Resubmissions
10/01/2023, 12:55
230110-p5rkdaga85 810/01/2023, 12:17
230110-pf9pnafh93 810/01/2023, 12:04
230110-n8mj6afh74 8Analysis
-
max time kernel
609s -
max time network
606s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2023, 12:04
Static task
static1
Behavioral task
behavioral1
Sample
DubaiFreeZonesModel2022-Setup.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DubaiFreeZonesModel2022-Setup.exe
Resource
win10v2004-20220812-en
General
-
Target
DubaiFreeZonesModel2022-Setup.exe
-
Size
193.3MB
-
MD5
ab275cb0f40ae8b8f55cb5257b8355ad
-
SHA1
9dff353fd38730312227b76653db7e76dd828b94
-
SHA256
adb47eb4a5e367ecd52a626e2c173dece49766d5b48ac1e5cb60956dad1ceeca
-
SHA512
028e60212fcca1ed321bead12a97d1a9700da67a5ad3184f85e44936138157edae634c445ea727aeb639a12dcf71c0d43dcd4e3f0e5ba9b116811d78e60982ac
-
SSDEEP
3145728:K8xWobFz4jeIY88J03rnVxwu9nYDicBogIYOTiWgfGl9KNwOuDCoSpxvQ:K8xdGjeIY88J0bnVLnUtnFfqK4CfK
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 3396 DubaiFreeZonesModel2022-Setup.tmp 3000 Dubai Free Zones Model 2022.exe 4924 Dubai Free Zones Model 2022.exe 3660 Dubai Free Zones Model 2022.exe 3160 Dubai Free Zones Model 2022.exe 2508 calculateImpacts.exe 4136 calculateImpacts.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Dubai Free Zones Model 2022.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 64 IoCs
pid Process 3000 Dubai Free Zones Model 2022.exe 4924 Dubai Free Zones Model 2022.exe 3660 Dubai Free Zones Model 2022.exe 4924 Dubai Free Zones Model 2022.exe 4924 Dubai Free Zones Model 2022.exe 4924 Dubai Free Zones Model 2022.exe 3160 Dubai Free Zones Model 2022.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe 4136 calculateImpacts.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Detects Pyinstaller 3 IoCs
resource yara_rule behavioral2/files/0x0006000000023af8-203.dat pyinstaller behavioral2/files/0x0006000000023af8-204.dat pyinstaller behavioral2/files/0x0006000000023af8-207.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1872 1324 WerFault.exe 58 -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 36 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e8005398e082303024b98265d99428e115f0000 Dubai Free Zones Model 2022.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Dubai Free Zones Model 2022.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" Dubai Free Zones Model 2022.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" Dubai Free Zones Model 2022.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" Dubai Free Zones Model 2022.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Dubai Free Zones Model 2022.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Dubai Free Zones Model 2022.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" Dubai Free Zones Model 2022.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Dubai Free Zones Model 2022.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" Dubai Free Zones Model 2022.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" Dubai Free Zones Model 2022.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" Dubai Free Zones Model 2022.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Dubai Free Zones Model 2022.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" Dubai Free Zones Model 2022.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Dubai Free Zones Model 2022.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Dubai Free Zones Model 2022.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} Dubai Free Zones Model 2022.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" Dubai Free Zones Model 2022.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Dubai Free Zones Model 2022.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings Dubai Free Zones Model 2022.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Dubai Free Zones Model 2022.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Dubai Free Zones Model 2022.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Dubai Free Zones Model 2022.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Dubai Free Zones Model 2022.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" Dubai Free Zones Model 2022.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Dubai Free Zones Model 2022.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Dubai Free Zones Model 2022.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Dubai Free Zones Model 2022.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg Dubai Free Zones Model 2022.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff Dubai Free Zones Model 2022.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Dubai Free Zones Model 2022.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Dubai Free Zones Model 2022.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Downloads" Dubai Free Zones Model 2022.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Dubai Free Zones Model 2022.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Social Database.csv:Zone.Identifier Dubai Free Zones Model 2022.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2272 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3396 DubaiFreeZonesModel2022-Setup.tmp 3396 DubaiFreeZonesModel2022-Setup.tmp 3660 Dubai Free Zones Model 2022.exe 3660 Dubai Free Zones Model 2022.exe 3160 Dubai Free Zones Model 2022.exe 3160 Dubai Free Zones Model 2022.exe 4516 EXCEL.EXE 4516 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3000 Dubai Free Zones Model 2022.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3396 DubaiFreeZonesModel2022-Setup.tmp -
Suspicious use of SetWindowsHookEx 32 IoCs
pid Process 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 4516 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 3000 Dubai Free Zones Model 2022.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1220 wrote to memory of 3396 1220 DubaiFreeZonesModel2022-Setup.exe 83 PID 1220 wrote to memory of 3396 1220 DubaiFreeZonesModel2022-Setup.exe 83 PID 1220 wrote to memory of 3396 1220 DubaiFreeZonesModel2022-Setup.exe 83 PID 3396 wrote to memory of 3000 3396 DubaiFreeZonesModel2022-Setup.tmp 94 PID 3396 wrote to memory of 3000 3396 DubaiFreeZonesModel2022-Setup.tmp 94 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 4924 3000 Dubai Free Zones Model 2022.exe 97 PID 3000 wrote to memory of 3660 3000 Dubai Free Zones Model 2022.exe 98 PID 3000 wrote to memory of 3660 3000 Dubai Free Zones Model 2022.exe 98 PID 3000 wrote to memory of 3160 3000 Dubai Free Zones Model 2022.exe 101 PID 3000 wrote to memory of 3160 3000 Dubai Free Zones Model 2022.exe 101 PID 3660 wrote to memory of 3500 3660 Dubai Free Zones Model 2022.exe 100 PID 3660 wrote to memory of 3500 3660 Dubai Free Zones Model 2022.exe 100 PID 3500 wrote to memory of 2272 3500 cmd.exe 104 PID 3500 wrote to memory of 2272 3500 cmd.exe 104 PID 3500 wrote to memory of 2272 3500 cmd.exe 104 PID 3660 wrote to memory of 2508 3660 Dubai Free Zones Model 2022.exe 107 PID 3660 wrote to memory of 2508 3660 Dubai Free Zones Model 2022.exe 107 PID 2272 wrote to memory of 2668 2272 EXCEL.EXE 110 PID 2272 wrote to memory of 2668 2272 EXCEL.EXE 110 PID 2508 wrote to memory of 4136 2508 calculateImpacts.exe 112 PID 2508 wrote to memory of 4136 2508 calculateImpacts.exe 112 PID 4136 wrote to memory of 5040 4136 calculateImpacts.exe 113 PID 4136 wrote to memory of 5040 4136 calculateImpacts.exe 113 PID 3660 wrote to memory of 2788 3660 Dubai Free Zones Model 2022.exe 116 PID 3660 wrote to memory of 2788 3660 Dubai Free Zones Model 2022.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\DubaiFreeZonesModel2022-Setup.exe"C:\Users\Admin\AppData\Local\Temp\DubaiFreeZonesModel2022-Setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\is-EAMHB.tmp\DubaiFreeZonesModel2022-Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-EAMHB.tmp\DubaiFreeZonesModel2022-Setup.tmp" /SL5="$90046,201606679,1346048,C:\Users\Admin\AppData\Local\Temp\DubaiFreeZonesModel2022-Setup.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\Dubai Free Zones Model 2022.exe"C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\Dubai Free Zones Model 2022.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- NTFS ADS
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\Dubai Free Zones Model 2022.exe"C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\Dubai Free Zones Model 2022.exe" --type=gpu-process --field-trial-handle=1732,4710925675297957979,4748975675554919014,131072 --disable-features=LayoutNG,SpareRendererForSitePerProcess --gpu-preferences=IAAAAAAAAADgAAAgAAAAAAAAYAAAAAAACAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAABQAAABAAAAAAAAAAAAAAAAYAAAAQAAAAAAAAAAEAAAAFAAAAEAAAAAAAAAABAAAABgAAAA== --service-request-channel-token=9178365978435000093 --mojo-platform-channel-handle=1748 --ignored=" --type=renderer " /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4924
-
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\Dubai Free Zones Model 2022.exe"C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\Dubai Free Zones Model 2022.exe" --type=renderer --field-trial-handle=1732,4710925675297957979,4748975675554919014,131072 --disable-features=LayoutNG,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app" --node-integration --no-sandbox --no-zygote --preload="C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app\javascript\preload.js" --background-color=#fff --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=1666212123155724384 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2208 /prefetch:14⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Roaming/Dubai Free Zones Model 2022/backend/input/User Inputs - Dubai Free Zones Model - 2022.xlsb""5⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\input\User Inputs - Dubai Free Zones Model - 2022.xlsb"6⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122887⤵PID:2668
-
-
-
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\calculateImpacts.exe"C:\Users\Admin\AppData\Roaming/Dubai Free Zones Model 2022/backend/calculateImpacts.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\calculateImpacts.exe"C:\Users\Admin\AppData\Roaming/Dubai Free Zones Model 2022/backend/calculateImpacts.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"7⤵PID:5040
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Roaming/Dubai Free Zones Model 2022/backend/output/Dashboard - Dubai Free Zones Model - 2022.xlsb""5⤵
- Checks computer location settings
- Modifies registry class
PID:2788 -
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\output\Dashboard - Dubai Free Zones Model - 2022.xlsb"6⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4516
-
-
-
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\Dubai Free Zones Model 2022.exe"C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\Dubai Free Zones Model 2022.exe" --type=gpu-process --field-trial-handle=1732,4710925675297957979,4748975675554919014,131072 --disable-features=LayoutNG,SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=IAAAAAAAAADgAAAgAAAAAAAAYAAAAAAACAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAABQAAABAAAAAAAAAAAAAAAAYAAAAQAAAAAAAAAAEAAAAFAAAAEAAAAAAAAAABAAAABgAAAA== --service-request-channel-token=11477077527471261484 --mojo-platform-channel-handle=2692 /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 460 -p 1324 -ip 13241⤵PID:4308
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1324 -s 24601⤵
- Program crash
PID:1872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1220
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
120KB
MD52abeebe2166921a4d8b67b8f8a2b878a
SHA121f0fff00cba76a0ea471c3e05179e4b4cc1ebd0
SHA2567adcea3a5568752a6050610cfbe791a4f8186aaaa002f916b88560a1ddab580f
SHA51254c802d532c9ef9f3668d5e9bf23b69a58f87ec545af7fd4eab1055bfb8ee66481f361458076a364a17ddddd6550a70f5442c2bbe6562553472c0839346b1a35
-
Filesize
120KB
MD52abeebe2166921a4d8b67b8f8a2b878a
SHA121f0fff00cba76a0ea471c3e05179e4b4cc1ebd0
SHA2567adcea3a5568752a6050610cfbe791a4f8186aaaa002f916b88560a1ddab580f
SHA51254c802d532c9ef9f3668d5e9bf23b69a58f87ec545af7fd4eab1055bfb8ee66481f361458076a364a17ddddd6550a70f5442c2bbe6562553472c0839346b1a35
-
Filesize
1.0MB
MD5e88aba193897117f726fd3d530623689
SHA1aed257b942a3c86eaee92131d120a5111a818f13
SHA256b8886a1266ce4368a6e5357e967f98f7ec2be159009f1772e5115476c189a923
SHA512ce7c93ca2d4950496e9885059764b729f0f1b80ef3716cf495f0e85a2dee576f1ff08f7935a1ad9fdccaf19711f2168c736b2fb6f98cf6e90dbd4d76be475fdb
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
63KB
MD5e0ca371cb1e69e13909bfbd2a7afc60e
SHA1955c31d85770ae78e929161d6b73a54065187f9e
SHA256abb50921ef463263acd7e9be19862089045074ea332421d82e765c5f2163e78a
SHA512dd5a980ba72e4e7be81b927d140e408ad06c7be51b4f509737faee5514e85a42d47518213da1c3e77c25f9bd2eb2109fca173d73d710ff57e6a88a2ff971d0b4
-
Filesize
63KB
MD5e0ca371cb1e69e13909bfbd2a7afc60e
SHA1955c31d85770ae78e929161d6b73a54065187f9e
SHA256abb50921ef463263acd7e9be19862089045074ea332421d82e765c5f2163e78a
SHA512dd5a980ba72e4e7be81b927d140e408ad06c7be51b4f509737faee5514e85a42d47518213da1c3e77c25f9bd2eb2109fca173d73d710ff57e6a88a2ff971d0b4
-
Filesize
63KB
MD5e0ca371cb1e69e13909bfbd2a7afc60e
SHA1955c31d85770ae78e929161d6b73a54065187f9e
SHA256abb50921ef463263acd7e9be19862089045074ea332421d82e765c5f2163e78a
SHA512dd5a980ba72e4e7be81b927d140e408ad06c7be51b4f509737faee5514e85a42d47518213da1c3e77c25f9bd2eb2109fca173d73d710ff57e6a88a2ff971d0b4
-
Filesize
4.3MB
MD554f8267c6c116d7240f8e8cd3b241cd9
SHA1907b965b6ce502dad59cde70e486eb28c5517b42
SHA256c30589187be320bc8e65177aeb8dc1d39957f7b7dcda4c13524dd7f436fb0948
SHA512f6c865c8276fe1a1a0f3267b89fb6745a3fc82972032280dce8869006feb2b168516e017241a0c82bdae0f321fab388523691769f09a502fc3bd530c1c4cacf1
-
Filesize
4.3MB
MD554f8267c6c116d7240f8e8cd3b241cd9
SHA1907b965b6ce502dad59cde70e486eb28c5517b42
SHA256c30589187be320bc8e65177aeb8dc1d39957f7b7dcda4c13524dd7f436fb0948
SHA512f6c865c8276fe1a1a0f3267b89fb6745a3fc82972032280dce8869006feb2b168516e017241a0c82bdae0f321fab388523691769f09a502fc3bd530c1c4cacf1
-
Filesize
3.5MB
MD5e2c6382d5914eaa5303d1c2d0465e5c8
SHA11008c1d36cc326750dd679485073e83c18854e1f
SHA256f83bc8a268717743dff4015e48b4bd79740a2dbbd42ef1800bc4ef95d3e54daa
SHA5128ee862f412df05bdceb6063c51b6d444877a58feb7550c3b6049bd68a7933929b9a4b9957536a9485ee42b77f85a303d2b08fd9d44b8fad868f78f9b6519e978
-
Filesize
3.5MB
MD5e2c6382d5914eaa5303d1c2d0465e5c8
SHA11008c1d36cc326750dd679485073e83c18854e1f
SHA256f83bc8a268717743dff4015e48b4bd79740a2dbbd42ef1800bc4ef95d3e54daa
SHA5128ee862f412df05bdceb6063c51b6d444877a58feb7550c3b6049bd68a7933929b9a4b9957536a9485ee42b77f85a303d2b08fd9d44b8fad868f78f9b6519e978
-
Filesize
4.3MB
MD557d829f7d174d1a8067612c09cf6566b
SHA179ed06500dcee028885b00301f7a9a9155c69b62
SHA256dca0cd7272a56801dd74d0b253df33a8829bee61f5fa0c6d8e2ed5b62f440dff
SHA51216936ce02b7445b56d67adf43d896d2dd9bf1f713d5a765fe97c73c72f22ef8915372dd7b04cfdcfad72447924b6e03d8ae0e0565927a2f862433b2860bcfd64
-
Filesize
95.8MB
MD59b2a6cee94ab8f92038e29faac8b0357
SHA1be95b9c3741c06501b67917d31bbaeb9aebc9a7f
SHA256ae47f537bbbabf3eda3fa998f5227b79d6af6f5e63b6d22e502ac75961a662f7
SHA5120d9c16417fcc4a9d8c58ea307eb9bcbbb48c35a46526dda2bc7071591b1baecaeb78a58e9f4cac71dc8526abe1618cf97b17ae97dc9f68c51cb24f393b712577
-
Filesize
95.8MB
MD59b2a6cee94ab8f92038e29faac8b0357
SHA1be95b9c3741c06501b67917d31bbaeb9aebc9a7f
SHA256ae47f537bbbabf3eda3fa998f5227b79d6af6f5e63b6d22e502ac75961a662f7
SHA5120d9c16417fcc4a9d8c58ea307eb9bcbbb48c35a46526dda2bc7071591b1baecaeb78a58e9f4cac71dc8526abe1618cf97b17ae97dc9f68c51cb24f393b712577
-
Filesize
95.8MB
MD59b2a6cee94ab8f92038e29faac8b0357
SHA1be95b9c3741c06501b67917d31bbaeb9aebc9a7f
SHA256ae47f537bbbabf3eda3fa998f5227b79d6af6f5e63b6d22e502ac75961a662f7
SHA5120d9c16417fcc4a9d8c58ea307eb9bcbbb48c35a46526dda2bc7071591b1baecaeb78a58e9f4cac71dc8526abe1618cf97b17ae97dc9f68c51cb24f393b712577
-
Filesize
95.8MB
MD59b2a6cee94ab8f92038e29faac8b0357
SHA1be95b9c3741c06501b67917d31bbaeb9aebc9a7f
SHA256ae47f537bbbabf3eda3fa998f5227b79d6af6f5e63b6d22e502ac75961a662f7
SHA5120d9c16417fcc4a9d8c58ea307eb9bcbbb48c35a46526dda2bc7071591b1baecaeb78a58e9f4cac71dc8526abe1618cf97b17ae97dc9f68c51cb24f393b712577
-
Filesize
95.8MB
MD59b2a6cee94ab8f92038e29faac8b0357
SHA1be95b9c3741c06501b67917d31bbaeb9aebc9a7f
SHA256ae47f537bbbabf3eda3fa998f5227b79d6af6f5e63b6d22e502ac75961a662f7
SHA5120d9c16417fcc4a9d8c58ea307eb9bcbbb48c35a46526dda2bc7071591b1baecaeb78a58e9f4cac71dc8526abe1618cf97b17ae97dc9f68c51cb24f393b712577
-
Filesize
84.5MB
MD57de78be6e3b7f2037e9e886306a38988
SHA1573f95c6d02a98b169d49bf365f263ab9260c9de
SHA2566c05d4f8ffeed5391e57d73b61e8de554149e849990723e193ab1c5828cbf37e
SHA5127115e74803f21e90cbcf374b0809d2ec758c604f40261f905b7f5a4cf7499491efd2dee9f98256274c2044066f7c28a080faf67a308b0fad6753b647613e20f8
-
Filesize
84.5MB
MD57de78be6e3b7f2037e9e886306a38988
SHA1573f95c6d02a98b169d49bf365f263ab9260c9de
SHA2566c05d4f8ffeed5391e57d73b61e8de554149e849990723e193ab1c5828cbf37e
SHA5127115e74803f21e90cbcf374b0809d2ec758c604f40261f905b7f5a4cf7499491efd2dee9f98256274c2044066f7c28a080faf67a308b0fad6753b647613e20f8
-
Filesize
84.5MB
MD57de78be6e3b7f2037e9e886306a38988
SHA1573f95c6d02a98b169d49bf365f263ab9260c9de
SHA2566c05d4f8ffeed5391e57d73b61e8de554149e849990723e193ab1c5828cbf37e
SHA5127115e74803f21e90cbcf374b0809d2ec758c604f40261f905b7f5a4cf7499491efd2dee9f98256274c2044066f7c28a080faf67a308b0fad6753b647613e20f8
-
Filesize
142KB
MD58d56d44c318d122f7931d03ba435f00b
SHA1387f530e06f79a2a9f7fbf4446c71c31db08e7e0
SHA256fcb4faaa82d13d90c42dfa0669f67391b3124d30310d0f4c510f31412974cab2
SHA51203bd2f56f73ad06fe22ebd94fb0de4e37d1771f8a9d82a47ea93002ba4696d906b59d0e25db63e98af10a169a8c3dc9d047cfcbca01030924bf93abe7bce1590
-
Filesize
204KB
MD5879f88cafa5714994744bde20e7bd2c2
SHA1d63b55f9f7c0e40f9585cac8a5cb28c0ea9f32ee
SHA25676126341d0dc2b4b6ddccf30559709e6a856cd47148107808bd18ceb16ed1df3
SHA5124d70ae16c2656cf3a8aaad00e2ce0ddcc030bf1ad29bbb1d0e90c03f866c413f893b273b8b03aa12c9ea5ae01537ad1d2d1b2c52b35bf7773278121a09a3af9c
-
Filesize
4.3MB
MD557d829f7d174d1a8067612c09cf6566b
SHA179ed06500dcee028885b00301f7a9a9155c69b62
SHA256dca0cd7272a56801dd74d0b253df33a8829bee61f5fa0c6d8e2ed5b62f440dff
SHA51216936ce02b7445b56d67adf43d896d2dd9bf1f713d5a765fe97c73c72f22ef8915372dd7b04cfdcfad72447924b6e03d8ae0e0565927a2f862433b2860bcfd64
-
Filesize
2.0MB
MD5757f0b76df3bb477e27aedf5a40d9441
SHA14c73d78cfd3c46823ce78c09d3b44ef1ce38b9ea
SHA256a7edad43f8bb9550f8d45d3079439c2888bd6b49fc92aadc6d24e5ba1d5cd6c8
SHA51293dcb3caff8e21aed731c28933f46ef717be6c88151fdf7b3e6f884ddb8f799f686c8a9f72c8ae7272186070e0f168f67659f2e921d8ae34f1c7197df4d5db20
-
Filesize
2.0MB
MD5757f0b76df3bb477e27aedf5a40d9441
SHA14c73d78cfd3c46823ce78c09d3b44ef1ce38b9ea
SHA256a7edad43f8bb9550f8d45d3079439c2888bd6b49fc92aadc6d24e5ba1d5cd6c8
SHA51293dcb3caff8e21aed731c28933f46ef717be6c88151fdf7b3e6f884ddb8f799f686c8a9f72c8ae7272186070e0f168f67659f2e921d8ae34f1c7197df4d5db20
-
Filesize
2.0MB
MD5757f0b76df3bb477e27aedf5a40d9441
SHA14c73d78cfd3c46823ce78c09d3b44ef1ce38b9ea
SHA256a7edad43f8bb9550f8d45d3079439c2888bd6b49fc92aadc6d24e5ba1d5cd6c8
SHA51293dcb3caff8e21aed731c28933f46ef717be6c88151fdf7b3e6f884ddb8f799f686c8a9f72c8ae7272186070e0f168f67659f2e921d8ae34f1c7197df4d5db20
-
Filesize
2.0MB
MD5757f0b76df3bb477e27aedf5a40d9441
SHA14c73d78cfd3c46823ce78c09d3b44ef1ce38b9ea
SHA256a7edad43f8bb9550f8d45d3079439c2888bd6b49fc92aadc6d24e5ba1d5cd6c8
SHA51293dcb3caff8e21aed731c28933f46ef717be6c88151fdf7b3e6f884ddb8f799f686c8a9f72c8ae7272186070e0f168f67659f2e921d8ae34f1c7197df4d5db20
-
Filesize
2.0MB
MD5757f0b76df3bb477e27aedf5a40d9441
SHA14c73d78cfd3c46823ce78c09d3b44ef1ce38b9ea
SHA256a7edad43f8bb9550f8d45d3079439c2888bd6b49fc92aadc6d24e5ba1d5cd6c8
SHA51293dcb3caff8e21aed731c28933f46ef717be6c88151fdf7b3e6f884ddb8f799f686c8a9f72c8ae7272186070e0f168f67659f2e921d8ae34f1c7197df4d5db20
-
Filesize
556KB
MD522136e15a452d91ce23dd45c7b2c08db
SHA1c1135948536b7f584f9dbbd3bc22e02be306b5a4
SHA256c0215c7920d0e8082a7fa6ee1e62ae9ad00826ee4d0c7a5d573dc1c16525234b
SHA512e223f963fed4f113c10c6d34a1c37afb5954fc0520491fc7756fc988f9166f8555013a30c5ea039c087a4ff7b245d93645d156c2b0cd88d6eda6606166800654
-
Filesize
9.9MB
MD54c8a9e9c260dc5a6fee2a3c37520f5bf
SHA15a9883dbeb5314a98e7ab5326f9868e78ba387dc
SHA2568c2df1f6e2ea8df2e5fc5e4b016b0cddd64a7ce6985189ca45be3c0ec99472c2
SHA512c0da0b08a0b0eaa898f96c6e6c6fb65bc7f773f5814fc0d612a40e2fcaea4049c67cd2812716a564dbc16d609677ee62eaa9f9747d2a7bc5c9bce43cd2208aa7
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\input\User Inputs - Dubai Free Zones Model - 2022.xlsb
Filesize4.1MB
MD5242d04853ecfa4aa781d9fb8d4b45f57
SHA127cc305b95a19e613a64f818cd07dee5d81f1663
SHA256625061136c20a47c1344908f96d509ccd6ce03160103adb2702b1ed1aec241ee
SHA512d23458984b4fa522b646941ac258dc29057987ae600804ebd4559dffa314b22010ca48f4f3260f1ec7071bf10eee1cde009204e3937d27a20a41bea4723d6c72
-
Filesize
69KB
MD515e8556f737d17bd4d645513ee190990
SHA1a24844d68fe3e9f4c57d14e6091a06f5e6b5f327
SHA25612e4fd083a49e038578ea2993e6c88239083c8d098231527eee861299a4e1c99
SHA5124e5c423b2b14def0e6ebb9c7844bdc050198064c9db69d3a880c1444314211995b1f0dec6fcbb12c6d5e59f690c3ffc893c2265bf7168d1ecbc8d83dfa5e1465
-
Filesize
81KB
MD5f8ac49858ca8739658ff44c296f8aba6
SHA1427b4da3bd619d85381c36d61daf2ce392e07909
SHA256354ff502a0e1ed73df4e5c7b52970356b04777461f6e169f72a8567ab5f4c317
SHA51252e875aedbdc5dad21e01a42e333ff5aefed9ae6468a00e80f2bb373b871196f9a82bc3f43a6c72c9dd6be0e4fbc591d3ede41ca47b23a806b788db5aa9bf313
-
Filesize
8.1MB
MD5978e8122033961585e14c65949d15e11
SHA13097d04bbcdfc6ff9e0bb52c2d38f6395e4bb631
SHA256a435fa0e07a9124b0d457811de5e2245aeb225ad55ab99186cb665c6ec6e30ef
SHA5125f6706116b7eaec70213f7343cac44eea2dc735de6262524b5508a659b150d8a5ad7f449fec984b45a2e5c170e1cb4feb927a19530c94841f3e6429a2fcaa1c0
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app\Logo-OE-NoWords.png
Filesize12KB
MD559b5ad87cd77bc84567fef1c71cc35c7
SHA107c5ae16f77b2b5fcf0b66e891a2b4bc152b2227
SHA2566ded95162df170f42c8bf0420c4ad16f01259bc794e7ddbd0f34a29223bbb8e5
SHA51293349be9798004054e44bfeea21a6d0fe5b2418f4d328160ebf8b989788667fe939a5bf8732487590dea30df8c60fb6b483345ba055ba2ed3083a5fc31dc1f1d
-
Filesize
26KB
MD55f4ded30fc564d66a12c443ea68bda94
SHA1866c60c769c6604df5d4d510408f0c135cb772f6
SHA25621b38ea4209df150c3be6339108b11cf0eec945e0d81b0e9f766ee9fa7bce79e
SHA512f4087d63a4d8fef76b312087f11006ff499dad623ed8230da45aaec196b33b7f29afa44f572fdbd3904a0e9849f05cdc8df83d1ea12b992a614e7a73112a5e09
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app\javascript\buttons.js
Filesize2KB
MD54162a14206261df56cb12e7d94a57637
SHA127079978338707709c22ba5cfb35e80b0aba4ed6
SHA256eeaf030d4b3c88f385d5a74bcbe14935e4e972f65091c8f65a31349e3e5d11a2
SHA5123e2301f52b68c0520e109c199ad0a845425d7f184bfd206da921a7e66ea0df51e86c3f1bb090a69fac0d67640ba1ed424dfeaa01a975a44bd72804a6072d4ce1
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app\javascript\jquery-ui.min.js
Filesize234KB
MD56a8d2ad2b8a68c521fa71d81dfea6142
SHA173f6a5f546e8ec56ec6cbbf4a37749d165d04b66
SHA256c4d069befff8b641042baf92c240f4915d376e80f70a5d1b24d1f3182a6cb443
SHA51221d61903e44d5c734ade6a65abac689f9720539a2ecc8164aecef4f9169699ec4d0ac8282440ab96c360a59104456dfeaecf17e4a6151e8117cfeb2bba5be8a2
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app\javascript\jquery.cookie.min.js
Filesize1KB
MD523d834419c7ccced820e192be7081228
SHA1ec662cb3d06ee33848a3fa19585f1f31d4475ec5
SHA256239011ddd00345611806d77467c81dc5a4c90d15fec6f66357671b73920287dc
SHA512e8f79309ed49af97ea34f684e1fc512a8717edc0a017f79e7c5bf2e24c9dd3f0aa889f6ca5349b367a95f10bee50869ea075b3b7c543e5d66558bf0e44ec16e1
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app\javascript\jquery.min.js
Filesize93KB
MD5814a3c697b45f5704f1376c069f5591d
SHA1bd6488289d1f9dba59afcfa0d4e243abd45e7384
SHA25669940f2eeba74346cfbfc3c8099298ea9f84728592fa83a9ba3515f4876dbe00
SHA51282fe79f462ee86fd64c3d710dd29ed2eacab353444335bd09d912b2edd51a2be5b290ecab6cc11338ef01eddca38cebfe11e8d05c0d7a5eb7896630f0a78cd2c
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app\javascript\jquery.ui.touch-punch.min.js
Filesize1KB
MD51e0adfa6441bc911392c10e9c96e2865
SHA10ce2410294e2f81161d82c5e4082896db287cdd7
SHA25680583b000cf3233a28609fa79cfc84bc659b98d097f8ae64852d1027dd612823
SHA512992269a9d903523e6c9be427c2c5b9eaabb76e500b33a4b6a4d34a9b8bcb51163d0a0b8467df0d14e763fba244f587958a69611fea70afd4ce53a3b682ee7714
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app\javascript\papaparse.min.js
Filesize14KB
MD5e7a8b65ec69f8a84d45c943d59ab15b3
SHA197925e328ffab2d26ca13ade78ae1504e9df1e62
SHA256d24934356bb980d52d479520306263883ffc894f9e35f670ec1c9715311b3a93
SHA5125bce4dcb8a50ac3268a2915d7c93281b169096a9d89fdcbf955aa7a1a799d5f72fb7453f445b0a6b348071e7586b85b2ecc7a1587d6f76913ab34381d9c1e2e5
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app\javascript\pivot.js
Filesize65KB
MD5760572eb7a016a4125c8e9d3cd490dca
SHA1ee5f8fbc1a8b30b687368d2138db0cf52f3da8c7
SHA256f0f1d62828501f9c4523bf966dfeb6c10093314a5a168c772ac1f16201a50b6e
SHA51262196cc4b792587fe11167c181c8da4aac23df0f8391be40a7bc4f2032af991f73e23d19c4995a2cd45e7c112c4b015cfd1a86d8a89137061b0366da1fd347fd
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app\javascript\plotly-basic-latest.min-modifiedWithOeColours.js
Filesize937KB
MD57c91e59bbf65b6f162abf4d346413a6b
SHA125d816f82417241c8e3bbed63a4f1e03ed6e231a
SHA25669cec59ad64c0defde02bbc87801c7aae4127434dd1733635d7824a5b3ef2577
SHA512204f9e4de159c177988cd1bc84fa542abcdc59d437a4992b8fcbf0b4114e0b5c4dbf5b0b92c018fdd904c0c7a8f8d80aad9e594ec3c82dfad6317cab510f9923
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app\javascript\plotly_renderers.js
Filesize7KB
MD52cdff98f292aee1b265229fd22f129e4
SHA18b32eafd32651b5d775dfa2ca95aa4b01303521e
SHA256fcf8d17ae7bd26b0d1ae6ced0fcb7779752de55f4f0a6a1251f9c34e337c1421
SHA512dd131c65157eb01f6196d6cf97b52117f25bc3c95182e75afe1c4dd2708b970e50d09890c9fd2422a50cef2868959f97d6ed084f8da9691152c21d882c2c3828
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app\javascript\preload.js
Filesize119B
MD58e74e24096f2bb118598a7551e1637a8
SHA1afe0975a29045464556551386458c0dacae1d078
SHA25675c3f0173b16bca9c3bf7addc100c570de787a758b961b33817407625e7af2af
SHA512d170460b36341a5b30169f7556b0f08321276fe448c8e868914f33885f2cf953446debfea24499c82a3714e683514178c2fbd14499e15add7f4c77fc7eb4a2e4
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app\javascript\readRecordUserChoices.js
Filesize9KB
MD599978f9a1d9fc8855789897371d0747e
SHA12ba6c40d64232bda5726edd96a33b2d94be00e79
SHA25639621a8d5416a81db25821ec23e0771f2b9c444daaa92276f9c7435303f54228
SHA512440588b043470342bac41e69903a29eaa6317caac12b2e02fcfe5f53f73d99aff45107d9fad4840c3c605a75ace9bb5341cf8ec40abe0624fc71b48e69dffc59
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app\javascript\selectFileUploadDownloadDelete.js
Filesize8KB
MD5e9b67b0e18ade8f63eda6ac8044c55bb
SHA1dbbe67cf3b92b4ad4455a850d01779b3b9e03452
SHA25662f0c76d82ccc4e0f2ec3d3eecdec693996c94c8aa4c502e0702229fc2ae6277
SHA512660f0dff7edd41063703fb7bcc9608d5f9a61cfd27325c0b8265a3df7d6677761bc3681524ec5afcfb694a4a87191b62323dcc9decd223fd409038682774519c
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app\javascript\spinningWheel.js
Filesize216B
MD50c44e0f03013170ae1465a16ed6ed80d
SHA17aa699bf8d3681e27191c1958c3ae8ae109986b8
SHA256a99b95c996dfe779367cef697b3cf71698a511ae60af25437116baab0c2ece72
SHA5123d964afa7feb03df9145dfeaab00a06adc254728794efbe1a0f1083fb30549655e24be01ec7464f6e80c6239f54dccdb78aaa90b07a5f7ecb06a8a5127340e5f
-
Filesize
1KB
MD5cd3a22af4f88cb0ac5ada25271d8c3c8
SHA1e895fede4444aafad547cc9a2af29699da6c4e1a
SHA256dd202edf9857369cc4bfab7b3b249425a68c3f443fa1c7e4aea75753f95b8d75
SHA512548c4d5c3433366414c4e84eee5a27ca0d28220560260a74117daa6030beb28b40eaa8ba8de4be42bf68ec35788fffbe930c399ee5a4ffa7a773a11c1351b100
-
Filesize
914B
MD5fa65adf71c968ba8f1e54fb2631ce02b
SHA1e8b888418b2230897a5ca722b9757e3be9dcf0b3
SHA256757a98b93c4dc90513de15a385155ac9fbe21b99df2b7942d89a9d5a99873605
SHA512d64a5804658015b8337b741b574fd181dc76b0e681aa2ef512854b16ad30699fb8648d1d95fc052d01c0fa925a8addbdf3f90468a4f15f3916401e5c46afda32
-
Filesize
20B
MD5afad463f78de8da907368700a62f61ac
SHA11b8e37d5321db1bed6d59518b4595cf70a61e600
SHA25665be83240244b37089b3185b6de5f9c7b76dbfb7f3a16705044ae144642eb3be
SHA5120b726a70ea1d9a8f0a00bd070dcf7a5f66589571d639335ae11c89eafa62d1cccf329d005f7e5a6062fcb1a93e70821eb2cfc3fccfc1a8489f63c28eeeb51127
-
Filesize
6KB
MD5646eb4d153689cd0ddda37210d5d6a73
SHA186bcbd3ebc8a5e95155f3adae4611e4fbf1839cf
SHA256f4dbb04a09b02068d7a515d73f9c71cba478bc2afb62bd7b50df7a6adf490bbc
SHA5128ac2b38fdc0cd3dc862589d88500c51335e90643cb0a8d7befced1948e352b4b1b06737314eecc9e0d797804395e0beeff2b0683cd2e62333266f4ddecbd145f
-
Filesize
4KB
MD51a5a3a47399f6dd7382183c1f196210b
SHA1065eb2ec1cf11b5552b76e8232241b6165ca4a58
SHA256627fb0d73a4bbbb2ef847119ba1e8af45ea86bae3080a3f74f5cdc1fc7f22a88
SHA51260dc61f4f22bd60cec4af435dbeac3048175d92d79b3ac35582be3a57836d304ca0a0cf4d182b8dd7af60969d7c240b13c4e383c61aabad53a730fe9166a9a8e
-
C:\Users\Admin\AppData\Roaming\Dubai Free Zones Model 2022\backend\resources\app\style\spinningWheel.css
Filesize416B
MD56e8d3fbee1a8f61f4e26ff2cfb3e6d6c
SHA1e60a8dc1e6e4f65bf5116aa8ae321177fc8798d3
SHA256fc7847d0523424c52f32c163c7a506cccd893a3929aac81b58d0a1d3d24e4d47
SHA512e03f229a283ed31f0e29c042f7af534135cdc1445bd53e741a45324890d273c5b39e2314a3d5da7649dfbf9b13f51c9230b0dca40f69f6e4015da1093c08d1fb
-
Filesize
1KB
MD51cf39a98d5c8cc24701261c85a5daadc
SHA1c2dbea255aea762ebc60f83eb886582ebc9de847
SHA256c8b679730094d431e24a40e6fbbf930d5accdd29a4c6391420ed0e4768cf4a1d
SHA512673272deb62ca6c77cc458883a7f9618ac7906d3933143f0634a15fc0aa1a80096127e04b34f2f481f55e86cd0845a90ae307a3eaebe35fe2581b6e5df9a974c
-
Filesize
347KB
MD51362f92031875676f4b082ff249abe1f
SHA1bc9a9b6b08e28d8a33c5d388662b0fb3535af8ef
SHA2565acf0deb20455487cb0f39cc4c752e7740137ab6adf8c049e62f092174310ca9
SHA5122fc75d23c61b18b0537c0b5d889766fc51ad37b3a283f64c5edfc0c6abeff21123c055410c15f5d9c5945cba204937983409c865816669442ad8b165ab185d90
-
Filesize
333KB
MD59232de137c209d803ab5aee9f9b54d97
SHA1614bfbf9583d61801785f64886a88aac2d3b5dd2
SHA2564d752716e4837aa50f538f2d05bd79edcf829340adadfe1bda7337c0e7dec504
SHA51258b73c6a93f1d2389ba53c33ca7dc801ef74f27a38bcb65d95de31c6125b70a879e02e3553998ffc9f0152fa4b67b24e34bfbb8864b33c4d41bb5e9218a902b7
-
Filesize
3.7MB
MD571f7d33b4c9d5e4260d041f0e0fd724e
SHA1e671ed5ad823f798e792094e7ffa413549c52208
SHA2568897c0001374eeec95a38f3e8915c652852f7d5f33151b6bda2a9584c9c2158c
SHA5124c5d3d251d6956d8813c870f8900242318037de09335cdd2382a1c3fd9b2909da8f113394d8fdc71166c0673366c8c8dae4c5d0efb1eeaf26b0fb07bb98256b5
-
Filesize
333KB
MD59232de137c209d803ab5aee9f9b54d97
SHA1614bfbf9583d61801785f64886a88aac2d3b5dd2
SHA2564d752716e4837aa50f538f2d05bd79edcf829340adadfe1bda7337c0e7dec504
SHA51258b73c6a93f1d2389ba53c33ca7dc801ef74f27a38bcb65d95de31c6125b70a879e02e3553998ffc9f0152fa4b67b24e34bfbb8864b33c4d41bb5e9218a902b7
-
Filesize
3.7MB
MD571f7d33b4c9d5e4260d041f0e0fd724e
SHA1e671ed5ad823f798e792094e7ffa413549c52208
SHA2568897c0001374eeec95a38f3e8915c652852f7d5f33151b6bda2a9584c9c2158c
SHA5124c5d3d251d6956d8813c870f8900242318037de09335cdd2382a1c3fd9b2909da8f113394d8fdc71166c0673366c8c8dae4c5d0efb1eeaf26b0fb07bb98256b5
-
Filesize
685KB
MD525bee133a55efa9756b25ba25ba3cfa7
SHA16980de30de3d8e6ae81b4b3a14954ca67f58f9de
SHA256156f90f0a8c6748716428786dca9cb53d1275f4510ebae2be5502f3fd94b7dc1
SHA512c80232eda1bc9a7dc52fac538b99cc9a9805c00b455661bd493c12e620286e1983afe37814b0941d90c9e4be970b63108e1f9428c1a7d6fc5ab083acc0ee2aa6