303fae6ef.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
0ee8580c3e8ccbefcf4d8b060189dd2dadfdb559b420c4a732270d7303fae6ef.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
0eed30726330520f68b4bec97e71989bc143e8755d0b918d2add30a15ce848f5.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
0eed30726330520f68b4bec97e71989bc143e8755d0b918d2add30a15ce848f5.exe
Resource
win10v2004-20250314-en
General
-
Target
0d39a7ade0eaa19a185fc11508caeba9.exe
-
Size
920KB
-
MD5
0d39a7ade0eaa19a185fc11508caeba9
-
SHA1
5083d9622465c43bc02a1edd71acd1d9ae75270c
-
SHA256
51c94ec08bddcec2e7992bb2c758e8518850b373e649ac57c9c26067715bd2ea
-
SHA512
480bbfb12c3bbde7cff197f069a9aec5558464f417c7920f0dd09e4b1ba859d9e7b7d7f552a7bad094a3ec49069ce442240be5380e2d1ee0de6cec6f514506b0
-
SSDEEP
12288:lANcYfRu9sAPayJk5cz9VBRmWAJXJmn72Rfc/G/BwG5vo5YTJRI1m2h47oJuzlZ4:lAbJwPa3YnGWnSR/uGuFQaRQj/
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\", \"C:\\ProgramData\\Microsoft Help\\lsm.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\", \"C:\\ProgramData\\Microsoft Help\\lsm.exe\", \"C:\\Users\\Default\\Links\\Idle.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\", \"C:\\ProgramData\\Microsoft Help\\lsm.exe\", \"C:\\Users\\Default\\Links\\Idle.exe\", \"C:\\Users\\Admin\\Links\\Idle.exe\", \"C:\\Windows\\SoftwareDistribution\\ScanFile\\audiodg.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\", \"C:\\ProgramData\\Microsoft Help\\lsm.exe\", \"C:\\Users\\Default\\Links\\Idle.exe\", \"C:\\Users\\Admin\\Links\\Idle.exe\", \"C:\\Windows\\SoftwareDistribution\\ScanFile\\audiodg.exe\", \"C:\\ProgramData\\Adobe\\Updater6\\csrss.exe\", \"C:\\ProgramData\\Microsoft Help\\csrss.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\", \"C:\\ProgramData\\Microsoft Help\\lsm.exe\", \"C:\\Users\\Default\\Links\\Idle.exe\", \"C:\\Users\\Admin\\Links\\Idle.exe\", \"C:\\Windows\\SoftwareDistribution\\ScanFile\\audiodg.exe\", \"C:\\ProgramData\\Adobe\\Updater6\\csrss.exe\", \"C:\\ProgramData\\Microsoft Help\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\dllhost.exe\", \"C:\\Windows\\Logs\\DPX\\explorer.exe\", \"C:\\Recovery\\18fc4542-69f6-11ef-a46c-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\CLIPART\\PUB60COR\\dllhost.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\", \"C:\\ProgramData\\Microsoft Help\\lsm.exe\", \"C:\\Users\\Default\\Links\\Idle.exe\", \"C:\\Users\\Admin\\Links\\Idle.exe\", \"C:\\Windows\\SoftwareDistribution\\ScanFile\\audiodg.exe\", \"C:\\ProgramData\\Adobe\\Updater6\\csrss.exe\", \"C:\\ProgramData\\Microsoft Help\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\dllhost.exe\", \"C:\\Windows\\Logs\\DPX\\explorer.exe\", \"C:\\Recovery\\18fc4542-69f6-11ef-a46c-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\CLIPART\\PUB60COR\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\sppsvc.exe\", \"C:\\Users\\Default\\Templates\\Idle.exe\", \"C:\\Recovery\\18fc4542-69f6-11ef-a46c-62cb582c238c\\audiodg.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\", \"C:\\ProgramData\\Microsoft Help\\lsm.exe\", \"C:\\Users\\Default\\Links\\Idle.exe\", \"C:\\Users\\Admin\\Links\\Idle.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\", \"C:\\ProgramData\\Microsoft Help\\lsm.exe\", \"C:\\Users\\Default\\Links\\Idle.exe\", \"C:\\Users\\Admin\\Links\\Idle.exe\", \"C:\\Windows\\SoftwareDistribution\\ScanFile\\audiodg.exe\", \"C:\\ProgramData\\Adobe\\Updater6\\csrss.exe\", \"C:\\ProgramData\\Microsoft Help\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\dllhost.exe\", \"C:\\Windows\\Logs\\DPX\\explorer.exe\", \"C:\\Recovery\\18fc4542-69f6-11ef-a46c-62cb582c238c\\csrss.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\", \"C:\\ProgramData\\Microsoft Help\\lsm.exe\", \"C:\\Users\\Default\\Links\\Idle.exe\", \"C:\\Users\\Admin\\Links\\Idle.exe\", \"C:\\Windows\\SoftwareDistribution\\ScanFile\\audiodg.exe\", \"C:\\ProgramData\\Adobe\\Updater6\\csrss.exe\", \"C:\\ProgramData\\Microsoft Help\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\dllhost.exe\", \"C:\\Windows\\Logs\\DPX\\explorer.exe\", \"C:\\Recovery\\18fc4542-69f6-11ef-a46c-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\CLIPART\\PUB60COR\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\sppsvc.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\", \"C:\\ProgramData\\Microsoft Help\\lsm.exe\", \"C:\\Users\\Default\\Links\\Idle.exe\", \"C:\\Users\\Admin\\Links\\Idle.exe\", \"C:\\Windows\\SoftwareDistribution\\ScanFile\\audiodg.exe\", \"C:\\ProgramData\\Adobe\\Updater6\\csrss.exe\", \"C:\\ProgramData\\Microsoft Help\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\dllhost.exe\", \"C:\\Windows\\Logs\\DPX\\explorer.exe\", \"C:\\Recovery\\18fc4542-69f6-11ef-a46c-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\CLIPART\\PUB60COR\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\sppsvc.exe\", \"C:\\Users\\Default\\Templates\\Idle.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\", \"C:\\ProgramData\\Microsoft Help\\lsm.exe\", \"C:\\Users\\Default\\Links\\Idle.exe\", \"C:\\Users\\Admin\\Links\\Idle.exe\", \"C:\\Windows\\SoftwareDistribution\\ScanFile\\audiodg.exe\", \"C:\\ProgramData\\Adobe\\Updater6\\csrss.exe\", \"C:\\ProgramData\\Microsoft Help\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\", \"C:\\ProgramData\\Microsoft Help\\lsm.exe\", \"C:\\Users\\Default\\Links\\Idle.exe\", \"C:\\Users\\Admin\\Links\\Idle.exe\", \"C:\\Windows\\SoftwareDistribution\\ScanFile\\audiodg.exe\", \"C:\\ProgramData\\Adobe\\Updater6\\csrss.exe\", \"C:\\ProgramData\\Microsoft Help\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\dllhost.exe\", \"C:\\Windows\\Logs\\DPX\\explorer.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\", \"C:\\ProgramData\\Microsoft Help\\lsm.exe\", \"C:\\Users\\Default\\Links\\Idle.exe\", \"C:\\Users\\Admin\\Links\\Idle.exe\", \"C:\\Windows\\SoftwareDistribution\\ScanFile\\audiodg.exe\", \"C:\\ProgramData\\Adobe\\Updater6\\csrss.exe\", \"C:\\ProgramData\\Microsoft Help\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\dllhost.exe\", \"C:\\Windows\\Logs\\DPX\\explorer.exe\", \"C:\\Recovery\\18fc4542-69f6-11ef-a46c-62cb582c238c\\csrss.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\CLIPART\\PUB60COR\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\sppsvc.exe\", \"C:\\Users\\Default\\Templates\\Idle.exe\", \"C:\\Recovery\\18fc4542-69f6-11ef-a46c-62cb582c238c\\audiodg.exe\", \"C:\\Documents and Settings\\lsm.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\", \"C:\\ProgramData\\Microsoft Help\\lsm.exe\", \"C:\\Users\\Default\\Links\\Idle.exe\", \"C:\\Users\\Admin\\Links\\Idle.exe\", \"C:\\Windows\\SoftwareDistribution\\ScanFile\\audiodg.exe\", \"C:\\ProgramData\\Adobe\\Updater6\\csrss.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\", \"C:\\ProgramData\\Microsoft Help\\lsm.exe\", \"C:\\Users\\Default\\Links\\Idle.exe\", \"C:\\Users\\Admin\\Links\\Idle.exe\", \"C:\\Windows\\SoftwareDistribution\\ScanFile\\audiodg.exe\", \"C:\\ProgramData\\Adobe\\Updater6\\csrss.exe\", \"C:\\ProgramData\\Microsoft Help\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\dllhost.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe -
Process spawned unexpected child process 64 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 996 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 584 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2744 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1232 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1864 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2756 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1588 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2116 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1720 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1608 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1004 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2084 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2792 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1368 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1204 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2248 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1600 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 700 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 408 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 628 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2884 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1832 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1884 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2000 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1536 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2720 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2176 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2488 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 332 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2596 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1836 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2240 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1880 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2556 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2052 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 380 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1908 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1476 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2528 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1840 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2972 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2916 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2804 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 608 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1868 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2516 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2472 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2480 2668 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 2668 schtasks.exe 28 -
Executes dropped EXE 1 IoCs
pid Process 2312 Idle.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\sppsvc.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Documents and Settings\\lsm.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0d39a7ade0eaa19a185fc11508caeba9 = "\"C:\\Windows\\IME\\it-IT\\0d39a7ade0eaa19a185fc11508caeba9.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\Default\\Links\\Idle.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\Default\\Templates\\Idle.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\dllhost.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Recovery\\18fc4542-69f6-11ef-a46c-62cb582c238c\\csrss.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Windows\\SoftwareDistribution\\ScanFile\\audiodg.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\ProgramData\\Adobe\\Updater6\\csrss.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\ProgramData\\Microsoft Help\\csrss.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Recovery\\18fc4542-69f6-11ef-a46c-62cb582c238c\\audiodg.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\ProgramData\\Microsoft Help\\lsm.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\Admin\\Links\\Idle.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Windows\\Logs\\DPX\\explorer.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Microsoft Office\\CLIPART\\PUB60COR\\dllhost.exe\"" 0d39a7ade0eaa19a185fc11508caeba9.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Reference Assemblies\Microsoft\5940a34987c991 0d39a7ade0eaa19a185fc11508caeba9.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\RCX6885.tmp 0d39a7ade0eaa19a185fc11508caeba9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\RCX6F01.tmp 0d39a7ade0eaa19a185fc11508caeba9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\RCX6F02.tmp 0d39a7ade0eaa19a185fc11508caeba9.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\dllhost.exe 0d39a7ade0eaa19a185fc11508caeba9.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\dllhost.exe 0d39a7ade0eaa19a185fc11508caeba9.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\5940a34987c991 0d39a7ade0eaa19a185fc11508caeba9.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\RCX6886.tmp 0d39a7ade0eaa19a185fc11508caeba9.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\dllhost.exe 0d39a7ade0eaa19a185fc11508caeba9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\dllhost.exe 0d39a7ade0eaa19a185fc11508caeba9.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File opened for modification C:\Windows\IME\it-IT\0d39a7ade0eaa19a185fc11508caeba9.exe 0d39a7ade0eaa19a185fc11508caeba9.exe File created C:\Windows\IME\it-IT\87a03bb8674937 0d39a7ade0eaa19a185fc11508caeba9.exe File created C:\Windows\SoftwareDistribution\ScanFile\audiodg.exe 0d39a7ade0eaa19a185fc11508caeba9.exe File created C:\Windows\SoftwareDistribution\ScanFile\42af1c969fbb7b 0d39a7ade0eaa19a185fc11508caeba9.exe File created C:\Windows\IME\it-IT\0d39a7ade0eaa19a185fc11508caeba9.exe 0d39a7ade0eaa19a185fc11508caeba9.exe File created C:\Windows\Logs\DPX\explorer.exe 0d39a7ade0eaa19a185fc11508caeba9.exe File opened for modification C:\Windows\Logs\DPX\RCX6A8A.tmp 0d39a7ade0eaa19a185fc11508caeba9.exe File opened for modification C:\Windows\Logs\DPX\RCX6A8B.tmp 0d39a7ade0eaa19a185fc11508caeba9.exe File opened for modification C:\Windows\Logs\DPX\explorer.exe 0d39a7ade0eaa19a185fc11508caeba9.exe File opened for modification C:\Windows\SoftwareDistribution\ScanFile\audiodg.exe 0d39a7ade0eaa19a185fc11508caeba9.exe File opened for modification C:\Windows\IME\it-IT\RCX5784.tmp 0d39a7ade0eaa19a185fc11508caeba9.exe File opened for modification C:\Windows\IME\it-IT\RCX5785.tmp 0d39a7ade0eaa19a185fc11508caeba9.exe File opened for modification C:\Windows\SoftwareDistribution\ScanFile\RCX6072.tmp 0d39a7ade0eaa19a185fc11508caeba9.exe File opened for modification C:\Windows\SoftwareDistribution\ScanFile\RCX6073.tmp 0d39a7ade0eaa19a185fc11508caeba9.exe File created C:\Windows\Logs\DPX\7a0fd90576e088 0d39a7ade0eaa19a185fc11508caeba9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2512 schtasks.exe 2108 schtasks.exe 700 schtasks.exe 2384 schtasks.exe 1880 schtasks.exe 2248 schtasks.exe 608 schtasks.exe 996 schtasks.exe 1368 schtasks.exe 1600 schtasks.exe 408 schtasks.exe 1884 schtasks.exe 2344 schtasks.exe 2916 schtasks.exe 2480 schtasks.exe 2756 schtasks.exe 1988 schtasks.exe 1908 schtasks.exe 380 schtasks.exe 1992 schtasks.exe 2424 schtasks.exe 2860 schtasks.exe 1004 schtasks.exe 1832 schtasks.exe 1536 schtasks.exe 2024 schtasks.exe 1864 schtasks.exe 1836 schtasks.exe 1840 schtasks.exe 2972 schtasks.exe 2148 schtasks.exe 2596 schtasks.exe 2556 schtasks.exe 584 schtasks.exe 2488 schtasks.exe 2052 schtasks.exe 1476 schtasks.exe 1204 schtasks.exe 1232 schtasks.exe 2792 schtasks.exe 2644 schtasks.exe 964 schtasks.exe 628 schtasks.exe 2904 schtasks.exe 1868 schtasks.exe 2628 schtasks.exe 2116 schtasks.exe 1720 schtasks.exe 2720 schtasks.exe 2176 schtasks.exe 332 schtasks.exe 1588 schtasks.exe 1608 schtasks.exe 2472 schtasks.exe 2528 schtasks.exe 2084 schtasks.exe 2884 schtasks.exe 2000 schtasks.exe 2940 schtasks.exe 2240 schtasks.exe 2804 schtasks.exe 2516 schtasks.exe 2744 schtasks.exe 2620 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 2312 Idle.exe 2312 Idle.exe 2312 Idle.exe 2312 Idle.exe 2312 Idle.exe 2312 Idle.exe 2312 Idle.exe 2312 Idle.exe 2312 Idle.exe 2312 Idle.exe 2312 Idle.exe 2312 Idle.exe 2312 Idle.exe 2312 Idle.exe 2312 Idle.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2640 0d39a7ade0eaa19a185fc11508caeba9.exe Token: SeDebugPrivilege 2312 Idle.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2740 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 93 PID 2640 wrote to memory of 2740 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 93 PID 2640 wrote to memory of 2740 2640 0d39a7ade0eaa19a185fc11508caeba9.exe 93 PID 2740 wrote to memory of 1608 2740 cmd.exe 95 PID 2740 wrote to memory of 1608 2740 cmd.exe 95 PID 2740 wrote to memory of 1608 2740 cmd.exe 95 PID 2740 wrote to memory of 2312 2740 cmd.exe 96 PID 2740 wrote to memory of 2312 2740 cmd.exe 96 PID 2740 wrote to memory of 2312 2740 cmd.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d39a7ade0eaa19a185fc11508caeba9.exe"C:\Users\Admin\AppData\Local\Temp\0d39a7ade0eaa19a185fc11508caeba9.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\W2tbEWSDqo.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1608
-
-
C:\Users\Admin\Links\Idle.exe"C:\Users\Admin\Links\Idle.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "EEFA0d39a7ade0eaa19a185fc11508caeba9" /sc MINUTE /mo 14 /tr "'C:\Windows\IME\it-IT\0d39a7ade0eaa19a185fc11508caeba9.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "CKuP0d39a7ade0eaa19a185fc11508caeba9" /sc ONLOGON /tr "'C:\Windows\IME\it-IT\0d39a7ade0eaa19a185fc11508caeba9.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "gicB0d39a7ade0eaa19a185fc11508caeba9" /sc ONSTART /tr "'C:\Windows\IME\it-IT\0d39a7ade0eaa19a185fc11508caeba9.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "0d39a7ade0eaa19a185fc11508caeba9" /sc MINUTE /mo 8 /tr "'C:\Windows\IME\it-IT\0d39a7ade0eaa19a185fc11508caeba9.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DuTelsm" /sc MINUTE /mo 13 /tr "'C:\ProgramData\Microsoft Help\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Yopmlsm" /sc ONLOGON /tr "'C:\ProgramData\Microsoft Help\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BDJrlsm" /sc ONSTART /tr "'C:\ProgramData\Microsoft Help\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc MINUTE /mo 5 /tr "'C:\ProgramData\Microsoft Help\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "9VTEIdle" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Links\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TGOcIdle" /sc ONLOGON /tr "'C:\Users\Default\Links\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "UKdsIdle" /sc ONSTART /tr "'C:\Users\Default\Links\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Links\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "AphWIdle" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Links\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dvbCIdle" /sc ONLOGON /tr "'C:\Users\Admin\Links\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "5i24Idle" /sc ONSTART /tr "'C:\Users\Admin\Links\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Links\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "FZ6yaudiodg" /sc MINUTE /mo 8 /tr "'C:\Windows\SoftwareDistribution\ScanFile\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "KWW8audiodg" /sc ONLOGON /tr "'C:\Windows\SoftwareDistribution\ScanFile\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "NyaDaudiodg" /sc ONSTART /tr "'C:\Windows\SoftwareDistribution\ScanFile\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc MINUTE /mo 14 /tr "'C:\Windows\SoftwareDistribution\ScanFile\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "LE27csrss" /sc MINUTE /mo 12 /tr "'C:\ProgramData\Adobe\Updater6\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "UmUacsrss" /sc ONLOGON /tr "'C:\ProgramData\Adobe\Updater6\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "P1Mccsrss" /sc ONSTART /tr "'C:\ProgramData\Adobe\Updater6\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc MINUTE /mo 8 /tr "'C:\ProgramData\Adobe\Updater6\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "k01dcsrss" /sc MINUTE /mo 7 /tr "'C:\ProgramData\Microsoft Help\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "NZEzcsrss" /sc ONLOGON /tr "'C:\ProgramData\Microsoft Help\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "bGPJcsrss" /sc ONSTART /tr "'C:\ProgramData\Microsoft Help\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc MINUTE /mo 5 /tr "'C:\ProgramData\Microsoft Help\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "YJrfSystem" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "UPRRSystem" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "QMvvSystem" /sc ONSTART /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "hxp5dllhost" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "vha6dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "yESZdllhost" /sc ONSTART /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IzJZexplorer" /sc MINUTE /mo 12 /tr "'C:\Windows\Logs\DPX\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "zjjiexplorer" /sc ONLOGON /tr "'C:\Windows\Logs\DPX\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "I3yeexplorer" /sc ONSTART /tr "'C:\Windows\Logs\DPX\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc MINUTE /mo 11 /tr "'C:\Windows\Logs\DPX\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "leDYcsrss" /sc MINUTE /mo 9 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "aug5csrss" /sc ONLOGON /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "jLWLcsrss" /sc ONSTART /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc MINUTE /mo 8 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "imBBdllhost" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "a7CGdllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ed8cdllhost" /sc ONSTART /tr "'C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "pVgmsppsvc" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ivCXsppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "mW1Bsppsvc" /sc ONSTART /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cMRwIdle" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Templates\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "CNJ3Idle" /sc ONLOGON /tr "'C:\Users\Default\Templates\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "AxaqIdle" /sc ONSTART /tr "'C:\Users\Default\Templates\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Templates\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "52J5audiodg" /sc MINUTE /mo 5 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "1GdFaudiodg" /sc ONLOGON /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ElbCaudiodg" /sc ONSTART /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc MINUTE /mo 9 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "PL8Olsm" /sc MINUTE /mo 8 /tr "'C:\Documents and Settings\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "EkHhlsm" /sc ONLOGON /tr "'C:\Documents and Settings\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Yqp9lsm" /sc ONSTART /tr "'C:\Documents and Settings\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc MINUTE /mo 8 /tr "'C:\Documents and Settings\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:332
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
920KB
MD57ed129847c71263bad6885d936b2e7d4
SHA113c9319f7b6c81978d49ab452d68bd31088c8b5a
SHA256cdf033b95e23ac2141d2869e1615067b71ee2054faa293d4c1eaca869aeefe8e
SHA512da0c3e6e76692ea56510d734784baa26799b1fcbb9348aa12f99c8651a92cd5c0a805893bfdeb1a5c199a05be3b1c04f48099942377fff217dc77a7d768a45cd
-
Filesize
920KB
MD5302e70ae3225560c8f7df0ce9fc14d13
SHA1f2552a166f9aedc798fc53f02bd575376e412e45
SHA25603ccdfe491d4558628f752d71a471ca6db036eea46a2ba86d0f2ecfcc15b15a4
SHA512f1ad2a1bd22230df1407e5089c0e11386d428cadae889fc5f565e32a918808bbb4143b77a96f75c803f09c5ccad051babeb7d63e5ca8de969b8df44df19b92fb
-
Filesize
193B
MD5275a46077366ca08871774bcca4bc67d
SHA16e65e16a71519ae543d5a0bfd0d7874cfaee0cc5
SHA2568abd0d4c7e95db92bfa69dc1cc2dba4a776625d932ae56098cb4660599ecf073
SHA51222ac587c1af8424e38368b0679b8d49d8f1c60309dae80b3050ae8d82abbff61e3bceeeb2a7a99fd7928eb0d586351cf24243c8ac7c4ec06b56750c4a2f92a11
-
Filesize
920KB
MD5db919adb360cbf73db24d7f01e29a09d
SHA1b417644c14b134649f132226ba9fd761b830c2aa
SHA256794b03eae663397da17988310351f4046ac772e18f3f5c4be4d28828e4e5cd74
SHA5124d8d6f0c32c4b262205390a8696b3056033e4f7ee591adba229b7da286ca4b4444782bae934bc3f186af59822f97f2a58fe23d377ae710147389e12bb01f1a27
-
Filesize
920KB
MD5e366994ffb75f85bdac64392a44335e0
SHA1cef99efa4f2ebbf62e34ee745f0e8b9621c063e8
SHA2560ff09d8470cf16dfab69b6ed62f0d32781259910c7930bd77c9daf70aa7d443d
SHA5125f02f9890a071da4fdff29c3ae37c9e43ccd8502acff13946ab6bb3600260d9d79ff5635287944cd83fca322b986f2c02dcce3d73f150afe69fb5bb7b1d273db
-
Filesize
920KB
MD50d39a7ade0eaa19a185fc11508caeba9
SHA15083d9622465c43bc02a1edd71acd1d9ae75270c
SHA25651c94ec08bddcec2e7992bb2c758e8518850b373e649ac57c9c26067715bd2ea
SHA512480bbfb12c3bbde7cff197f069a9aec5558464f417c7920f0dd09e4b1ba859d9e7b7d7f552a7bad094a3ec49069ce442240be5380e2d1ee0de6cec6f514506b0