Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1090ed1454b8...38.exe
windows7-x64
1090ed1454b8...38.exe
windows10-2004-x64
1091570920da...cf.exe
windows7-x64
1091570920da...cf.exe
windows10-2004-x64
7915c452bf2...b6.exe
windows7-x64
10915c452bf2...b6.exe
windows10-2004-x64
10916cd92d3a...38.exe
windows7-x64
10916cd92d3a...38.exe
windows10-2004-x64
10916fbe67a7...e3.exe
windows7-x64
10916fbe67a7...e3.exe
windows10-2004-x64
1091cce1a9f4...6a.exe
windows7-x64
1091cce1a9f4...6a.exe
windows10-2004-x64
1091d2e3f758...f6.exe
windows7-x64
1091d2e3f758...f6.exe
windows10-2004-x64
1091d7fa8d89...52.exe
windows7-x64
1091d7fa8d89...52.exe
windows10-2004-x64
1091e6d47bd8...cc.exe
windows7-x64
791e6d47bd8...cc.exe
windows10-2004-x64
792105c7a3b...24.exe
windows7-x64
792105c7a3b...24.exe
windows10-2004-x64
7921421b7f5...09.exe
windows7-x64
10921421b7f5...09.exe
windows10-2004-x64
109221b9eea3...3c.exe
windows7-x64
19221b9eea3...3c.exe
windows10-2004-x64
1092324d5776...05.exe
windows7-x64
192324d5776...05.exe
windows10-2004-x64
1927cd0bd1a...b8.exe
windows7-x64
3927cd0bd1a...b8.exe
windows10-2004-x64
392efd55895...78.exe
windows7-x64
1092efd55895...78.exe
windows10-2004-x64
10932a9096cd...eb.exe
windows7-x64
10932a9096cd...eb.exe
windows10-2004-x64
10Analysis
-
max time kernel
103s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:14
Behavioral task
behavioral1
Sample
90ed1454b881cba4ecd9b651325d4638.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
90ed1454b881cba4ecd9b651325d4638.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
91570920daa6ee3c5d03da7664cb620ac5be5038ac64a295811ed8349b5d3dcf.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
91570920daa6ee3c5d03da7664cb620ac5be5038ac64a295811ed8349b5d3dcf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
915c452bf258459048ef8813fe2586a7b3c85ae7438fcd9bfa6da3a4017a08b6.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
915c452bf258459048ef8813fe2586a7b3c85ae7438fcd9bfa6da3a4017a08b6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
916cd92d3ac28dded1335ac06764e138.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
916cd92d3ac28dded1335ac06764e138.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
916fbe67a7968d2b65d54ae3ce72f3e3.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
916fbe67a7968d2b65d54ae3ce72f3e3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
91cce1a9f4562b0cd73d60203cebb76a.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
91cce1a9f4562b0cd73d60203cebb76a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
91d2e3f758fbb2c6c8e7b069bd3ac7a4d68e4f9dea0e71ff60bdbcd2ac9dd4f6.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
91d2e3f758fbb2c6c8e7b069bd3ac7a4d68e4f9dea0e71ff60bdbcd2ac9dd4f6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
91d7fa8d891f603b35c77da7fcc4c552.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
91d7fa8d891f603b35c77da7fcc4c552.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
91e6d47bd804e58a4e160993dfdfc3cc.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
91e6d47bd804e58a4e160993dfdfc3cc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
92105c7a3b72655063939b49b38e6567d6703ed95f694cab2247bd9832706524.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
92105c7a3b72655063939b49b38e6567d6703ed95f694cab2247bd9832706524.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
921421b7f5be88eb661517835c090cd8a2fdcdfc69154d129c70ffa36da54809.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
921421b7f5be88eb661517835c090cd8a2fdcdfc69154d129c70ffa36da54809.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
9221b9eea367a2434dacd850f7b30b3c.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
9221b9eea367a2434dacd850f7b30b3c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
92324d5776518f262a2ce8bfd8c6856500a9c454b9a8b688810f604111532e05.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
92324d5776518f262a2ce8bfd8c6856500a9c454b9a8b688810f604111532e05.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
927cd0bd1a26a2158a18e48e682ba3b8.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
927cd0bd1a26a2158a18e48e682ba3b8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
92efd55895cd60b5057f3fb06ad84c78.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
92efd55895cd60b5057f3fb06ad84c78.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
932a9096cd16630970f2bdc5e6cb9aeb.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
932a9096cd16630970f2bdc5e6cb9aeb.exe
Resource
win10v2004-20250314-en
General
-
Target
91d7fa8d891f603b35c77da7fcc4c552.exe
-
Size
1.1MB
-
MD5
91d7fa8d891f603b35c77da7fcc4c552
-
SHA1
1b241b597c2d0b386e42f25e1e22372265ff06c6
-
SHA256
2ff54b9f6860a5d362ef776360ed7a7f3c4da0f1dfce7493caa631e50c87722c
-
SHA512
27cb44233fed4fd6aadd8f1100501ced417614a80a3e74bec5e3ff6d9c73bb7ed85b1885dc129a4f633738e489a85aac980b7238abef0ea10bdcb0df59d0a735
-
SSDEEP
12288:Z49I/nL8TnKZPVHR3E/bS2vkRNJLXseJQdErvNKj6SKm+eAIhu181d6rsPH:ZngTKZ5RU/xG7zsEyEve6SZ+dIe8usv
Malware Config
Signatures
-
DcRat 14 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 5496 schtasks.exe 5268 schtasks.exe 5972 schtasks.exe 4132 schtasks.exe 2108 schtasks.exe File created C:\Windows\System32\xpsservices\6203df4a6bafc7 91d7fa8d891f603b35c77da7fcc4c552.exe 4780 schtasks.exe 924 schtasks.exe 5520 schtasks.exe 1720 schtasks.exe 6104 schtasks.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 91d7fa8d891f603b35c77da7fcc4c552.exe 4748 schtasks.exe 2328 schtasks.exe -
Dcrat family
-
Process spawned unexpected child process 12 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5972 3352 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6104 3352 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4132 3352 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 3352 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4780 3352 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4748 3352 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 924 3352 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 3352 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5520 3352 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5496 3352 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5268 3352 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1720 3352 schtasks.exe 89 -
UAC bypass 3 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" taskhostw.exe -
resource yara_rule behavioral16/memory/2080-1-0x0000000000740000-0x0000000000856000-memory.dmp dcrat behavioral16/files/0x000700000002433c-16.dat dcrat behavioral16/files/0x000e00000002416e-33.dat dcrat behavioral16/files/0x000f00000002430a-68.dat dcrat behavioral16/files/0x0009000000024346-79.dat dcrat behavioral16/files/0x000900000002433c-90.dat dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 14 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4704 powershell.exe 2224 powershell.exe 6080 powershell.exe 3276 powershell.exe 848 powershell.exe 1236 powershell.exe 1000 powershell.exe 520 powershell.exe 4668 powershell.exe 4244 powershell.exe 5128 powershell.exe 2116 powershell.exe 1100 powershell.exe 5972 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation 91d7fa8d891f603b35c77da7fcc4c552.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation 91d7fa8d891f603b35c77da7fcc4c552.exe -
Executes dropped EXE 2 IoCs
pid Process 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 5716 taskhostw.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files\\Java\\sppsvc.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Windows\\System32\\fsavailux\\backgroundTaskHost.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\StartMenuExperienceHost.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\System32\\PeerDistCleaner\\lsass.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\C_860\\RuntimeBroker.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Windows\\setuperr\\sysmon.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\PerfLogs\\taskhostw.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\powershell = "\"C:\\Windows\\Downloaded Program Files\\powershell.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\System32\\xpsservices\\lsass.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\System32\\SettingsHandlers_OneCore_PowerAndSleep\\winlogon.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files\\edge_BITS_4588_921617627\\Idle.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\unsecapp = "\"C:\\ProgramData\\Packages\\unsecapp.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe -
Checks whether UAC is enabled 1 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe -
Drops file in System32 directory 23 IoCs
description ioc Process File created C:\Windows\System32\PeerDistCleaner\lsass.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\fsavailux\backgroundTaskHost.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\C_860\RuntimeBroker.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Windows\System32\xpsservices\lsass.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\xpsservices\lsass.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Windows\System32\SettingsHandlers_OneCore_PowerAndSleep\winlogon.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Windows\System32\fsavailux\backgroundTaskHost.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\SettingsHandlers_OneCore_PowerAndSleep\RCX9771.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\PeerDistCleaner\RCXA072.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\PeerDistCleaner\RCXA0E1.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\PeerDistCleaner\lsass.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Windows\System32\xpsservices\6203df4a6bafc7 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Windows\System32\SettingsHandlers_OneCore_PowerAndSleep\cc11b995f2a76d 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Windows\System32\fsavailux\eddb19405b7ce1 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\SettingsHandlers_OneCore_PowerAndSleep\winlogon.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\fsavailux\RCX9977.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\fsavailux\RCX9978.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Windows\System32\C_860\9e8d7a4ca61bd9 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Windows\System32\PeerDistCleaner\6203df4a6bafc7 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\xpsservices\RCX94FE.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\xpsservices\RCX956D.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\SettingsHandlers_OneCore_PowerAndSleep\RCX9772.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Windows\System32\C_860\RuntimeBroker.exe 91d7fa8d891f603b35c77da7fcc4c552.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\StartMenuExperienceHost.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Program Files\edge_BITS_4588_921617627\RCX9DF0.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Program Files\edge_BITS_4588_921617627\RCX9E5E.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Program Files\edge_BITS_4588_921617627\Idle.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Program Files\edge_BITS_4588_921617627\Idle.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Program Files\edge_BITS_4588_921617627\6ccacd8608530f 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\RCX9BEB.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Program Files\Java\sppsvc.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Program Files\Java\0a1fd5f707cd16 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Program Files\Java\sppsvc.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\StartMenuExperienceHost.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\55b276f4edf653 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\RCX9B7D.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\setuperr\sysmon.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Windows\setuperr\121e5b5079f7c0 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Windows\Downloaded Program Files\powershell.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Windows\Downloaded Program Files\e978f868350d50 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\setuperr\sysmon.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\Downloaded Program Files\powershell.exe 91d7fa8d891f603b35c77da7fcc4c552.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 91d7fa8d891f603b35c77da7fcc4c552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 91d7fa8d891f603b35c77da7fcc4c552.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5972 schtasks.exe 6104 schtasks.exe 4132 schtasks.exe 2108 schtasks.exe 4780 schtasks.exe 4748 schtasks.exe 924 schtasks.exe 2328 schtasks.exe 5520 schtasks.exe 5496 schtasks.exe 5268 schtasks.exe 1720 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 1100 powershell.exe 1100 powershell.exe 4244 powershell.exe 4244 powershell.exe 848 powershell.exe 848 powershell.exe 4244 powershell.exe 1236 powershell.exe 1236 powershell.exe 520 powershell.exe 520 powershell.exe 1000 powershell.exe 1000 powershell.exe 4668 powershell.exe 4668 powershell.exe 1236 powershell.exe 1100 powershell.exe 848 powershell.exe 4668 powershell.exe 520 powershell.exe 1000 powershell.exe 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 3276 powershell.exe 3276 powershell.exe 6080 powershell.exe 6080 powershell.exe 4704 powershell.exe 4704 powershell.exe 2224 powershell.exe 2224 powershell.exe 2116 powershell.exe 2116 powershell.exe 5128 powershell.exe 5128 powershell.exe 6080 powershell.exe 5972 powershell.exe 5972 powershell.exe 4704 powershell.exe 5972 powershell.exe 2224 powershell.exe 3276 powershell.exe 2116 powershell.exe 5128 powershell.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2080 91d7fa8d891f603b35c77da7fcc4c552.exe Token: SeDebugPrivilege 1100 powershell.exe Token: SeDebugPrivilege 4244 powershell.exe Token: SeDebugPrivilege 848 powershell.exe Token: SeDebugPrivilege 1236 powershell.exe Token: SeDebugPrivilege 4668 powershell.exe Token: SeDebugPrivilege 520 powershell.exe Token: SeDebugPrivilege 1000 powershell.exe Token: SeDebugPrivilege 5200 91d7fa8d891f603b35c77da7fcc4c552.exe Token: SeDebugPrivilege 3276 powershell.exe Token: SeDebugPrivilege 4704 powershell.exe Token: SeDebugPrivilege 6080 powershell.exe Token: SeDebugPrivilege 2224 powershell.exe Token: SeDebugPrivilege 2116 powershell.exe Token: SeDebugPrivilege 5128 powershell.exe Token: SeDebugPrivilege 5972 powershell.exe Token: SeDebugPrivilege 5716 taskhostw.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2080 wrote to memory of 4244 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 99 PID 2080 wrote to memory of 4244 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 99 PID 2080 wrote to memory of 4668 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 100 PID 2080 wrote to memory of 4668 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 100 PID 2080 wrote to memory of 1100 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 101 PID 2080 wrote to memory of 1100 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 101 PID 2080 wrote to memory of 520 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 102 PID 2080 wrote to memory of 520 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 102 PID 2080 wrote to memory of 1000 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 104 PID 2080 wrote to memory of 1000 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 104 PID 2080 wrote to memory of 1236 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 105 PID 2080 wrote to memory of 1236 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 105 PID 2080 wrote to memory of 848 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 108 PID 2080 wrote to memory of 848 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 108 PID 2080 wrote to memory of 5200 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 113 PID 2080 wrote to memory of 5200 2080 91d7fa8d891f603b35c77da7fcc4c552.exe 113 PID 5200 wrote to memory of 3276 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 122 PID 5200 wrote to memory of 3276 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 122 PID 5200 wrote to memory of 6080 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 123 PID 5200 wrote to memory of 6080 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 123 PID 5200 wrote to memory of 2116 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 124 PID 5200 wrote to memory of 2116 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 124 PID 5200 wrote to memory of 2224 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 125 PID 5200 wrote to memory of 2224 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 125 PID 5200 wrote to memory of 4704 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 126 PID 5200 wrote to memory of 4704 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 126 PID 5200 wrote to memory of 5972 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 128 PID 5200 wrote to memory of 5972 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 128 PID 5200 wrote to memory of 5128 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 129 PID 5200 wrote to memory of 5128 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 129 PID 5200 wrote to memory of 5716 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 136 PID 5200 wrote to memory of 5716 5200 91d7fa8d891f603b35c77da7fcc4c552.exe 136 -
System policy modification 1 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" taskhostw.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\91d7fa8d891f603b35c77da7fcc4c552.exe"C:\Users\Admin\AppData\Local\Temp\91d7fa8d891f603b35c77da7fcc4c552.exe"1⤵
- DcRat
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2080 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\91d7fa8d891f603b35c77da7fcc4c552.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\xpsservices\lsass.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\SettingsHandlers_OneCore_PowerAndSleep\winlogon.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\fsavailux\backgroundTaskHost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows NT\Accessories\en-US\StartMenuExperienceHost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\edge_BITS_4588_921617627\Idle.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\PeerDistCleaner\lsass.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\91d7fa8d891f603b35c77da7fcc4c552.exe"C:\Users\Admin\AppData\Local\Temp\91d7fa8d891f603b35c77da7fcc4c552.exe"2⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5200 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\91d7fa8d891f603b35c77da7fcc4c552.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\C_860\RuntimeBroker.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6080
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\setuperr\sysmon.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Packages\unsecapp.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Java\sppsvc.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\PerfLogs\taskhostw.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Downloaded Program Files\powershell.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5128
-
-
C:\PerfLogs\taskhostw.exe"C:\PerfLogs\taskhostw.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:5716
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\xpsservices\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\SettingsHandlers_OneCore_PowerAndSleep\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\System32\fsavailux\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\edge_BITS_4588_921617627\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\PeerDistCleaner\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\C_860\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\setuperr\sysmon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\ProgramData\Packages\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Java\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\PerfLogs\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\powershell.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1720
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5391adb2e45884ac29e1940f2fb17bd31
SHA161bd9de1ce9f1a2c2715885cf688cbaeb09aba27
SHA2568c2818559c8e232dc0b2bc9fb01c5602cd00094976188cc789da1a75ae95b41e
SHA512779ac2e40e5a7b1521cfc19ae84708a314e2fb570260b42324cec732700631e10ef08418d4426375b231e2190b2239623bfd2df143c4fbc6e9219ee6b95f49cf
-
Filesize
1.1MB
MD591d7fa8d891f603b35c77da7fcc4c552
SHA11b241b597c2d0b386e42f25e1e22372265ff06c6
SHA2562ff54b9f6860a5d362ef776360ed7a7f3c4da0f1dfce7493caa631e50c87722c
SHA51227cb44233fed4fd6aadd8f1100501ced417614a80a3e74bec5e3ff6d9c73bb7ed85b1885dc129a4f633738e489a85aac980b7238abef0ea10bdcb0df59d0a735
-
Filesize
1.1MB
MD5512bf63ec057fbf2b109e728efd6abd9
SHA1e742de6352b08429f0894615370c0a9f66689d83
SHA256ecaa0de2c53af0debfabe9ee02651f1ce684f61ccb571d60127b2db743493eef
SHA5121b630a4c24beabc850434519d22c9a3d567f0ddc6aaa59259a3a28773da1972ff45044e14d0519f11fd94658ca4f1922682c2998e7009d607e0f2f8c1e7b1853
-
Filesize
1KB
MD57f3c0ae41f0d9ae10a8985a2c327b8fb
SHA1d58622bf6b5071beacf3b35bb505bde2000983e3
SHA256519fceae4d0dd4d09edd1b81bcdfa8aeab4b59eee77a4cd4b6295ce8e591a900
SHA5128a8fd17eef071f86e672cba0d8fc2cfed6118aff816100b9d7c06eb96443c04c04bc5692259c8d7ecb1563e877921939c61726605af4f969e3f586f0913ed125
-
Filesize
2KB
MD5a43e653ffb5ab07940f4bdd9cc8fade4
SHA1af43d04e3427f111b22dc891c5c7ee8a10ac4123
SHA256c4c53abb13e99475aebfbe9fec7a8fead81c14c80d9dcc2b81375304f3a683fe
SHA51262a97e95e1f19a8d4302847110dae44f469877eed6aa8ea22345c6eb25ee220e7d310fa0b7ec5df42356815421c0af7c46a0f1fee8933cc446641800eda6cd1b
-
Filesize
944B
MD50c56ba5098c530bbd1cdb28d50090d39
SHA1ff63178ea722ec2db118c81051bf85544fb6b316
SHA2560299d374c4b984cb0475284b966dfbe8bb08e45b93dabdf327f96a60b05273d1
SHA512cbbf27ac30e55f4df35ae5aae50d1a2f9475dc2ac0eecf9ce0ab19adef606fff08c26d0eef5686012d36566551179afe09b15c1da1840415b1696f76324a03f2
-
Filesize
944B
MD51e3c555747900d8c9652a014303474aa
SHA11b2057ff00b20996fe74977d7e336be9d4625283
SHA2566a419c7390f12be16e2d1e752539a2a429f41e35ce0381bee1d824571769e2f1
SHA512067ea6a394f54acfc44d64fdf11463a74cb5d6bba3fe253e7625455754c528bd678fd1c679e949e928b7fc11b563c256b0b0e33474f7c58eb0735d7aacd3232d
-
Filesize
944B
MD593771c301aacc738330a66a7e48b0c1b
SHA1f7d7ac01f1f13620b1642d1638c1d212666abbae
SHA2565512157a9ea31f455e244922910fcdb2b8116288d968b0e5e26c91b266d4de7c
SHA512a51f43e335c8c6da130866115ee6d890f808379548b129e20e563c5ee0234cca186ecde4fd6bc609f0eba6e32b10d080f4f67483461cdd58ef0a60db78324309
-
Filesize
944B
MD501fff31a70e26012f37789b179059e32
SHA1555b6f05cce7daf46920df1c01eb5c55dc62c9e6
SHA256adf65afaf1c83572f05a99bf2ede8eb7be1aab0717d5254f501d5e09ba6f587b
SHA512ac310c9bc5c1effc45e1e425972b09d1f961af216b50e1a504caa046b7f1a5f3179760e0b29591d83756ecb686d17a24770cf06fcea57e6f287ca5bbf6b6971b
-
Filesize
944B
MD5dd1d0b083fedf44b482a028fb70b96e8
SHA1dc9c027937c9f6d52268a1504cbae42a39c8d36a
SHA256cab7944d29e0501dc0db904ac460ca7a87700e0ec7eb62298b7b97cbf40c424c
SHA51296bec38bfda176292ae65dcf735103e7888baa212038737c1d1e215fcb76e4c0355e4a827a1934303e7aecae91012fa412f13e38f382b732758bae985cc67973
-
Filesize
944B
MD5e5663972c1caaba7088048911c758bf3
SHA13462dea0f9c2c16a9c3afdaef8bbb1f753c1c198
SHA2569f7f29a4696876cadca3f14d7e43f9ede0c97fd64be3f5d94bda49a91b6a419e
SHA512ff4e72c46cf083de62baa2ce2661555dd91b5f144294015f7b262fd4500cb67fe80e1871a82da63b607e3e9cef401f4b73c587bf1134637881ecad51aad1eddc
-
Filesize
944B
MD56241752e645f32f10d2c4c813b0c78ea
SHA10e4c1293a7e64540887313b7d9828a764018d408
SHA256e3a4713b8c982a20293690495261c883dd310996139fd41ace0fec7f3dc73e1f
SHA512ec34c1f9c7faadde864e0f1cca863f24c6af7d46f950160bac9f67f57f9cb2f791abc9fdaac90c2b3264d4a71716f98ad50a2725078b578be779b93726a38312
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.1MB
MD5cabe63770220a7593dcfc6488c89e155
SHA1a78888618fe9a52f17f462c060501adc495abca8
SHA256a3e109a6f9abc52e9619901770ab0eeb2dda5b5ac34cfd2e2187be5cd68c229f
SHA512a7a2123d962ef6286582dd8dd8d31f767771790e78aa00e8cd6b94693e797257f46af080db81c269b04472de870517ed5527e1a1cf035f447582a2765561783f
-
Filesize
1.1MB
MD5afc11478234c0230396bfe9e310c3b6b
SHA1d65e5f25ee2347edb7985306c60a0437fe11abe3
SHA256cfb72ff6a623948389a568746013925d84bed4cac39c3b4fbbcb4cd00ab8ef14
SHA5126600c2ddcadf2a8cc8116fac8797b3b398b557247b25ffde6f16d99af24e3ce34ba1fd5dde16ff8fec4f072371f68f18d808f60ab110acbfd2991031b4e9363a