Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 05:55
Static task
static1
Behavioral task
behavioral1
Sample
DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe
Resource
win10v20201028
General
-
Target
DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe
-
Size
690KB
-
MD5
9b57d8f7ebf2e307a02430be0a1cdab1
-
SHA1
15aa078a2e52d95702a35a9d7cff2ec352c73913
-
SHA256
92dd3781f16d24879509cc96d5a8d3a648ba0249e7da7b1f829e0d4bc455528a
-
SHA512
387f35d43d2c8e6c1de420e6e3a4b73dc5822901761a2ca4d6e58a0579545ef441dfe3d86dbd1bc0b088f3fa302d13d98c544d6e4491fee9e88c8c0609cecb42
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
svchost.exedescription pid process target process PID 2364 created 508 2364 svchost.exe DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe -
Executes dropped EXE 8 IoCs
Processes:
DriverUpdate.exeSlimWare.Services.exeSlimWare.Session.exescp4F3B.tmp.exeSlimCleaner-setup.exeDriverUpdate.exeSlimService.exeSlimServiceFactory.exepid process 2748 DriverUpdate.exe 2024 SlimWare.Services.exe 2816 SlimWare.Session.exe 3908 scp4F3B.tmp.exe 2336 SlimCleaner-setup.exe 416 DriverUpdate.exe 4464 SlimService.exe 4532 SlimServiceFactory.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\SlimWare Utilities Inc\DriverUpdate\htmlayout.dll upx \Users\Admin\AppData\Local\SlimWare Utilities Inc\DriverUpdate\htmlayout.dll upx -
Loads dropped DLL 18 IoCs
Processes:
MsiExec.exeDriverUpdate.exeSlimWare.Services.exeSlimWare.Session.exeDriverUpdate.exeMsiExec.exeSlimService.exepid process 648 MsiExec.exe 648 MsiExec.exe 2748 DriverUpdate.exe 2024 SlimWare.Services.exe 2816 SlimWare.Session.exe 2816 SlimWare.Session.exe 2024 SlimWare.Services.exe 2816 SlimWare.Session.exe 2024 SlimWare.Services.exe 2816 SlimWare.Session.exe 2816 SlimWare.Session.exe 2816 SlimWare.Session.exe 2816 SlimWare.Session.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 416 DriverUpdate.exe 2656 MsiExec.exe 4464 SlimService.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
DriverUpdate.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run DriverUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\DriverUpdate = "\"C:\\Program Files\\DriverUpdate\\DriverUpdate.exe\" -boot" DriverUpdate.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe -
JavaScript code in executable 8 IoCs
Processes:
yara_rule js js C:\Users\Public\Documents\Downloaded Installers\{836CC232-FC4F-427A-8944-425D623EAB45}\setup.msi js C:\Users\Admin\AppData\Local\Downloaded Installers\{65EFE74B-C710-4203-9B17-458D38584DED}\setup.msi js C:\Windows\Installer\MSIAE57.tmp js \Windows\Installer\MSIAE57.tmp js C:\Program Files\SlimServices\SlimService.exe js C:\Program Files\SlimServices\SlimService.exe js -
Drops file in Program Files directory 63 IoCs
Processes:
MsiExec.exemsiexec.exedescription ioc process File opened for modification C:\Program Files\DriverUpdate\DriverUpdate.exe MsiExec.exe File created C:\Program Files\SlimCleaner Plus\Interop.Scripting.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\SlimCleanerPlus.exe.config msiexec.exe File created C:\Program Files\SlimServices\SlimService.exe msiexec.exe File created C:\Program Files\SlimCleaner Plus\System.Windows.Interactivity.dll msiexec.exe File created C:\Program Files\DriverUpdate\SlimWare.Messaging.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\Caliburn.Micro.Platform.Core.dll msiexec.exe File created C:\Program Files\DriverUpdate\BsSndRpt.exe msiexec.exe File created C:\Program Files\SlimServices\icudt46l.dat msiexec.exe File created C:\Program Files\SlimCleaner Plus\SlimWare.Cleaner.UX.dll msiexec.exe File created C:\Program Files\SlimWare Utilities\Services\BugSplat.dll msiexec.exe File created C:\Program Files\SlimWare Utilities\Services\BugSplatRC.dll msiexec.exe File created C:\Program Files\SlimWare Utilities\Services\dbghelp.dll msiexec.exe File created C:\Program Files\DriverUpdate\SlimWare.DriverUpdate.Services.dll msiexec.exe File created C:\Program Files\DriverUpdate\UninstallStub.exe msiexec.exe File created C:\Program Files\SlimCleaner Plus\fr-FR\SlimWare.Cleaner.UX.resources.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\UninstallStub.exe msiexec.exe File created C:\Program Files\SlimWare Utilities\Services\BugSplat64.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\Microsoft.Win32.TaskScheduler.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\SlimServices.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\SlimWare.Cleaner.Views.dll msiexec.exe File created C:\Program Files\SlimWare Utilities\Services\SlimWare.Services.exe msiexec.exe File created C:\Program Files\SlimWare Utilities\Services\SlimWare.Services.ProxyStub.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\BugSplatRc.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\en-US\SlimWare.Cleaner.UX.resources.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\SlimWare.AppCore.dll.config msiexec.exe File created C:\Program Files\DriverUpdate\Open-Source Licenses.txt msiexec.exe File created C:\Program Files\SlimCleaner Plus\SlimWare.PresentationCore.dll msiexec.exe File created C:\Program Files\DriverUpdate\BugSplat.dll msiexec.exe File created C:\Program Files\DriverUpdate\DriverUpdate.exe msiexec.exe File created C:\Program Files\SlimWare Utilities\Services\DriverUpdate.UpdateLauncher.exe msiexec.exe File created C:\Program Files\DriverUpdate\lib-inappbrowser.dll msiexec.exe File created C:\Program Files\DriverUpdate\UnifiedLogger.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\Caliburn.Micro.Platform.dll msiexec.exe File created C:\Program Files\SlimServices\cleaner.db msiexec.exe File created C:\Program Files\SlimCleaner Plus\Caliburn.Micro.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\es-ES\SlimWare.Cleaner.UX.resources.dll msiexec.exe File created C:\Program Files\SlimServices\WinRT.dll msiexec.exe File created C:\Program Files\DriverUpdate\dbghelp-app.dll msiexec.exe File created C:\Program Files\SlimWare Utilities\Services\SlimWare.Core.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\BsSndRpt.exe msiexec.exe File created C:\Program Files\SlimCleaner Plus\BugSplatDotNet.dll msiexec.exe File created C:\Program Files\SlimWare Utilities\Services\SlimWare.Session.exe msiexec.exe File created C:\Program Files\SlimWare Utilities\Services\BugSplatRC64.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\ja-JP\SlimWare.Cleaner.UX.resources.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\SlimCleanerPlus.exe msiexec.exe File created C:\Program Files\DriverUpdate\BugSplatRc.dll msiexec.exe File created C:\Program Files\DriverUpdate\SlimWare.PushNotification.Services.dll msiexec.exe File created C:\Program Files\DriverUpdate\dbghelp.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\lib-inappbrowser.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\pt-BR\SlimWare.Cleaner.UX.resources.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\de-DE\SlimWare.Cleaner.UX.resources.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\System.ValueTuple.dll msiexec.exe File created C:\Program Files\DriverUpdate\htmlayout.dll msiexec.exe File created C:\Program Files\DriverUpdate\InAppBrowserProxy.dll msiexec.exe File created C:\Program Files\SlimWare Utilities\Services\BsSndRpt64.exe msiexec.exe File created C:\Program Files\SlimCleaner Plus\Microsoft.Expression.Drawing.dll msiexec.exe File created C:\Program Files\SlimServices\SlimServiceFactory.exe msiexec.exe File created C:\Program Files\SlimCleaner Plus\System.Json.dll msiexec.exe File created C:\Program Files\SlimWare Utilities\Services\BsSndRpt.exe msiexec.exe File created C:\Program Files\SlimWare Utilities\Services\SlimWare.Session.ProxyStub.dll msiexec.exe File created C:\Program Files\SlimCleaner Plus\SlimWare.AppCore.dll msiexec.exe File created C:\Program Files\SlimServices\UnifiedLogger.dll msiexec.exe -
Drops file in Windows directory 25 IoCs
Processes:
msiexec.exeMicrosoftEdge.exedescription ioc process File created C:\Windows\Installer\{65EFE74B-C710-4203-9B17-458D38584DED}\DesktopIcon.ico msiexec.exe File created C:\Windows\Installer\f755694.msi msiexec.exe File created C:\Windows\Installer\f75568d.msi msiexec.exe File opened for modification C:\Windows\Installer\f75568d.msi msiexec.exe File created C:\Windows\Installer\SourceHash{836CC232-FC4F-427A-8944-425D623EAB45} msiexec.exe File opened for modification C:\Windows\Installer\MSI65D0.tmp msiexec.exe File created C:\Windows\Installer\{65EFE74B-C710-4203-9B17-458D38584DED}\Icon.ico msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\f755691.msi msiexec.exe File opened for modification C:\Windows\Installer\f755691.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIB54D.tmp msiexec.exe File created C:\Windows\Installer\{65EFE74B-C710-4203-9B17-458D38584DED}\StartMenuIcon.ico msiexec.exe File opened for modification C:\Windows\Installer\{65EFE74B-C710-4203-9B17-458D38584DED}\DesktopIcon.ico msiexec.exe File opened for modification C:\Windows\Installer\MSI69F8.tmp msiexec.exe File created C:\Windows\Installer\{836CC232-FC4F-427A-8944-425D623EAB45}\Icon.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIAE57.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{65EFE74B-C710-4203-9B17-458D38584DED} msiexec.exe File opened for modification C:\Windows\Installer\{65EFE74B-C710-4203-9B17-458D38584DED}\Icon.ico msiexec.exe File opened for modification C:\Windows\Installer\MSI6041.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\{836CC232-FC4F-427A-8944-425D623EAB45}\Icon.exe msiexec.exe File created C:\Windows\Installer\f755690.msi msiexec.exe File opened for modification C:\Windows\Installer\{65EFE74B-C710-4203-9B17-458D38584DED}\StartMenuIcon.ico msiexec.exe -
Checks SCSI registry key(s) 3 TTPs 42 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
SlimWare.Session.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\LowerFilters SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Driver SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\LocationInformation SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Address SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\UpperFilters SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceType SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\UINumber SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\UINumberDescFormat SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\UINumberDescFormat SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Capabilities SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs SlimWare.Session.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0025 SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service SlimWare.Session.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceCharacteristics SlimWare.Session.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Mfg SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceCharacteristics SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceType SlimWare.Session.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\RemovalPolicy SlimWare.Session.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\LowerFilters SlimWare.Session.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0025 SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Driver SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\UINumber SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Mfg SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\LocationInformation SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Address SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\RemovalPolicy SlimWare.Session.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\UpperFilters SlimWare.Session.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 4060 taskkill.exe 2584 taskkill.exe 4140 taskkill.exe -
Modifies Control Panel 1 IoCs
Processes:
MicrosoftEdge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\Colors MicrosoftEdge.exe -
Processes:
MicrosoftEdgeCP.exeMsiExec.exeMicrosoftEdge.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\DriverUpdate.exe = "11001" MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\DriverUpdate.exe = "11001" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 57 IoCs
Processes:
SlimWare.Services.exeSlimWare.Session.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates SlimWare.Services.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124 = "Document Encryption" SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs SlimWare.Services.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 SlimWare.Session.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@%SystemRoot%\System32\fveui.dll,-844 = "BitLocker Data Recovery Agent" SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates SlimWare.Services.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache SlimWare.Session.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs SlimWare.Services.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\16\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@%SystemRoot%\System32\ci.dll,-100 = "Isolated User Mode (IUM)" SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs SlimWare.Services.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\17\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates SlimWare.Services.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" SlimWare.Services.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@%SystemRoot%\System32\fveui.dll,-843 = "BitLocker Drive Encryption" SlimWare.Services.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@%SystemRoot%\System32\wuaueng.dll,-400 = "Windows Update" SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates SlimWare.Services.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections SlimWare.Session.exe -
Modifies registry class 564 IoCs
Processes:
MicrosoftEdgeCP.exemsiexec.exeMicrosoftEdge.exeSlimServiceFactory.exeMicrosoftEdgeCP.exeSlimService.exeMicrosoftEdgeCP.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "39" MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{E58DA376-0D39-45ED-A6EE-A7B6DD10BED2}\InprocServer32 msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B47EFE56017C3024B97154D88385D4DE\SourceList msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{BDF76960-B341-4592-BDBA-DFC8C74165A9}\ProxyStubClsid32 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A5FF3EB5-BF62-4D59-84DF-DC518E46FCB3} SlimServiceFactory.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8B43FD92-7BC2-467C-A8B5-67B04B1AFAEA}\TypeLib\ = "{A5FF3EB5-BF62-4D59-84DF-DC518E46FCB3}" SlimServiceFactory.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID\{6D3BC646-CFCD-4098-8495-B7BD0DF13133} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\B47EFE56017C3024B97154D88385D4DE msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "268435456" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BDF76960-B341-4592-BDBA-DFC8C74165A9}\InprocServer32\ = "C:\\Program Files\\SlimWare Utilities\\Services\\SlimWare.Session.ProxyStub.dll" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\slimware.com\Total = "79" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{959D527D-6C27-4879-A644-065526D6969C}\AppID = "{1BD47D21-01F4-4538-9290-39FD569A0F24}" SlimService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{149622B2-F1C5-492D-BFDF-8E5ED85854A0} SlimServiceFactory.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE74B1E6-4EBC-42A1-A4EF-E03F45195608}\1.0\0\win64\ = "C:\\Program Files\\SlimWare Utilities\\Services\\SlimWare.Session.exe" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{5139FDE1-9FDE-4D4C-89D0-5D016161B13A}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\232CC638F4CFA724984424D526E3BA54\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{959D527D-6C27-4879-A644-065526D6969C}\LocalServer32 SlimService.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\slimware.com\ = "158" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersi = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BFEAC894-C89D-411A-89C6-193F109ADA17}\TypeLib SlimService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BAF87BD0-A924-4108-AFA5-A5FA720A2E86}\Elevation SlimServiceFactory.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8B43FD92-7BC2-467C-A8B5-67B04B1AFAEA} SlimServiceFactory.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3B8B86CB-0248-4F00-AC0E-EE5C6795D7F4}\TypeLib\Version = "1.0" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID\{BAF61B64-5D1A-4108-97CB-A10B7DDF730E} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{BAF61B64-5D1A-4108-97CB-A10B7DDF730E}\ = "DriverUpdate.UpdateLauncher" msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\232CC638F4CFA724984424D526E3BA54 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\B47EFE56017C3024B97154D88385D4DE\ProductFeature msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\232CC638F4CFA724984424D526E3BA54\SourceList\Net msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{959D527D-6C27-4879-A644-065526D6969C}\Elevation\Enabled = "1" SlimService.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8B43FD92-7BC2-467C-A8B5-67B04B1AFAEA}\TypeLib\ = "{A5FF3EB5-BF62-4D59-84DF-DC518E46FCB3}" SlimServiceFactory.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{0B1DBA0E-EA1F-4CA3-9E40-B4E84F663D4B} = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\NextBrowserDataLogTime = b099b74263eed601 MicrosoftEdge.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{9AEC63C2-831A-4134-8EB0-02C0B7B97620}\NumMethods msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9276E23-AD64-404D-8D3C-1EBB1F965E40}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\OneTimeCleanup = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{959D527D-6C27-4879-A644-065526D6969C}\TypeLib SlimService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8D0B441E-FC44-4839-B163-B778A2734A16}\ = "IRegistration" SlimServiceFactory.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{3B8B86CB-0248-4F00-AC0E-EE5C6795D7F4} msiexec.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
MsiExec.exemsiexec.exeDriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exeDriverUpdate.exepid process 648 MsiExec.exe 648 MsiExec.exe 648 MsiExec.exe 648 MsiExec.exe 2684 msiexec.exe 2684 msiexec.exe 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2684 msiexec.exe 2684 msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
MicrosoftEdgeCP.exepid process 4504 MicrosoftEdgeCP.exe 4504 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 161 IoCs
Processes:
DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeIncreaseQuotaPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeSecurityPrivilege 2684 msiexec.exe Token: SeCreateTokenPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeAssignPrimaryTokenPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeLockMemoryPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeIncreaseQuotaPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeMachineAccountPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeTcbPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeSecurityPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeTakeOwnershipPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeLoadDriverPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeSystemProfilePrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeSystemtimePrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeProfSingleProcessPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeIncBasePriorityPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeCreatePagefilePrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeCreatePermanentPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeBackupPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeRestorePrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeShutdownPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeDebugPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeAuditPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeSystemEnvironmentPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeChangeNotifyPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeRemoteShutdownPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeUndockPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeSyncAgentPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeEnableDelegationPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeManageVolumePrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeImpersonatePrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeCreateGlobalPrivilege 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
DriverUpdate.exeDriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exepid process 2748 DriverUpdate.exe 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
DriverUpdate.exeDriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exepid process 2748 DriverUpdate.exe 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe -
Suspicious use of SetWindowsHookEx 208 IoCs
Processes:
DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exeDriverUpdate.exepid process 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe 2748 DriverUpdate.exe 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe 2748 DriverUpdate.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
msiexec.exesvchost.exeDriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exescp4F3B.tmp.exeDriverUpdate.exeMsiExec.execmd.exeMicrosoftEdgeCP.exedescription pid process target process PID 2684 wrote to memory of 648 2684 msiexec.exe MsiExec.exe PID 2684 wrote to memory of 648 2684 msiexec.exe MsiExec.exe PID 2364 wrote to memory of 2748 2364 svchost.exe DriverUpdate.exe PID 2364 wrote to memory of 2748 2364 svchost.exe DriverUpdate.exe PID 2364 wrote to memory of 2748 2364 svchost.exe DriverUpdate.exe PID 508 wrote to memory of 3908 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe scp4F3B.tmp.exe PID 508 wrote to memory of 3908 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe scp4F3B.tmp.exe PID 508 wrote to memory of 3908 508 DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe scp4F3B.tmp.exe PID 3908 wrote to memory of 2336 3908 scp4F3B.tmp.exe SlimCleaner-setup.exe PID 3908 wrote to memory of 2336 3908 scp4F3B.tmp.exe SlimCleaner-setup.exe PID 3908 wrote to memory of 2336 3908 scp4F3B.tmp.exe SlimCleaner-setup.exe PID 2748 wrote to memory of 488 2748 DriverUpdate.exe LaunchWinApp.exe PID 2748 wrote to memory of 488 2748 DriverUpdate.exe LaunchWinApp.exe PID 2684 wrote to memory of 2656 2684 msiexec.exe MsiExec.exe PID 2684 wrote to memory of 2656 2684 msiexec.exe MsiExec.exe PID 2684 wrote to memory of 2656 2684 msiexec.exe MsiExec.exe PID 2656 wrote to memory of 3060 2656 MsiExec.exe cmd.exe PID 2656 wrote to memory of 3060 2656 MsiExec.exe cmd.exe PID 2656 wrote to memory of 3060 2656 MsiExec.exe cmd.exe PID 3060 wrote to memory of 4060 3060 cmd.exe taskkill.exe PID 3060 wrote to memory of 4060 3060 cmd.exe taskkill.exe PID 3060 wrote to memory of 4060 3060 cmd.exe taskkill.exe PID 3060 wrote to memory of 2584 3060 cmd.exe taskkill.exe PID 3060 wrote to memory of 2584 3060 cmd.exe taskkill.exe PID 3060 wrote to memory of 2584 3060 cmd.exe taskkill.exe PID 3060 wrote to memory of 4140 3060 cmd.exe taskkill.exe PID 3060 wrote to memory of 4140 3060 cmd.exe taskkill.exe PID 3060 wrote to memory of 4140 3060 cmd.exe taskkill.exe PID 2684 wrote to memory of 4464 2684 msiexec.exe SlimService.exe PID 2684 wrote to memory of 4464 2684 msiexec.exe SlimService.exe PID 2684 wrote to memory of 4532 2684 msiexec.exe SlimServiceFactory.exe PID 2684 wrote to memory of 4532 2684 msiexec.exe SlimServiceFactory.exe PID 4504 wrote to memory of 4656 4504 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4504 wrote to memory of 4656 4504 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4504 wrote to memory of 4656 4504 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe"C:\Users\Admin\AppData\Local\Temp\DriverUpdate-setup-787b5068-7237-4eb5-af86-4038ded17345.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Program Files\DriverUpdate\DriverUpdate.exe"C:\Program Files\DriverUpdate\DriverUpdate.exe" -installscan2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\system32\LaunchWinApp.exe"C:\Windows\system32\LaunchWinApp.exe" "https://slimware.com/register/driverupdate?&guid=43efa00f-9f1d-423f-af16-cff0cca544a7&lang=en&installer_data=ewogICAidXBsIiA6ICJZVG94TVRwN2N6bzVPaUoxYkY5emRIVmlhV1FpTzNNNk16WTZJamhsTXpS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%0D%0APT0iCn0K&config=YTo1OntzOjY6Im1lbW9yeSI7czo2OiI0LjAgR0IiO3M6NToibW9kZWwiO3M6NDoiODBURyI7czo4%0D%0AOiJncmFwaGljcyI7czozMToiTWljcm9zb2Z0IEJhc2ljIERpc3BsYXkgQWRhcHRlciI7czo5OiJw%0D%0Acm9jZXNzb3IiO3M6MjM6IlBlcnNvY29uIFByb2Nlc3NvciAyLjUrIjtzOjEyOiJtYW51ZmFjdHVy%0D%0AZXIiO3M6NjoiTEVOT1ZPIjt9&machineId=6D24CB0C-480B-44E8-8014-FF690C952658&installId=820FD095-BA26-44D6-9E0C-136AF83A384D&productVersion=5.8.16.54"3⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\scp4F3B.tmp.exe"C:\Users\Admin\AppData\Local\Temp\scp4F3B.tmp.exe" --silent SI_LAUNCH=onreboot SI_MODE=toaster SI_DELAY=5 @P2_ORIGIN=^SW1^xdm111 @P2=^SW2^xpt014^^ @UL_STUBID=8e34a95a-1fc1-4190-b919-4eeab9737a612⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\SlimCleaner-setup.exe"C:\Users\Admin\AppData\Local\Temp\SlimCleaner-setup.exe" --silent SI_LAUNCH=onreboot SI_MODE=toaster SI_DELAY=53⤵
- Executes dropped EXE
PID:2336
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding FE9880CD03DA41B6423A0668CC5B5B092⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:648 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 179BBFA03C29DEA8FC601E652DDF1AE02⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /c "taskkill /F /IM "SlimCleanerPlus.exe" & taskkill /f /im slimservice.exe & taskkill /f /im slimservicefactory.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM "SlimCleanerPlus.exe"4⤵
- Kills process with taskkill
PID:4060 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im slimservice.exe4⤵
- Kills process with taskkill
PID:2584 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im slimservicefactory.exe4⤵
- Kills process with taskkill
PID:4140 -
C:\Program Files\SlimServices\SlimService.exe"C:\Program Files\SlimServices\SlimService.exe" /regserver2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4464 -
C:\Program Files\SlimServices\SlimServiceFactory.exe"C:\Program Files\SlimServices\SlimServiceFactory.exe" /regserver2⤵
- Executes dropped EXE
- Modifies registry class
PID:4532
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:2364
-
C:\Program Files\SlimWare Utilities\Services\SlimWare.Services.exe"C:\Program Files\SlimWare Utilities\Services\SlimWare.Services.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:2024
-
C:\Program Files\SlimWare Utilities\Services\SlimWare.Session.exe"C:\Program Files\SlimWare Utilities\Services\SlimWare.Session.exe" -Embedding1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:2816
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3676
-
C:\Program Files\DriverUpdate\DriverUpdate.exe"C:\Program Files\DriverUpdate\DriverUpdate.exe" "C:\Program Files\DriverUpdate\DriverUpdate.exe" -installresults1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:416
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
PID:4200
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4240
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4504
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:4656
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5116
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4500
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e294d13f8b64989a2b15b558f567d7ba
SHA1e10626ae59f1c888ed48c7be51e9e8b491259599
SHA2566fd184e4e2b1d4ca2314f4d16b0e86a0e398054038a2235086d588f02bf39c67
SHA5125292aaae51e82daf55e6dbe68182b253f238e5cbd50fd342bc51cb82ff13b64c2fba4fa97ddd07bbf6283301c0f84f5f6b5a3a762e995fc54f6d4ed9807fd407
-
MD5
8a70193b4d03c2225199f106ed25be0a
SHA19038ec8ff8a977d2f003b819f10d1bcfe0c88d38
SHA256e7321eb4fe557003ab89958e50123a92e41361dbe814267dd5dc2ff08c6b1b30
SHA51299624961333af324c6af66df4445f50371a18156635a81cc55b9dd3869ead99cf3a140833de15e515ebe5eb706a7ef13242801b20a59d749ede0632283f572b5
-
MD5
8a70193b4d03c2225199f106ed25be0a
SHA19038ec8ff8a977d2f003b819f10d1bcfe0c88d38
SHA256e7321eb4fe557003ab89958e50123a92e41361dbe814267dd5dc2ff08c6b1b30
SHA51299624961333af324c6af66df4445f50371a18156635a81cc55b9dd3869ead99cf3a140833de15e515ebe5eb706a7ef13242801b20a59d749ede0632283f572b5
-
MD5
8a70193b4d03c2225199f106ed25be0a
SHA19038ec8ff8a977d2f003b819f10d1bcfe0c88d38
SHA256e7321eb4fe557003ab89958e50123a92e41361dbe814267dd5dc2ff08c6b1b30
SHA51299624961333af324c6af66df4445f50371a18156635a81cc55b9dd3869ead99cf3a140833de15e515ebe5eb706a7ef13242801b20a59d749ede0632283f572b5
-
MD5
adc75ffb94d21a320a46dc3b2a5fa456
SHA171232a4e2805dc6d86a1c4c46e92013babb3c6c8
SHA2565d79fc11d717b88fd34c09d025279125773e01cb8401f81bbbe3170ad3dc2e3c
SHA512151ae707569c20eaddb883ecf011b1bc256f7510e1a7bd9de94be1bf02ad371344ecdf3932ed8546341ef04e310ad0aeac69cac3713eddddaa6c64aadf1312e6
-
MD5
f0e2ae32444a39c0980563362f133465
SHA1266e9dc35f4667149953407101fa6bec2c649ad9
SHA25652c2cf7eaad4d5a3e040f027594806188c0b14c277676cb2f4a4f2379cacadb4
SHA5120c074b15d369155d2bff0069a3ac6d2880555ae2808e5e2de5a4e46dfd6af800eba5529a5fd5f6fdd8e46afa7defa45a42eeeba32c2b130e742d082b494c7370
-
MD5
48c40a43e01250f8d0b6bb9f4c624def
SHA15b6440dbea4e39da6390abfa1c916b99bd4ab275
SHA25625e8b1e43219ade22c5ed8a98af6f2027e31c56e3744cbb99ec619acf1c16819
SHA512120ddbe552d1920271a749be9c2d2843af82682238f842f49fb66b3fe8fa34488bb808e720ab07141736deaa33115177cde570d346678ba530999c58545cb562
-
MD5
1e991b7b74f0dfcc6da3fb1e0a7c893f
SHA1aff20ae9b8cd1a8dc9f24edd7073e211a5d753b2
SHA256efc3770a6460084788cce9b151c033b278c73a9e269c09145f01887819b9361c
SHA5121fe99a40bfaaf7eae93b9632e463b1752700b22547f8873f575a87fd91b3aa24d5da599de9b07f132013313d28f5e9c375146d005c828fdcd8f3025c14bb2ba9
-
MD5
2e54de29cc012bd960f028f8b67cb78f
SHA12a9e2a180533798b784e7f1f40a6010ff27f7725
SHA256c5dc356d255c1d563bb5a513832265681f2391010625aee5d2be5be20c083c2e
SHA5124109281bb53db56853c54acdfbffa810ca242639c3a7a3f5d8612806165124b5ac32d703394b97c46a0f310737369663515d2ce6bc7869c48f3286767c294009
-
MD5
2e54de29cc012bd960f028f8b67cb78f
SHA12a9e2a180533798b784e7f1f40a6010ff27f7725
SHA256c5dc356d255c1d563bb5a513832265681f2391010625aee5d2be5be20c083c2e
SHA5124109281bb53db56853c54acdfbffa810ca242639c3a7a3f5d8612806165124b5ac32d703394b97c46a0f310737369663515d2ce6bc7869c48f3286767c294009
-
MD5
fb04c6cec8cc05755704d555e18c8f1a
SHA1456d99ee4fdd85e4bb5086136b62294b4d9022d8
SHA2566bd3a958d4159853017c2bb1e823f76897dbd559dca66a495f3b2d54e3d21f99
SHA512e30b46d880cc1db3f2a20593139c75085d3d49870dbb43fde9547d8811875414cdfbb51f9aaa7a9aba47e9ce63a0037804a62e01905755ea3c59c4e46070a4fa
-
MD5
fb04c6cec8cc05755704d555e18c8f1a
SHA1456d99ee4fdd85e4bb5086136b62294b4d9022d8
SHA2566bd3a958d4159853017c2bb1e823f76897dbd559dca66a495f3b2d54e3d21f99
SHA512e30b46d880cc1db3f2a20593139c75085d3d49870dbb43fde9547d8811875414cdfbb51f9aaa7a9aba47e9ce63a0037804a62e01905755ea3c59c4e46070a4fa
-
MD5
2845ceefc13dac427dfac8e0a5769ce2
SHA19e49f1b7a2513a5d37d434e38f9984fdd1e7c5ed
SHA2563b4db6bec8e28a7bb0358ab827aa5f45d8e6b0df71f982ce9bb39ef1c71151d5
SHA5120dbcc147ca93d097cfa93404845701de8c10f278770b450f6efab0d132e012d01ba77183575cc99b6330303ceda8ce2eec581e7df762052adee1a23d7726437b
-
MD5
3bba6f6705085cd26fef183fdd1807ad
SHA1eb1355c4d2777444c3e4788122119b2e60b28aa8
SHA2561076117986e27e0bca3c6396b0593f1bab3b2edef76053f0144e3835f76a2112
SHA512807bcb32bd037f4bc3719d075e54dbf57854109d4cc144ce7f67fa126fdda0f5865d3d3d204a65b432b9ed1debd80cdb07feb82ca03f6f39aa10a1676b28df6a
-
MD5
f1a2d92bb8738eab02b92c741a9c5299
SHA1ac22734c386e3e2dabe9ac9767a23e8f01755d4f
SHA2566859c336dc4f42dc70a542db8185948931907734978eeb7088d47256bd4199cd
SHA512344ad89725e98636bae65b219f479a59c98e0131e2dbbab80c3c35443b776499d5c2a4e218ce62c0752cc67eb595c75b83775c54065a13986265885675b0cd99
-
MD5
8cc32b432ee34f64a3d6a11661a8c735
SHA17a3a19528d9428e53595a1c38f2f660ecf27ca43
SHA25679cc5a60a7d8b4649b78e890bdcfe06e110b9fd23ff854ca1a7bf2cc5caf8561
SHA512f03810c962608d3a8d2546946019665c010eda19e7797a178943069111ca38675592b4ab62e8749e56c91616a6ff4ba8d00a5cdc9586113309a096812c0c899f
-
MD5
cafa201c22f96d57102147b403c5dc47
SHA1d311f72b61dce4ac963f01e708cb7bc216d19aa2
SHA256e0f1740a80b80472ed0c00cf8fd1f5221305ab3ef61ee1ae0f4db832923f8211
SHA512db5ac7794b278742a2b7f38547f000bd38be8d89a6599133981aeec784157264222c14cb9a9c577e2ac52a1dfab1db067d8c0e46eafd942dcd4941fe034ef677
-
MD5
cafa201c22f96d57102147b403c5dc47
SHA1d311f72b61dce4ac963f01e708cb7bc216d19aa2
SHA256e0f1740a80b80472ed0c00cf8fd1f5221305ab3ef61ee1ae0f4db832923f8211
SHA512db5ac7794b278742a2b7f38547f000bd38be8d89a6599133981aeec784157264222c14cb9a9c577e2ac52a1dfab1db067d8c0e46eafd942dcd4941fe034ef677
-
MD5
06a8b08f6b9e99ad1e51c8f485f3db8a
SHA10e42414d2e74e51ac327add86e94941b2b997a17
SHA256926ae2a36046e1fb671d8bca132b0d6e34df945d6b37b43d8ae955c73efe6912
SHA512cf997fa0ba01528e8e0454716de96c88eb3c650f412d2dd2c84ee79c494a35bb3204092296e7008cae546e45de7986c99521307a1cd7c7e027ec7bed4ba86a7d
-
MD5
e80a2c170843a3492bddba4048d36101
SHA1512f5fbdab22d5b15bf6ef5e9af4bc1d19270565
SHA256d54151b0a1ee409b3f82cc093dce453fa1fd5c275b5b015c1674b55f9cc385ba
SHA512bee760fca6ab3bd41f72d48a6beeebeea8decc0cacdb61f799144f5f9cb95c3f5a21b9a6114097a66b126f472fa358b9858a5f821ecfe9051bbb00ccdf5fe6be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C46E7B0F942663A1EDC8D9D6D7869173_6043FC604A395E1485AF7AC16D16B7CE
MD58df2bb48ca13f719b36a2df89d743191
SHA1803d54f7f6894c2cbf1c8e3d5e903439d9f05728
SHA2566e77f95c9a8462ee3902b9798e9733154f3f5740ccfc0b92b0882ef5eb2c537d
SHA512898f70b72b80e2f122e953a55a4bc1652d2dbab9dba2f6cf86a74f8b2946c0c7c99394c93e6a53f13e5eae407273b76f93448a7a35c4753c42a78c635049c649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EA618097E393409AFA316F0F87E2C202_2280A2210A1DD6666EC3A552D924ABF6
MD54e6a623f1d0b5aa0296a02b61f3df369
SHA1a5797a957a92aee4ea3883b22484fac9c6cfe741
SHA256aa44a5f1ed62aba84b2283d2465a64a3531b5fcef005d3be03c45a9eebf0bb8c
SHA5122df1dce32bf5525d518d26730c661b756b8829abb7173643a81d4324017d3fc627484699917b6992e4ccb03005d9114cb01ad937d5576a3795e1e3a6f2e0bdf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C46E7B0F942663A1EDC8D9D6D7869173_6043FC604A395E1485AF7AC16D16B7CE
MD5eedebbbf810fa3d4cb7cf2bcca135682
SHA10c1a206b5e71162bf1a627b5b092addc4331c5eb
SHA25608d19199013cf464498a3ceeed9727a5d534c3e8cfa8254bbcef7d1c81230284
SHA5125085fc2d8b2e04cb1a24d3cbc95b26ee27c480ec8d6346d36fad089465d6ff954b999a312a9fe7362472c2bf589a7915ae6d35b0d7d0a08b8e6e1b33c02e1c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EA618097E393409AFA316F0F87E2C202_2280A2210A1DD6666EC3A552D924ABF6
MD54dd2770c00519ec6390712d851b3a6d0
SHA16c47916784a85eadb2e5823c38991fa7dedcd998
SHA25667bb01abbd76c0abdb8172ec964b3c2d518ca68597dc38d543262886432df837
SHA512270c40b77778b046cf13e21e8cc78476c614db1b8fa6d067b093dac4e0061380ef4eb073df9294f87d97ee14cb1d285c418ebd32f7307119f49163ed10de205d
-
MD5
d2f751dab4b41916a19eeffdc5169682
SHA1eb84833bced6582a85c1059b981f3d1ffc1992c7
SHA2560fc72fcae3fa3a60b27babf857ec33f527a83f02fafedd2f52ea74444d5a78b2
SHA5127923b2bc8eab0c2fc70909f26adb4c44a309b1900ac280042be8507a81e876087b008bdbf4c2e4b0574af71466322e0711154ed025855bd2d59e4c814c931f0e
-
MD5
d70119e4926a20ac3805893cc140a864
SHA1ed6eedc3ccf5c2f37f385b75d74c151505ad12cb
SHA2569b8e0e689693bbecd56212070206aacbfe18c374976d7f521d40b1c0840f2a57
SHA512d4020edde9ad88681dffffe2472be22473d724e3b801b1826661735ec74c45e21e112f085a3f8a7365f929dcce7f770110bd793b8d35fb469f053b3570418ca3
-
MD5
7270f8c1a1024c194f092d98ad1b0f9d
SHA14f174acebdcbb4db4ff5af060229e2220fc27cfe
SHA256d1e756241a818db02ca3381ac65d6d4f1060f80d6118131686a00554d96b126e
SHA512cdf24d1eaf92b3b4e9691bea4a025fd09ea1807f0c5cc3beed6825079bc9baf33a4e00d955216fdad7f38b6c4b852c574963f916ed1ca171f1711878853b4f15
-
MD5
7270f8c1a1024c194f092d98ad1b0f9d
SHA14f174acebdcbb4db4ff5af060229e2220fc27cfe
SHA256d1e756241a818db02ca3381ac65d6d4f1060f80d6118131686a00554d96b126e
SHA512cdf24d1eaf92b3b4e9691bea4a025fd09ea1807f0c5cc3beed6825079bc9baf33a4e00d955216fdad7f38b6c4b852c574963f916ed1ca171f1711878853b4f15
-
MD5
d4522da4772683c9ff12e86a173f5457
SHA1f1e5bc8f8ebd6bb2566a4ff31d8e1fbe152b521e
SHA25648a333f00e2f13664e77e58b324a8ee131b46806aa326dfe6808d84faa53ffe6
SHA512f010939ff227f8847ac6c0788fdaf9df6c5ed83caba46998c1d1d4a3adefb98b7b4025fec46a4e57f59ace9e095c1802f1ae94b4cbd8b5d7e55a9626e28f1dcc
-
MD5
d4522da4772683c9ff12e86a173f5457
SHA1f1e5bc8f8ebd6bb2566a4ff31d8e1fbe152b521e
SHA25648a333f00e2f13664e77e58b324a8ee131b46806aa326dfe6808d84faa53ffe6
SHA512f010939ff227f8847ac6c0788fdaf9df6c5ed83caba46998c1d1d4a3adefb98b7b4025fec46a4e57f59ace9e095c1802f1ae94b4cbd8b5d7e55a9626e28f1dcc
-
MD5
5ecb968f55f9c1841f82a4e930ee3c24
SHA1465af397d6fcff13a08a56141d96bc32acf829a1
SHA256b89865f15344b76778ab09865ea7c4f7119189d2aa775eb6a74567ceac398ea0
SHA51272c86217fe05819f4892ef606a9c233e8959fd6ef77037a246aec5857b0bbd5ab37230af3ec54c35bedd6f48a2ed029cfbd7e4e44493487ff26a4a0ddb730336
-
MD5
fb6cdb0cddd0f384701022b0d1e8d833
SHA16477ad19453f4935e9a72682eff59590fa8c6ffd
SHA25624556d9695f166c495c738f265e1ad82de8883acb44ab78f882867f52339ee0a
SHA512aba895fd39a6648a548a433fb6db72c2127573fc6f5e905a92b885e41fd3b118d454dc92ca8a88df84d92d11e762986dc14a11b5b7f0d739ef6d2d9187796143
-
MD5
fb6cdb0cddd0f384701022b0d1e8d833
SHA16477ad19453f4935e9a72682eff59590fa8c6ffd
SHA25624556d9695f166c495c738f265e1ad82de8883acb44ab78f882867f52339ee0a
SHA512aba895fd39a6648a548a433fb6db72c2127573fc6f5e905a92b885e41fd3b118d454dc92ca8a88df84d92d11e762986dc14a11b5b7f0d739ef6d2d9187796143
-
MD5
d773d9bd091e712df7560f576da53de8
SHA1165cfbdce1811883360112441f7237b287cf0691
SHA256e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7
SHA51215a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd
-
MD5
e294d13f8b64989a2b15b558f567d7ba
SHA1e10626ae59f1c888ed48c7be51e9e8b491259599
SHA2566fd184e4e2b1d4ca2314f4d16b0e86a0e398054038a2235086d588f02bf39c67
SHA5125292aaae51e82daf55e6dbe68182b253f238e5cbd50fd342bc51cb82ff13b64c2fba4fa97ddd07bbf6283301c0f84f5f6b5a3a762e995fc54f6d4ed9807fd407
-
MD5
e294d13f8b64989a2b15b558f567d7ba
SHA1e10626ae59f1c888ed48c7be51e9e8b491259599
SHA2566fd184e4e2b1d4ca2314f4d16b0e86a0e398054038a2235086d588f02bf39c67
SHA5125292aaae51e82daf55e6dbe68182b253f238e5cbd50fd342bc51cb82ff13b64c2fba4fa97ddd07bbf6283301c0f84f5f6b5a3a762e995fc54f6d4ed9807fd407
-
MD5
adc75ffb94d21a320a46dc3b2a5fa456
SHA171232a4e2805dc6d86a1c4c46e92013babb3c6c8
SHA2565d79fc11d717b88fd34c09d025279125773e01cb8401f81bbbe3170ad3dc2e3c
SHA512151ae707569c20eaddb883ecf011b1bc256f7510e1a7bd9de94be1bf02ad371344ecdf3932ed8546341ef04e310ad0aeac69cac3713eddddaa6c64aadf1312e6
-
MD5
f0e2ae32444a39c0980563362f133465
SHA1266e9dc35f4667149953407101fa6bec2c649ad9
SHA25652c2cf7eaad4d5a3e040f027594806188c0b14c277676cb2f4a4f2379cacadb4
SHA5120c074b15d369155d2bff0069a3ac6d2880555ae2808e5e2de5a4e46dfd6af800eba5529a5fd5f6fdd8e46afa7defa45a42eeeba32c2b130e742d082b494c7370
-
MD5
48c40a43e01250f8d0b6bb9f4c624def
SHA15b6440dbea4e39da6390abfa1c916b99bd4ab275
SHA25625e8b1e43219ade22c5ed8a98af6f2027e31c56e3744cbb99ec619acf1c16819
SHA512120ddbe552d1920271a749be9c2d2843af82682238f842f49fb66b3fe8fa34488bb808e720ab07141736deaa33115177cde570d346678ba530999c58545cb562
-
MD5
1e991b7b74f0dfcc6da3fb1e0a7c893f
SHA1aff20ae9b8cd1a8dc9f24edd7073e211a5d753b2
SHA256efc3770a6460084788cce9b151c033b278c73a9e269c09145f01887819b9361c
SHA5121fe99a40bfaaf7eae93b9632e463b1752700b22547f8873f575a87fd91b3aa24d5da599de9b07f132013313d28f5e9c375146d005c828fdcd8f3025c14bb2ba9
-
MD5
3bba6f6705085cd26fef183fdd1807ad
SHA1eb1355c4d2777444c3e4788122119b2e60b28aa8
SHA2561076117986e27e0bca3c6396b0593f1bab3b2edef76053f0144e3835f76a2112
SHA512807bcb32bd037f4bc3719d075e54dbf57854109d4cc144ce7f67fa126fdda0f5865d3d3d204a65b432b9ed1debd80cdb07feb82ca03f6f39aa10a1676b28df6a
-
MD5
f1a2d92bb8738eab02b92c741a9c5299
SHA1ac22734c386e3e2dabe9ac9767a23e8f01755d4f
SHA2566859c336dc4f42dc70a542db8185948931907734978eeb7088d47256bd4199cd
SHA512344ad89725e98636bae65b219f479a59c98e0131e2dbbab80c3c35443b776499d5c2a4e218ce62c0752cc67eb595c75b83775c54065a13986265885675b0cd99
-
MD5
f1a2d92bb8738eab02b92c741a9c5299
SHA1ac22734c386e3e2dabe9ac9767a23e8f01755d4f
SHA2566859c336dc4f42dc70a542db8185948931907734978eeb7088d47256bd4199cd
SHA512344ad89725e98636bae65b219f479a59c98e0131e2dbbab80c3c35443b776499d5c2a4e218ce62c0752cc67eb595c75b83775c54065a13986265885675b0cd99
-
MD5
8cc32b432ee34f64a3d6a11661a8c735
SHA17a3a19528d9428e53595a1c38f2f660ecf27ca43
SHA25679cc5a60a7d8b4649b78e890bdcfe06e110b9fd23ff854ca1a7bf2cc5caf8561
SHA512f03810c962608d3a8d2546946019665c010eda19e7797a178943069111ca38675592b4ab62e8749e56c91616a6ff4ba8d00a5cdc9586113309a096812c0c899f
-
MD5
8cc32b432ee34f64a3d6a11661a8c735
SHA17a3a19528d9428e53595a1c38f2f660ecf27ca43
SHA25679cc5a60a7d8b4649b78e890bdcfe06e110b9fd23ff854ca1a7bf2cc5caf8561
SHA512f03810c962608d3a8d2546946019665c010eda19e7797a178943069111ca38675592b4ab62e8749e56c91616a6ff4ba8d00a5cdc9586113309a096812c0c899f
-
MD5
06a8b08f6b9e99ad1e51c8f485f3db8a
SHA10e42414d2e74e51ac327add86e94941b2b997a17
SHA256926ae2a36046e1fb671d8bca132b0d6e34df945d6b37b43d8ae955c73efe6912
SHA512cf997fa0ba01528e8e0454716de96c88eb3c650f412d2dd2c84ee79c494a35bb3204092296e7008cae546e45de7986c99521307a1cd7c7e027ec7bed4ba86a7d
-
MD5
06a8b08f6b9e99ad1e51c8f485f3db8a
SHA10e42414d2e74e51ac327add86e94941b2b997a17
SHA256926ae2a36046e1fb671d8bca132b0d6e34df945d6b37b43d8ae955c73efe6912
SHA512cf997fa0ba01528e8e0454716de96c88eb3c650f412d2dd2c84ee79c494a35bb3204092296e7008cae546e45de7986c99521307a1cd7c7e027ec7bed4ba86a7d
-
MD5
ee2540c23fc04dd39a17cc466ff3c946
SHA1d61d77d4def107fc63350f457c32d06ac675ef19
SHA2565c43198ee7e9e4c94f4700a8032d368d3854c6b7e2f04a930d23b373f55ee003
SHA51200ec2be28622b295b7ecf34a02d48085c4f4d399e6ed94df13d6c79b076e05cafb3d3c702bca612b51c6773726776797677b2642555718f3512db2b9bc2845df
-
MD5
ee2540c23fc04dd39a17cc466ff3c946
SHA1d61d77d4def107fc63350f457c32d06ac675ef19
SHA2565c43198ee7e9e4c94f4700a8032d368d3854c6b7e2f04a930d23b373f55ee003
SHA51200ec2be28622b295b7ecf34a02d48085c4f4d399e6ed94df13d6c79b076e05cafb3d3c702bca612b51c6773726776797677b2642555718f3512db2b9bc2845df
-
MD5
fb6cdb0cddd0f384701022b0d1e8d833
SHA16477ad19453f4935e9a72682eff59590fa8c6ffd
SHA25624556d9695f166c495c738f265e1ad82de8883acb44ab78f882867f52339ee0a
SHA512aba895fd39a6648a548a433fb6db72c2127573fc6f5e905a92b885e41fd3b118d454dc92ca8a88df84d92d11e762986dc14a11b5b7f0d739ef6d2d9187796143
-
MD5
fb6cdb0cddd0f384701022b0d1e8d833
SHA16477ad19453f4935e9a72682eff59590fa8c6ffd
SHA25624556d9695f166c495c738f265e1ad82de8883acb44ab78f882867f52339ee0a
SHA512aba895fd39a6648a548a433fb6db72c2127573fc6f5e905a92b885e41fd3b118d454dc92ca8a88df84d92d11e762986dc14a11b5b7f0d739ef6d2d9187796143
-
MD5
d773d9bd091e712df7560f576da53de8
SHA1165cfbdce1811883360112441f7237b287cf0691
SHA256e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7
SHA51215a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd