Analysis
-
max time kernel
132s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
11-05-2021 13:37
Static task
static1
Behavioral task
behavioral1
Sample
70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe
Resource
win7v20210408
General
-
Target
70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe
-
Size
1.0MB
-
MD5
30fd7fadaf2d351f849d841bb15bbc7d
-
SHA1
8c3d626dd7f709a4a5376b7272937afbe21757fa
-
SHA256
70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6
-
SHA512
21501348b7b04d9b42709eb899ee63bb78c2217b95a4693f494921b08e4ff01aaffa67da5c0829e99ed7b4a921ae323d7cdb21d6da2480806f605f6b0864ce4c
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 17 IoCs
Processes:
._cache_70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exeSynaptics.exesetup-stub.exedownload.exesetup.exemaintenanceservice_installer.exemaintenanceservice_tmp.exedefault-browser-agent.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exepid process 3964 ._cache_70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe 60 Synaptics.exe 3256 setup-stub.exe 64 download.exe 3176 setup.exe 4280 maintenanceservice_installer.exe 3832 maintenanceservice_tmp.exe 4180 default-browser-agent.exe 3476 firefox.exe 5112 firefox.exe 4408 firefox.exe 3108 firefox.exe 4416 firefox.exe 2148 firefox.exe 4560 firefox.exe 2660 firefox.exe 1332 firefox.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\qmCKkDz3.xlsm office_macros -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\._cache_70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe upx C:\Users\Admin\AppData\Local\Temp\._cache_70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe upx C:\Users\Admin\AppData\Local\Temp\nsc7FD5.tmp\download.exe upx C:\Users\Admin\AppData\Local\Temp\nsc7FD5.tmp\download.exe upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exefirefox.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation 70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation firefox.exe -
Loads dropped DLL 64 IoCs
Processes:
setup-stub.exesetup.exeregsvr32.exeregsvr32.exemaintenanceservice_installer.exedefault-browser-agent.exepid process 3256 setup-stub.exe 3256 setup-stub.exe 3256 setup-stub.exe 3256 setup-stub.exe 3256 setup-stub.exe 3256 setup-stub.exe 3256 setup-stub.exe 3256 setup-stub.exe 3256 setup-stub.exe 3256 setup-stub.exe 3256 setup-stub.exe 3256 setup-stub.exe 3256 setup-stub.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3680 regsvr32.exe 3680 regsvr32.exe 3596 regsvr32.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 4280 maintenanceservice_installer.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 4180 default-browser-agent.exe 4180 default-browser-agent.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe 3176 setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA firefox.exe -
Drops file in Program Files directory 64 IoCs
Processes:
setup.exesetup-stub.exemaintenanceservice_installer.exedescription ioc process File created C:\Program Files\Mozilla Firefox\browser\META-INF\cose.manifest setup.exe File created C:\Program Files\Mozilla Firefox\api-ms-win-crt-convert-l1-1-0.dll setup.exe File created C:\Program Files\Mozilla Firefox\plugin-hang-ui.exe setup.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\ setup.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-private-l1-1-0.dll setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-multibyte-l1-1-0.dll setup-stub.exe File created C:\Program Files\Mozilla Firefox\META-INF\cose.sig setup.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\[email protected] setup-stub.exe File created C:\Program Files\Mozilla Firefox\vcruntime140.dll setup.exe File created C:\Program Files\Mozilla Firefox\browser\VisualElements\VisualElements_150.png setup.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\updater.ini maintenanceservice_installer.exe File created C:\Program Files\Mozilla Firefox\lgpllibs.dll setup.exe File created C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe setup.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\ setup-stub.exe File created C:\Program Files\Mozilla Firefox\browser\VisualElements\VisualElements_70.png setup.exe File created C:\Program Files\Mozilla Firefox\browser\META-INF\cose.sig setup.exe File opened for modification C:\Program Files\Mozilla Firefox\IA2Marshal.dll setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\AccessibleMarshal.dll setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-file-l1-2-0.dll setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\ setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\ setup.exe File created C:\Program Files\Mozilla Firefox\defaultagent.ini setup.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja setup.exe File opened for modification C:\Program Files\Mozilla Firefox\nss3.dll setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\manifest.json setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-utility-l1-1-0.dll setup-stub.exe File created C:\Program Files\Mozilla Firefox\mozavutil.dll setup.exe File created C:\Program Files\Mozilla Firefox\META-INF\manifest.mf setup.exe File opened for modification C:\Program Files\Mozilla Firefox\xul.dll setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\d3dcompiler_47.dll setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\AccessibleHandler.dll setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-hang-ui.exe setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\libEGL.dll setup-stub.exe File created C:\Program Files\Mozilla Firefox\Accessible.tlb setup.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-timezone-l1-1-0.dll setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\install.tmp setup-stub.exe File created C:\Program Files\Mozilla Firefox\api-ms-win-crt-utility-l1-1-0.dll setup.exe File created C:\Program Files\Mozilla Firefox\fonts\TwemojiMozilla.ttf setup.exe File opened for modification C:\Program Files\Mozilla Firefox\nssckbi.dll setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\mozavcodec.dll setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-process-l1-1-0.dll setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\xul.dll.sig setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\[email protected] setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\ setup-stub.exe File created C:\Program Files\Mozilla Firefox\crashreporter.ini setup.exe File opened for modification C:\Program Files\Mozilla Firefox\platform.ini setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\[email protected] setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-string-l1-1-0.dll setup-stub.exe File created C:\Program Files\Mozilla Firefox\uninstall\shortcuts_log.ini setup.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-stdio-l1-1-0.dll setup-stub.exe File created C:\Program Files\Mozilla Firefox\platform.ini setup.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-time-l1-1-0.dll setup-stub.exe File created C:\Program Files\Mozilla Firefox\locale.ini setup.exe File created C:\Program Files\Mozilla Firefox\install.tmp setup-stub.exe File created C:\Program Files\Mozilla Firefox\api-ms-win-core-localization-l1-2-0.dll setup.exe File created C:\Program Files\Mozilla Firefox\api-ms-win-core-timezone-l1-1-0.dll setup.exe File created C:\Program Files\Mozilla Firefox\d3dcompiler_47.dll setup.exe File opened for modification C:\Program Files\Mozilla Firefox\vcruntime140.dll setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-runtime-l1-1-0.dll setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\lgpllibs.dll setup-stub.exe File created C:\Program Files\Mozilla Firefox\AccessibleHandler.dll setup.exe File created C:\Program Files\Mozilla Firefox\api-ms-win-crt-time-l1-1-0.dll setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEfirefox.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
regsvr32.exeregsvr32.exesetup.exe70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1814CEEB-49E2-407F-AF99-FA755A7D2607}\InProcServer32\ = "C:\\Program Files\\Mozilla Firefox\\AccessibleMarshal.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0D68D6D0-D93D-4D08-A30D-F00DD1F45B24}\NumMethods\ = "9" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Interface regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B32983FF-EF84-4945-8F86-FB7491B4F57B}\ = "IGeckoBackChannel" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxURL-308046B0AF4A39CB\FriendlyTypeName = "Firefox URL" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1BAA303D-B4B9-45E5-9CCB-E3FCA3E274B6}\InprocHandler32\ = "C:\\Program Files\\Mozilla Firefox\\AccessibleHandler.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxHTML-308046B0AF4A39CB\shell\open\ddeexec setup.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Interface regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE30F77E-8847-44F0-A648-A9656BD89C0D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE30F77E-8847-44F0-A648-A9656BD89C0D}\NumMethods\ = "5" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DCA8D857-1A63-4045-8F36-8809EB093D04}\SynchronousInterface regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxHTML-308046B0AF4A39CB\ = "Firefox HTML Document" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxURL-308046B0AF4A39CB\DefaultIcon\ = "C:\\Program Files\\Mozilla Firefox\\firefox.exe,1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxHTML-308046B0AF4A39CB\FriendlyTypeName = "Firefox HTML Document" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxHTML-308046B0AF4A39CB\DefaultIcon setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance 70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0D68D6D0-D93D-4D08-A30D-F00DD1F45B24}\ProxyStubClsid32\ = "{1814CEEB-49E2-407F-AF99-FA755A7D2607}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4E747BE5-2052-4265-8AF0-8ECAD7AAD1C0}\ProxyStubClsid32\ = "{1814CEEB-49E2-407F-AF99-FA755A7D2607}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1814CEEB-49E2-407F-AF99-FA755A7D2607} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1BAA303D-B4B9-45E5-9CCB-E3FCA3E274B6} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DCA8D857-1A63-4045-8F36-8809EB093D04}\SynchronousInterface\ = "{CE30F77E-8847-44F0-A648-A9656BD89C0D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxURL-308046B0AF4A39CB\shell\open\command\ = "\"C:\\Program Files\\Mozilla Firefox\\firefox.exe\" -osint -url \"%1\"" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\firefox.exe\shell\open\command\ = "\"C:\\Program Files\\Mozilla Firefox\\firefox.exe\" -osint -url \"%1\"" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1814CEEB-49E2-407F-AF99-FA755A7D2607} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxHTML-308046B0AF4A39CB\shell setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxURL-308046B0AF4A39CB\URL Protocol setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxURL-308046B0AF4A39CB\shell\open\ddeexec setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DCA8D857-1A63-4045-8F36-8809EB093D04}\ = "AsyncIHandlerControl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxHTML-308046B0AF4A39CB\shell\ = "open" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1814CEEB-49E2-407F-AF99-FA755A7D2607}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1814CEEB-49E2-407F-AF99-FA755A7D2607}\ProxyStubClsid32\ = "{1814CEEB-49E2-407F-AF99-FA755A7D2607}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1814CEEB-49E2-407F-AF99-FA755A7D2607}\ = "ISimpleDOMNode" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DCA8D857-1A63-4045-8F36-8809EB093D04}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DCA8D857-1A63-4045-8F36-8809EB093D04}\ = "PSFactoryBuffer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE30F77E-8847-44F0-A648-A9656BD89C0D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxURL-308046B0AF4A39CB\ = "Firefox URL" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxURL-308046B0AF4A39CB\shell\open\command setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE30F77E-8847-44F0-A648-A9656BD89C0D}\AsynchronousInterface regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B32983FF-EF84-4945-8F86-FB7491B4F57B}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxHTML-308046B0AF4A39CB setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxURL-308046B0AF4A39CB\DefaultIcon setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxURL-308046B0AF4A39CB\shell\open\ddeexec\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4E747BE5-2052-4265-8AF0-8ECAD7AAD1C0}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B32983FF-EF84-4945-8F86-FB7491B4F57B}\NumMethods\ = "8" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxHTML-308046B0AF4A39CB\shell\open\ddeexec\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxURL-308046B0AF4A39CB\shell\ = "open" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\FIREFOXURL-308046B0AF4A39CB\SHELL\OPEN\DDEEXEC setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxHTML-308046B0AF4A39CB\FriendlyTypeName = "Firefox Document" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1814CEEB-49E2-407F-AF99-FA755A7D2607}\ = "PSFactoryBuffer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0D68D6D0-D93D-4D08-A30D-F00DD1F45B24}\ = "ISimpleDOMDocument" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DCA8D857-1A63-4045-8F36-8809EB093D04}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DCA8D857-1A63-4045-8F36-8809EB093D04}\InProcServer32\ = "C:\\Program Files\\Mozilla Firefox\\AccessibleHandler.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B32983FF-EF84-4945-8F86-FB7491B4F57B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B32983FF-EF84-4945-8F86-FB7491B4F57B}\ProxyStubClsid32\ = "{DCA8D857-1A63-4045-8F36-8809EB093D04}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1814CEEB-49E2-407F-AF99-FA755A7D2607}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxHTML-308046B0AF4A39CB\shell\open\command setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FirefoxHTML-308046B0AF4A39CB\DefaultIcon\ = "C:\\Program Files\\Mozilla Firefox\\firefox.exe,1" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\FIREFOXHTML-308046B0AF4A39CB\SHELL\OPEN\DDEEXEC setup.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1814CEEB-49E2-407F-AF99-FA755A7D2607}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0D68D6D0-D93D-4D08-A30D-F00DD1F45B24}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0D68D6D0-D93D-4D08-A30D-F00DD1F45B24}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1BAA303D-B4B9-45E5-9CCB-E3FCA3E274B6}\InprocHandler32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B32983FF-EF84-4945-8F86-FB7491B4F57B}\NumMethods regsvr32.exe -
Processes:
setup-stub.exeSynaptics.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 setup-stub.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 setup-stub.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 setup-stub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Synaptics.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 setup-stub.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 setup-stub.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4272 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
maintenanceservice_tmp.exepid process 3832 maintenanceservice_tmp.exe 3832 maintenanceservice_tmp.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
setup-stub.exefirefox.exepid process 3256 setup-stub.exe 5112 firefox.exe 5112 firefox.exe 5112 firefox.exe 5112 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
firefox.exepid process 5112 firefox.exe 5112 firefox.exe 5112 firefox.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
EXCEL.EXEfirefox.exepid process 4272 EXCEL.EXE 4272 EXCEL.EXE 4272 EXCEL.EXE 4272 EXCEL.EXE 5112 firefox.exe 4272 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe._cache_70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exesetup-stub.exedownload.exesetup.exemaintenanceservice_installer.exefirefox.exefirefox.exedescription pid process target process PID 4656 wrote to memory of 3964 4656 70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe ._cache_70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe PID 4656 wrote to memory of 3964 4656 70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe ._cache_70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe PID 4656 wrote to memory of 3964 4656 70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe ._cache_70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe PID 4656 wrote to memory of 60 4656 70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe Synaptics.exe PID 4656 wrote to memory of 60 4656 70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe Synaptics.exe PID 4656 wrote to memory of 60 4656 70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe Synaptics.exe PID 3964 wrote to memory of 3256 3964 ._cache_70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe setup-stub.exe PID 3964 wrote to memory of 3256 3964 ._cache_70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe setup-stub.exe PID 3964 wrote to memory of 3256 3964 ._cache_70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe setup-stub.exe PID 3256 wrote to memory of 64 3256 setup-stub.exe download.exe PID 3256 wrote to memory of 64 3256 setup-stub.exe download.exe PID 3256 wrote to memory of 64 3256 setup-stub.exe download.exe PID 64 wrote to memory of 3176 64 download.exe setup.exe PID 64 wrote to memory of 3176 64 download.exe setup.exe PID 64 wrote to memory of 3176 64 download.exe setup.exe PID 3176 wrote to memory of 3680 3176 setup.exe regsvr32.exe PID 3176 wrote to memory of 3680 3176 setup.exe regsvr32.exe PID 3176 wrote to memory of 3596 3176 setup.exe regsvr32.exe PID 3176 wrote to memory of 3596 3176 setup.exe regsvr32.exe PID 3176 wrote to memory of 4280 3176 setup.exe maintenanceservice_installer.exe PID 3176 wrote to memory of 4280 3176 setup.exe maintenanceservice_installer.exe PID 3176 wrote to memory of 4280 3176 setup.exe maintenanceservice_installer.exe PID 4280 wrote to memory of 3832 4280 maintenanceservice_installer.exe maintenanceservice_tmp.exe PID 4280 wrote to memory of 3832 4280 maintenanceservice_installer.exe maintenanceservice_tmp.exe PID 3176 wrote to memory of 4180 3176 setup.exe default-browser-agent.exe PID 3176 wrote to memory of 4180 3176 setup.exe default-browser-agent.exe PID 3256 wrote to memory of 3476 3256 setup-stub.exe firefox.exe PID 3256 wrote to memory of 3476 3256 setup-stub.exe firefox.exe PID 3476 wrote to memory of 5112 3476 firefox.exe firefox.exe PID 3476 wrote to memory of 5112 3476 firefox.exe firefox.exe PID 3476 wrote to memory of 5112 3476 firefox.exe firefox.exe PID 3476 wrote to memory of 5112 3476 firefox.exe firefox.exe PID 3476 wrote to memory of 5112 3476 firefox.exe firefox.exe PID 3476 wrote to memory of 5112 3476 firefox.exe firefox.exe PID 3476 wrote to memory of 5112 3476 firefox.exe firefox.exe PID 3476 wrote to memory of 5112 3476 firefox.exe firefox.exe PID 3476 wrote to memory of 5112 3476 firefox.exe firefox.exe PID 3476 wrote to memory of 5112 3476 firefox.exe firefox.exe PID 5112 wrote to memory of 4408 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 4408 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe PID 5112 wrote to memory of 3108 5112 firefox.exe firefox.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe"C:\Users\Admin\AppData\Local\Temp\70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\._cache_70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe"C:\Users\Admin\AppData\Local\Temp\._cache_70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\7zSC7F80354\setup-stub.exe.\setup-stub.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\nsc7FD5.tmp\download.exe"C:\Users\Admin\AppData\Local\Temp\nsc7FD5.tmp\download.exe" /LaunchedFromStub /INI=C:\Users\Admin\AppData\Local\Temp\nsc7FD5.tmp\config.ini4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\7zS04028FA4\setup.exe.\setup.exe /LaunchedFromStub /INI=C:\Users\Admin\AppData\Local\Temp\nsc7FD5.tmp\config.ini5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\Mozilla Firefox\AccessibleMarshal.dll"6⤵
- Loads dropped DLL
- Modifies registry class
PID:3680
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\Mozilla Firefox\AccessibleHandler.dll"6⤵
- Loads dropped DLL
- Modifies registry class
PID:3596
-
-
C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe"C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice_tmp.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice_tmp.exe" install7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
-
C:\Program Files\Mozilla Firefox\default-browser-agent.exe"C:\Program Files\Mozilla Firefox\default-browser-agent.exe" register-task 308046B0AF4A39CB6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4180
-
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -first-startup4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -first-startup5⤵
- Executes dropped EXE
- Checks computer location settings
- Checks whether UAC is enabled
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5112.0.168101588\1472307289" -parentBuildID 20210504152106 -prefsHandle 1944 -prefMapHandle 1932 -prefsLen 1 -prefMapSize 234032 -appdir "C:\Program Files\Mozilla Firefox\browser" - 5112 "\\.\pipe\gecko-crash-server-pipe.5112" 2036 gpu6⤵
- Executes dropped EXE
PID:4408
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5112.6.1844609085\1552378456" -childID 1 -isForBrowser -prefsHandle 2304 -prefMapHandle 2188 -prefsLen 1154 -prefMapSize 234032 -parentBuildID 20210504152106 -appdir "C:\Program Files\Mozilla Firefox\browser" - 5112 "\\.\pipe\gecko-crash-server-pipe.5112" 2292 tab6⤵
- Executes dropped EXE
PID:3108
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5112.13.1488251575\913107702" -childID 2 -isForBrowser -prefsHandle 2704 -prefMapHandle 2700 -prefsLen 1154 -prefMapSize 234032 -parentBuildID 20210504152106 -appdir "C:\Program Files\Mozilla Firefox\browser" - 5112 "\\.\pipe\gecko-crash-server-pipe.5112" 2716 tab6⤵
- Executes dropped EXE
PID:4416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5112.20.1781153444\22497104" -parentBuildID 20210504152106 -prefsHandle 3524 -prefMapHandle 3356 -prefsLen 1418 -prefMapSize 234032 -appdir "C:\Program Files\Mozilla Firefox\browser" - 5112 "\\.\pipe\gecko-crash-server-pipe.5112" 3536 rdd6⤵
- Executes dropped EXE
PID:2148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5112.24.497099812\2007622767" -childID 3 -isForBrowser -prefsHandle 3780 -prefMapHandle 3776 -prefsLen 1418 -prefMapSize 234032 -parentBuildID 20210504152106 -appdir "C:\Program Files\Mozilla Firefox\browser" - 5112 "\\.\pipe\gecko-crash-server-pipe.5112" 3788 tab6⤵
- Executes dropped EXE
PID:4560
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5112.31.771970653\224204028" -childID 4 -isForBrowser -prefsHandle 4876 -prefMapHandle 3448 -prefsLen 10255 -prefMapSize 234032 -parentBuildID 20210504152106 -appdir "C:\Program Files\Mozilla Firefox\browser" - 5112 "\\.\pipe\gecko-crash-server-pipe.5112" 4832 tab6⤵
- Executes dropped EXE
PID:2660
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5112.38.187608004\102248695" -parentBuildID 20210504152106 -prefsHandle 1568 -prefMapHandle 5172 -prefsLen 13305 -prefMapSize 234032 -appdir "C:\Program Files\Mozilla Firefox\browser" - 5112 "\\.\pipe\gecko-crash-server-pipe.5112" 5140 socket6⤵
- Executes dropped EXE
PID:1332
-
-
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Modifies system certificate store
PID:60
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
46b247fca1cd3f02cbd15ac903c5350b
SHA18492c327773b05b599c9091d266d53e6fba576be
SHA256bc7d7cb82d5fea62954430f7e237b064ff341394701e63226d89f0c0cf95c4bf
SHA512976d72068d438c66f65b043466870ff7349fe0e634b6bed555992cc587edaeb42b2d78996a5d1d74aaf0a7e3ffa972bf8765956dca8eaa7a072be5d869016d0c
-
MD5
46b247fca1cd3f02cbd15ac903c5350b
SHA18492c327773b05b599c9091d266d53e6fba576be
SHA256bc7d7cb82d5fea62954430f7e237b064ff341394701e63226d89f0c0cf95c4bf
SHA512976d72068d438c66f65b043466870ff7349fe0e634b6bed555992cc587edaeb42b2d78996a5d1d74aaf0a7e3ffa972bf8765956dca8eaa7a072be5d869016d0c
-
C:\Users\Admin\AppData\Local\Temp\._cache_70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe
MD59e856bf436c3b746f73895b6635439ff
SHA175f6aa967a6524cf902f057e4e47703c77f1f932
SHA256e5ff5db8090b24c5dfeb68dbaa8de1c2895a2cd68845f41c494a1e4a38d93f98
SHA512e4ca2622cc5554e99207dd2330ff064901b288a34b7be7aaffaa1689cfc0c7e4963ac3322cf587050b37f9e3882d94d3e1d94aaf185c076ee324dd2a57d2b1b5
-
C:\Users\Admin\AppData\Local\Temp\._cache_70818ab8a38bcb65be92612c6e7304d3927315058eb16a31ec4dc44ee4b3f6a6.exe
MD59e856bf436c3b746f73895b6635439ff
SHA175f6aa967a6524cf902f057e4e47703c77f1f932
SHA256e5ff5db8090b24c5dfeb68dbaa8de1c2895a2cd68845f41c494a1e4a38d93f98
SHA512e4ca2622cc5554e99207dd2330ff064901b288a34b7be7aaffaa1689cfc0c7e4963ac3322cf587050b37f9e3882d94d3e1d94aaf185c076ee324dd2a57d2b1b5
-
MD5
8104751de2a8e948284f3ed577fe4872
SHA1f03832fadce708f9fbb21f7ef1a44929f1792e08
SHA2562a27d969cc58cb2b453f15e50c6fba15de088fe99c9c44d9998ec00f7be9676a
SHA51227bdb251cd6886a81c0b754a545937c23c92420d2fa9c311a525c30319c4506a5b77988506aea1085615a163d1b758659164e4e244f3b3079890fa0f649891a3
-
MD5
92b67822cc743950a80bac58bc412e3c
SHA176d941a05ebbc4001d94cd52870b62f2855fb9db
SHA256ddbd33b4308482abc33ffc31b1ea6a431bb5302ca1a8eabf5466c660414b6c39
SHA5127eb783ef8e4a05540f4bebd75ed0d1743648e24bf04f601d466e1aa1994180896060a34f51677c5aa417f4ed639742b8b5c7a4f00f693c8780f173b42d66d20b
-
MD5
761d200ae6516952056f26c2922331bb
SHA10ca6b408d3ca456b7ef8f3e3cb411064d026cada
SHA25623949c4a5948f718877a3429e79df761395dc0969d3d0d45f314bd39eedbd55f
SHA512240f18b80a15049a2de95511f9631dc9b8444dca1b19f2cf6beff430b1812b3aaa65a0bd42ddd0da9229330833a4f4f00c235c90be26eacd06c7ae001d1108f9
-
MD5
49c3ffd47257dbcb67a6be9ee112ba7f
SHA104669214375b25e2dc8a3635484e6eeb206bc4eb
SHA256322d963d2a2aefd784e99697c59d494853d69bed8efd4b445f59292930a6b165
SHA512bda5e6c669b04aaed89538a982ef430cef389237c6c1d670819a22b2a20bf3c22aef5cb4e73ef7837cbbd89d870693899f97cb538122059c885f4b19b7860a98
-
MD5
bfffa7117fd9b1622c66d949bac3f1d7
SHA1402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA2561ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f
-
MD5
588bd2a8e0152e0918742c1a69038f1d
SHA19874398548891f6a08fc06437996f84eb7495783
SHA256a07cc878ab5595aacd4ab229a6794513f897bd7ad14bcec353793379146b2094
SHA51232ffe64c697f94c4db641ab3e20b0f522cf3eba9863164f1f6271d2f32529250292a16be95f32d852480bd1b59b8b0554c1e7fd7c7a336f56c048f4f56e4d62f
-
MD5
d699333637db92d319661286df7cc39e
SHA10bffb9ed366853e7019452644d26e8e8f236241b
SHA256fe760614903e6d46a1be508dccb65cf6929d792a1db2c365fc937f2a8a240504
SHA5126fa9ff0e45f803faf3eb9908e810a492f6f971cb96d58c06f408980ab40cba138b52d853aa0e3c68474053690dfafa1817f4b4c8fb728d613696b6c516fa0f51
-
MD5
47388f3966e732706054fe3d530ed0dc
SHA1a9aebbbb73b7b846b051325d7572f2398f5986ee
SHA25659c14541107f5f2b94bbf8686efee862d20114bcc9828d279de7bf664d721132
SHA512cce1fc5bcf0951b6a76d456249997b427735e874b650e5b50b3d278621bf99e39c4fc7fee081330f20762f797be1b1c048cb057967ec7699c9546657b3e248ee
-
MD5
f62b66f451f2daa8410ad62d453fa0a2
SHA14bf13db65943e708690d6256d7ddd421cc1cc72b
SHA25648eb5b52227b6fb5be70cb34009c8da68356b62f3e707db56af957338ba82720
SHA512d64c2a72adf40bd451341552e7e6958779de3054b0cf676b876c3ba7b86147aecba051ac08adc0c3bfb2779109f87dca706c43de3ce36e05af0ddee02bbbf419
-
MD5
6c88d0006cf852f2d8462dfa4e9ca8d1
SHA149002b58cb0df2ee8d868dec335133cf225657df
SHA256d5960c7356e8ab97d0ad77738e18c80433da277671a6e89a943c7f7257ff3663
SHA512d081843374a43d2e9b33904d4334d49383df04ee7143a8b49600841ece844eff4e8e36b4b5966737ac931ed0350f202270e043f7003bf2748c5418d5e21c2a27
-
MD5
d53637eab49fe1fe1bd45d12f8e69c1f
SHA1c84e41fdcc4ca89a76ae683cb390a9b86500d3ca
SHA25683678f181f46fe77f8afe08bfc48aebb0b4154ad45b2efe9bfadc907313f6087
SHA51294d43da0e2035220e38e4022c429a9c049d6a355a9cb4695ad4e0e01d6583530917f3b785ea6cd2592fdd7b280b9df95946243e395a60dc58ec0c94627832aeb
-
MD5
c712515d052a385991d30b9c6afc767f
SHA19a4818897251cacb7fe1c6fe1be3e854985186ad
SHA256f7c6c7ea22edd2f8bd07aa5b33cbce862ef1dcdc2226eb130e0018e02ff91dc1
SHA512b7d1e22a169c3869aa7c7c749925a031e8bdd94c2531c6ffe9dae3b3cd9a2ee1409ca26824c4e720be859de3d4b2af637dd60308c023b4774d47afe13284dcd2
-
MD5
f0d507de92851a8c0404ac78c383c5cd
SHA178fa03c89ea12ff93fa499c38673039cc2d55d40
SHA256610332203d29ab218359e291401bf091bb1db1a6d7ed98ab9a7a9942384b8e27
SHA512a65c9129ee07864f568c651800f6366bca5313ba400814792b5cc9aa769c057f357b5055988c414e88a6cd87186b6746724a43848f96a389a13e347ef5064551
-
MD5
f9e20dd3b07766307fccf463ab26e3ca
SHA160b4cf246c5f414fc1cd12f506c41a1043d473ee
SHA256af47aebe065af2f045a19f20ec7e54a6e73c0c3e9a5108a63095a7232b75381a
SHA51213c43eee9c93c9f252087cb397ff2d6b087b1dc92a47ba5493297f080e91b7c39ee5665d6bdc1a80e7320e2b085541fc798a3469b1f249b05dee26bbbb6ab706
-
MD5
ab206f2943977256ca3a59e5961e3a4f
SHA19c1df49a8dbdc8496ac6057f886f5c17b2c39e3e
SHA256b3b6ee98aca14cf5bc9f3bc7897bc23934bf85fc4bc25b7506fe4cd9a767047a
SHA512baccc304b091a087b2300c10f6d18be414abb4c1575274c327104aabb5fdf975ba26a86e423fda6befb5d7564effac0c138eb1bad2d2e226131e4963c7aac5bd
-
MD5
4dd7a61590d07500704e7e775255cb00
SHA18b35ec4676bd96c2c4508dc5f98ca471b22deed7
SHA256a25d0654deb0cea1aef189ba2174d0f13bdf52f098d3a9ec36d15e4bfb30c499
SHA5121086801260624cf395bf971c9fd671abddcd441ccc6a6eac55f277ccfbab752c82cb1709c8140de7b4b977397a31da6c9c8b693ae92264eb23960c8b1e0993bd
-
MD5
4e033cfee32edf6be7847e80a5114894
SHA191eef52c557aefd0fde27e8df4e3c3b7f99862f2
SHA256dff24441df89a02dde1cd984e4d3820845bafdff105458ed10d510126117115b
SHA512e1f3d98959d68ef3d7e86ac4cb3dbdf92a34fcfd1bf0e0db45db66c65af0162ab02926dc5d98c6fc4a759a6010026ee26a9021c67c0190da941a04b783055318
-
MD5
50740f0bc326f0637c4166698298d218
SHA10c33cfe40edd278a692c2e73e941184fd24286d9
SHA256adbb658dd1cbecaca7cc1322b51976f30b36ccf0a751f3bad1f29d350b192c9c
SHA512f1331ab1d52fb681f51546168e9736e2f6163e0706955e85ac9e4544d575d50e6eacd90ea3e49cb8b69da34fe0b621b04661f0b6f09f7ce8ceca50308c263d03
-
MD5
595d79870970565be93db076afbe73b5
SHA1ec96f7beeaec14d3b6c437b97b4a18a365534b9b
SHA256fc50a37acc35345c99344042d7212a4ae88aa52a894cda3dcb9f6db46d852558
SHA512152849840a584737858fc5e15f0d7802786e823a13ec5a9fc30ee032c7681deaf11c93a8cffead82dc5f73f0cd6f517f1e83b56d61d0e770cbb20e1cfff22840
-
MD5
8b9b0d1c8b0e9d4b576d42c66980977a
SHA1a19acefa3f95d1b565650fdbc40ef98c793358e9
SHA256371a44ab91614a8c26d159beb872a7b43f569cb5fac8ada99ace98f264a3b503
SHA5124b1c5730a17118b7065fada3b36944fe4e0260f77676b84453ee5042f6f952a51fd99debca835066a6d5a61ba1c5e17247551340dd02d777a44bc1cae84e6b5f
-
MD5
76e0a89c91a28cf7657779d998e679e5
SHA1982b5da1c1f5b9d74af6243885bcba605d54df8c
SHA2560189cbd84dea035763a7e52225e0f1a7dcec402734885413add324bffe688577
SHA512d75d8798ea3c23b3998e8c3f19d0243a0c3a3262cffd8bcee0f0f0b75f0e990c9ce6644150d458e5702a8aa51b202734f7a9161e795f8121f061139ad2ea454f
-
MD5
96da689947c6e215a009b9c1eca5aec2
SHA17f389e6f2d6e5beb2a3baf622a0c0ea24bc4de60
SHA256885309eb86dccd8e234ba05e13fe0bf59ab3db388ebfbf6b4fd6162d8e287e82
SHA5128e86fa66a939ff3274c2147463899df575030a575c8f01573c554b760a53b339127d0d967c8cf1d315428e16e470fa1cc9c2150bb40e9b980d4ebf32e226ee89
-
MD5
6b33b34888ccecca636971fbea5e3de0
SHA1ee815a158baacb357d9e074c0755b6f6c286b625
SHA25600ac02d39b7b16406850e02ca4a6101f45d6f7b4397cc9e069f2ce800b8500b9
SHA512f52a2141f34f93b45b90eb3bbcdb64871741f2bd5fed22eaaf35e90661e8a59eba7878524e30646206fc73920a188c070a38da9245e888c52d25e36980b35165
-
MD5
54f27114eb0fda1588362bb6b5567979
SHA1eaa07829d012206ac55fb1af5cc6a35f341d22be
SHA256984306a3547be2f48483d68d0466b21dda9db4be304bedc9ffdb953c26cac5a1
SHA51218d2bdce558655f2088918241efdf9297dfe4a14a5d8d9c5be539334ae26a933b35543c9071cedada5a1bb7c2b20238e9d012e64eb5bbf24d0f6b0b726c0329d
-
MD5
19c0be2170d97cca5fbf489c0cf1801f
SHA17c0858fa5872fbc93364fd63623ce5cf0adf1c22
SHA2561c0f85bfafb950ace7656f91d342a37eeb13e7cc8b1fa0f979414d6056d4542a
SHA5121f299a568b2dbb959b48973cf3dddaca1d66ffc9ce20f76ebe22770270ee20f96ac04eafca478fdedcc21e5908dc9055d5da59c886f056889d6eb66cc16df59f
-
MD5
867a1f77e280ecf1210e29cc9b5b9403
SHA1ada502c35e81219b8cdba189ed71a6dcb5eb22ab
SHA256f39cad3e35d1942faa6b3020b5217d85f44265b4f150a587dc7f87e187fbd7ab
SHA51258df96ff14c842b85ff30cfd691568aac095586194ae11439f22f9e4dc4583d7c13ea619aed2a7ec4eeaa471dbc05b01ae6a056c41397a50c69da1f3b28a0929
-
MD5
ed21be8f436feb7fd6d526c79f829246
SHA123a4e401028d855c2504ac485043d48e53ed179e
SHA2564d817653d910a0264f56eb2bbb0d82f962657c7c7702b580eb740487e5467b1b
SHA5129d68055efc732417c74d188325608c744259199a145393136173d32e9856d571c1dad21a8e35f421b2038baec8d84a73de189e96f2fda16a5aff101ee1b5d1d3
-
MD5
222d020bd33c90170a8296adc1b7036a
SHA1612e6f443d927330b9b8ac13cc4a2a6b959cee48
SHA2564432bbd1a390874f3f0a503d45cc48d346abc3a8c0213c289f4b615bf0ee84f3
SHA512ad8c7ce7f6f353da5e2cf816e1a69f1ec14011612e8041e4f9bb6ebed3e0fa4e4ebc069155a0c66e23811467012c201893b9b3b7a947d089ce2c749d5e8910c6
-
MD5
5e4d7429c9d7eda5a937149f4376a61c
SHA1c3178c30f2dec590011e381b60bb0d4ff68e61f0
SHA25665d1b36442686c0f421188ebd6e54362add23db08b763793b3888753611a3a23
SHA51294c2de9484cba7361149f58e31a03c1bae6d4e6af82666ba29e20f70483aae465e113c75af1f59c1f29f95de22f0de8a5a366646c47b98751d1657f0285140b4
-
MD5
88d7d32ad20bf89bb7785bd07c638e17
SHA12bd40f0b69c2edc64ab6b7e6dd2e7ca6a6fea6f6
SHA2565cf0660a8f2624433c8c1022f93ff3c94c5611ccbc93118ee053566590eb53f4
SHA5127bb3328ce42e7bb546a2192ade1e8e153408912f3582c27dc0c5cbe1c2d807365aaf4206c3ceab6cb3d6c34d3155125cb7509dbf800ecf70ab35f8a64f764010
-
MD5
f0eba8ef37d6ce5b1ee45e4928964ea6
SHA1afafac598892104d5ec353bf6b5f8f252dc9ab0e
SHA256ab5d566c67e1be571475b54813e2e4dac674f7513695053bedd278dc41666f7f
SHA512bcd1385feca8c1f97faaa879e0e2bd703b589cbb77532c8acd5464189fe08ac080a41964d0dadd86f40742f4251abbea655b9c0832b37e0b4045475ab32a19f5
-
MD5
35da5601932b6ade92ec29951942ec1f
SHA14d0b52b709c3e25b50dd53dfab9337ef8958d1ca
SHA2563da3fa240910cc0aed83b17a81c87251a6bc6cf5db5be9e71a3e01d7b7d88f86
SHA5120bd4ae8932d6f2d7bb1655b13f66fc24a858a17993be9354921406e63372242661a3bb52010445173fb856d4e5f98fcfbd44a155fe0760feca8cc65bebd777c0
-
MD5
0aa43576f0420593451b10ab3b7582ec
SHA1b5f535932053591c7678faa1cd7cc3a7de680d0d
SHA2563b25ae142729ed15f3a10ebce2621bfa07fda5e4d76850763987a064122f7ae6
SHA5126efb63c66f60e039cf99bfaf2e107c3c5ed4b6f319f3d5e4ef9316c1f26298b90d33c60b48b03699059d28b835fbc589417ac955fc45a2bc4c116a5200dfdc32
-
MD5
f7a3347ac587e97c57cfac49a17bd309
SHA13a973aef21bddd57a32468471efb577e15cdeb53
SHA2566406a0632375edc8c2efa84e32ee6771affc4e34a45cb6cd7e88e0ca899c74ad
SHA5128a47684877930367fa168d13196bc784a988691e576f097c2d0500fe8bf77e274a816e763e3a84d6752933aeaff5952bb0c1d49b406160860c22e5d8e86deb92
-
MD5
d3bd26a9af4636ba7433abd384dfaa22
SHA1ca63a8452849fad0c139ee1cb7527739ad4d4928
SHA256fef779ae85bc254e34b2d9fc18f043db85288119811e98a190fd0e410a774b98
SHA512ef9bdc5ba2071cfd8c2a257d752f2540e321423ad71b4ed041ea5643849dfc2f923321ab23d8c1894f5ccad6499a63f1e91b9b81a86fee94646662bc1135c331
-
MD5
a1e884ebfd94a473367833705264f6cc
SHA14e1f8161ba4b96838e218ae05691b0dde87337d6
SHA2567c559c7d2141251eb454ae8021e07ad4dfc9befc4c95782d0dea255325b82f64
SHA51283a7691222997c8a14789b14faace319b17e7b8b454061787fb5b08c3ce1bc9db87def882ec70edc0dd016ca12fedc1a55c040acda84c4fd53c914c6b15a525c
-
MD5
0d41f393c46099ee35323a0dd6ef8e6b
SHA13fbb389015b05df5bd8d04a2e0ff282daedd9589
SHA2562a3f58fd1dc6ede0574e596e15b07c63095f36fd8881b458086d092316d25ec5
SHA512acee9fc2e8bffe43ebe9341c9ba0e1f28cf147cd76256ed4f665ee19d8978fb3b85b10d485403ca22db4805ea4cb44ff49ea6ebab22116a0637bbb17915dbae9
-
MD5
0d41f393c46099ee35323a0dd6ef8e6b
SHA13fbb389015b05df5bd8d04a2e0ff282daedd9589
SHA2562a3f58fd1dc6ede0574e596e15b07c63095f36fd8881b458086d092316d25ec5
SHA512acee9fc2e8bffe43ebe9341c9ba0e1f28cf147cd76256ed4f665ee19d8978fb3b85b10d485403ca22db4805ea4cb44ff49ea6ebab22116a0637bbb17915dbae9
-
MD5
a76b09c51e1e8406cebf9dc4756bf922
SHA1991e2670f5601240c37c13b29bd85b67a6c76398
SHA256889237e20913935ddd66733c299d4aacd1fdeb0dd039b043a59570ae05a4f9fe
SHA512637a852b0830bbb691e492d8d82e96353fe1f68378942c835d457573bde71ea5665c1216e73854a4e808e8929c49ff3b7357cc127b452998196fc62c2b37e544
-
MD5
a76b09c51e1e8406cebf9dc4756bf922
SHA1991e2670f5601240c37c13b29bd85b67a6c76398
SHA256889237e20913935ddd66733c299d4aacd1fdeb0dd039b043a59570ae05a4f9fe
SHA512637a852b0830bbb691e492d8d82e96353fe1f68378942c835d457573bde71ea5665c1216e73854a4e808e8929c49ff3b7357cc127b452998196fc62c2b37e544
-
MD5
ed23468cb20f1f37a967eb26f639faef
SHA15707e3d394b6a3e36e8b1e23317ec115bafa1e9c
SHA256812217f840657b7d310c406d7224eb1c339079ad48541d922e3f15f1b2e3d913
SHA5129a7d3073b2d7d234eee56464df7b58be4466171c3cad47ebf0d4742c0ed05555ac890a18991ef59bf8b0751a207ea04f86a728fe3b0cb19607b9f6e4f45e76f9
-
MD5
85eed9018a292c6e2ba8b31bda776b5e
SHA179accbcf85bcaa2717a986b2ece60bed953bbc55
SHA256f15a3bbb3b407240eea470c5d83828c8e8dcce98db0af0b5a03ce26506e18275
SHA51288baabb623cecf72b7c68172e8f93666185396f10a60d68efcedcc6c81e8e55b0a17480611a205453013eac3d5cdc8f70b2bf3e7365d0d2ba5606d12e570fe7d
-
MD5
85eed9018a292c6e2ba8b31bda776b5e
SHA179accbcf85bcaa2717a986b2ece60bed953bbc55
SHA256f15a3bbb3b407240eea470c5d83828c8e8dcce98db0af0b5a03ce26506e18275
SHA51288baabb623cecf72b7c68172e8f93666185396f10a60d68efcedcc6c81e8e55b0a17480611a205453013eac3d5cdc8f70b2bf3e7365d0d2ba5606d12e570fe7d
-
MD5
e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
MD5
2979f933cbbac19cfe35b1fa02cc95a4
SHA14f208c9c12199491d7ba3c1ee640fca615e11e92
SHA256bcb6572fcb846d5b4459459a2ef9bde97628782b983eb23fadacbaec76528e6f
SHA51261f07c54e0aaa59e23e244f3a7fd5e6a6c6a00730d55add8af338e33431ed166d156a66455a4f9321cafbce297e770abc1cb65f7410923cb2b5e5067d1768096
-
MD5
737379945745bb94f8a0dadcc18cad8d
SHA16a1f497b4dc007f5935b66ec83b00e5a394332c6
SHA256d3d7b3d7a7941d66c7f75257be90b12ac76f787af42cd58f019ce0280972598a
SHA512c4a43b3ca42483cbd117758791d4333ddf38fa45eb3377f7b71ce74ec6e4d8b5ef2bfbe48c249d4eaf57ab929f4301138e53c79e0fa4be94dcbcd69c8046bc22
-
MD5
737379945745bb94f8a0dadcc18cad8d
SHA16a1f497b4dc007f5935b66ec83b00e5a394332c6
SHA256d3d7b3d7a7941d66c7f75257be90b12ac76f787af42cd58f019ce0280972598a
SHA512c4a43b3ca42483cbd117758791d4333ddf38fa45eb3377f7b71ce74ec6e4d8b5ef2bfbe48c249d4eaf57ab929f4301138e53c79e0fa4be94dcbcd69c8046bc22
-
MD5
d4f7b4f9c296308e03a55cb0896a92fc
SHA163065bed300926a5b39eabf6efdf9296ed46e0cc
SHA2566b553f94ac133d8e70fac0fcaa01217fae24f85d134d3964c1beea278191cf83
SHA512d4acc719ae29c53845ccf4778e1d7ed67f30358af30545fc744facdb9f4e3b05d8cb7dc5e72c93895259e9882471c056395ab2e6f238310841b767d6acbcd6c1
-
MD5
17ed1c86bd67e78ade4712be48a7d2bd
SHA11cc9fe86d6d6030b4dae45ecddce5907991c01a0
SHA256bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb
SHA5120cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5
-
MD5
113c5f02686d865bc9e8332350274fd1
SHA14fa4414666f8091e327adb4d81a98a0d6e2e254a
SHA2560d21041a1b5cd9f9968fc1d457c78a802c9c5a23f375327e833501b65bcd095d
SHA512e190d1ee50c0b2446b14f0d9994a0ce58f5dbd2aa5d579f11b3a342da1d4abf0f833a0415d3817636b237930f314be54e4c85b4db4a9b4a3e532980ea9c91284
-
MD5
113c5f02686d865bc9e8332350274fd1
SHA14fa4414666f8091e327adb4d81a98a0d6e2e254a
SHA2560d21041a1b5cd9f9968fc1d457c78a802c9c5a23f375327e833501b65bcd095d
SHA512e190d1ee50c0b2446b14f0d9994a0ce58f5dbd2aa5d579f11b3a342da1d4abf0f833a0415d3817636b237930f314be54e4c85b4db4a9b4a3e532980ea9c91284
-
MD5
1b446b36f5b4022d50ffdc0cf567b24a
SHA1d9a0a99fe5ea3932cbd2774af285ddf35fcdd4f9
SHA2562862c7bc7f11715cebdea003564a0d70bf42b73451e2b672110e1392ec392922
SHA51204ab80568f6da5eef2bae47056391a5de4ba6aff15cf4a2d0a9cc807816bf565161731921c65fe5ff748d2b86d1661f6aa4311c65992350bd63a9f092019f1b8
-
MD5
1b446b36f5b4022d50ffdc0cf567b24a
SHA1d9a0a99fe5ea3932cbd2774af285ddf35fcdd4f9
SHA2562862c7bc7f11715cebdea003564a0d70bf42b73451e2b672110e1392ec392922
SHA51204ab80568f6da5eef2bae47056391a5de4ba6aff15cf4a2d0a9cc807816bf565161731921c65fe5ff748d2b86d1661f6aa4311c65992350bd63a9f092019f1b8
-
MD5
1b446b36f5b4022d50ffdc0cf567b24a
SHA1d9a0a99fe5ea3932cbd2774af285ddf35fcdd4f9
SHA2562862c7bc7f11715cebdea003564a0d70bf42b73451e2b672110e1392ec392922
SHA51204ab80568f6da5eef2bae47056391a5de4ba6aff15cf4a2d0a9cc807816bf565161731921c65fe5ff748d2b86d1661f6aa4311c65992350bd63a9f092019f1b8
-
MD5
1b446b36f5b4022d50ffdc0cf567b24a
SHA1d9a0a99fe5ea3932cbd2774af285ddf35fcdd4f9
SHA2562862c7bc7f11715cebdea003564a0d70bf42b73451e2b672110e1392ec392922
SHA51204ab80568f6da5eef2bae47056391a5de4ba6aff15cf4a2d0a9cc807816bf565161731921c65fe5ff748d2b86d1661f6aa4311c65992350bd63a9f092019f1b8
-
MD5
42b064366f780c1f298fa3cb3aeae260
SHA15b0349db73c43f35227b252b9aa6555f5ede9015
SHA256c13104552b8b553159f50f6e2ca45114493397a6fa4bf2cbb960c4a2bbd349ab
SHA51250d8f4f7a3ff45d5854741e7c4153fa13ee1093bafbe9c2adc60712ed2fb505c9688dd420d75aaea1b696da46b6beccc232e41388bc2a16b1f9eea1832df1cd7
-
MD5
42b064366f780c1f298fa3cb3aeae260
SHA15b0349db73c43f35227b252b9aa6555f5ede9015
SHA256c13104552b8b553159f50f6e2ca45114493397a6fa4bf2cbb960c4a2bbd349ab
SHA51250d8f4f7a3ff45d5854741e7c4153fa13ee1093bafbe9c2adc60712ed2fb505c9688dd420d75aaea1b696da46b6beccc232e41388bc2a16b1f9eea1832df1cd7
-
MD5
17ed1c86bd67e78ade4712be48a7d2bd
SHA11cc9fe86d6d6030b4dae45ecddce5907991c01a0
SHA256bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb
SHA5120cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5
-
MD5
113c5f02686d865bc9e8332350274fd1
SHA14fa4414666f8091e327adb4d81a98a0d6e2e254a
SHA2560d21041a1b5cd9f9968fc1d457c78a802c9c5a23f375327e833501b65bcd095d
SHA512e190d1ee50c0b2446b14f0d9994a0ce58f5dbd2aa5d579f11b3a342da1d4abf0f833a0415d3817636b237930f314be54e4c85b4db4a9b4a3e532980ea9c91284
-
MD5
113c5f02686d865bc9e8332350274fd1
SHA14fa4414666f8091e327adb4d81a98a0d6e2e254a
SHA2560d21041a1b5cd9f9968fc1d457c78a802c9c5a23f375327e833501b65bcd095d
SHA512e190d1ee50c0b2446b14f0d9994a0ce58f5dbd2aa5d579f11b3a342da1d4abf0f833a0415d3817636b237930f314be54e4c85b4db4a9b4a3e532980ea9c91284