Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2023 13:50
Behavioral task
behavioral1
Sample
Fast.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Fast.exe
Resource
win10v2004-20230703-en
General
-
Target
Fast.exe
-
Size
850KB
-
MD5
f92744c70ebb0649cf37b58519426a33
-
SHA1
789829f5b83e1bdb0d6b00996027dd146668204d
-
SHA256
5c14908448ae75ccb33e9094d0b06f238c69a2d3e8aab66e21da91706bc00dc4
-
SHA512
f11be0173f6d4ec930822943b6a696562e7cf583052e92b1ed508e4d66a0088ed0a1b6afd80638aab7287bcb5286c767590f58f2da941545fe1505d71bbeba4e
-
SSDEEP
12288:BMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Kff4ggUj:BnsJ39LyjbJkQFMhmC+6GD984ggE
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\._cache_Fast.exe family_neshta C:\Users\Admin\AppData\Local\Temp\._cache_Fast.exe family_neshta C:\Users\Admin\AppData\Local\Temp\._cache_Fast.exe family_neshta C:\ProgramData\Synaptics\Synaptics.exe family_neshta C:\ProgramData\Synaptics\Synaptics.exe family_neshta C:\ProgramData\Synaptics\Synaptics.exe family_neshta behavioral2/memory/1440-240-0x0000000000400000-0x00000000004DA000-memory.dmp family_neshta C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe family_neshta C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe family_neshta C:\odt\OFFICE~1.EXE family_neshta C:\Windows\svchost.com family_neshta behavioral2/memory/4368-304-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\Windows\svchost.com family_neshta behavioral2/memory/3264-524-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2316-533-0x0000000000400000-0x00000000004DA000-memory.dmp family_neshta behavioral2/memory/1432-534-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3264-818-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1432-861-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3264-1182-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1432-1482-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3264-1875-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2316-1876-0x0000000000400000-0x00000000004DA000-memory.dmp family_neshta behavioral2/memory/1432-1913-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3264-2385-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2316-2386-0x0000000000400000-0x00000000004DA000-memory.dmp family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE family_neshta behavioral2/memory/1432-2544-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe family_neshta C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE family_neshta C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE family_neshta C:\PROGRA~2\Google\Update\DISABL~1.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE family_neshta C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE family_neshta C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE family_neshta C:\PROGRA~2\MICROS~1\EDGEUP~1\13175~1.29\MICROS~2.EXE family_neshta C:\PROGRA~2\MICROS~1\EDGEUP~1\Install\{2FFB1~1\MicrosoftEdgeUpdateSetup_X86_1.3.175.29.exe family_neshta behavioral2/memory/3264-3218-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE family_neshta behavioral2/memory/2316-3343-0x0000000000400000-0x00000000004DA000-memory.dmp family_neshta behavioral2/memory/1432-3378-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~3\MICROS~1\Windows\STARTM~1\Programs\StartUp\_CACHE~1.EXE family_neshta C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE family_neshta C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE family_neshta C:\Users\Admin\AppData\Local\_CACHE~1.EXE family_neshta C:\Users\Admin\AppData\Local\_CACHE~1.EXE family_neshta C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE family_neshta C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\_CACHE~1.EXE family_neshta C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\_CACHE~1.EXE family_neshta C:\Users\ALLUSE~1\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE family_neshta C:\Users\ALLUSE~1\Adobe\Setup\{AC76B~1\setup.exe family_neshta C:\Users\ALLUSE~1\PACKAG~1\{61087~1\VCREDI~1.EXE family_neshta C:\Users\ALLUSE~1\PACKAG~1\{57A73~1\VC_RED~1.EXE family_neshta C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE family_neshta C:\Users\ALLUSE~1\MICROS~1\Windows\STARTM~1\Programs\StartUp\_CACHE~1.EXE family_neshta behavioral2/memory/3264-4004-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1432-4166-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3264-4562-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Phobos
Phobos ransomware appeared at the beginning of 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 492 bcdedit.exe 4220 bcdedit.exe -
Renames multiple (401) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Processes:
wbadmin.exepid process 64 wbadmin.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Drops startup file 1 IoCs
Processes:
._cache_Fast.exedescription ioc process File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\._cache_Fast.exe ._cache_Fast.exe -
Executes dropped EXE 7 IoCs
Processes:
._cache_Fast.exeSynaptics.exe._cache_Fast.exe._cache_Fast.exe._cache_Synaptics.exesvchost.com_CACHE~2.EXEpid process 3264 ._cache_Fast.exe 2316 Synaptics.exe 2452 ._cache_Fast.exe 3056 ._cache_Fast.exe 1432 ._cache_Synaptics.exe 4368 svchost.com 2252 _CACHE~2.EXE -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
._cache_Fast.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ._cache_Fast.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
Fast.exe._cache_Fast.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Fast.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\._cache_Fast = "C:\\Users\\Admin\\AppData\\Local\\._cache_Fast.exe" ._cache_Fast.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\._cache_Fast = "C:\\Users\\Admin\\AppData\\Local\\._cache_Fast.exe" ._cache_Fast.exe -
Drops desktop.ini file(s) 5 IoCs
Processes:
._cache_Fast.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-1498570331-2313266200-788959944-1000\desktop.ini ._cache_Fast.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1498570331-2313266200-788959944-1000\desktop.ini ._cache_Fast.exe File opened for modification C:\Program Files\desktop.ini ._cache_Fast.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI ._cache_Fast.exe File opened for modification C:\Program Files (x86)\desktop.ini ._cache_Fast.exe -
Drops file in Program Files directory 64 IoCs
Processes:
._cache_Fast.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_SubTest-pl.xrm-ms ._cache_Fast.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Send2.16.GrayF.png.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\System.Speech.dll ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\images\PaySquare150x150Logo.scale-200.png ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-black\MedTile.scale-100.png ._cache_Fast.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.apache.httpcomponents.httpcore_4.2.5.v201311072007.jar ._cache_Fast.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_PrepidBypass-ppd.xrm-ms.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\pl-pl\ui-strings.js ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-white\WideTile.scale-200.png ._cache_Fast.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fr-fr\ui-strings.js.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_reminders_18.svg.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.el-gr.dll ._cache_Fast.exe File created C:\Program Files\Microsoft Office\root\Office16\SAMPLES\SOLVSAMP.XLS.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libplaylist_plugin.dll ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-white\LargeTile.scale-125.png ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\SolitaireLiveTileUpdater.dll ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-32_altform-lightunplated.png ._cache_Fast.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\nl-nl\ui-strings.js ._cache_Fast.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordVL_MAK-pl.xrm-ms ._cache_Fast.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BREEZE\BREEZE.INF.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libes_plugin.dll ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Logo.scale-100_contrast-black.png ._cache_Fast.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ro-ro\ui-strings.js.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\feature.xml.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] ._cache_Fast.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy\messages_ko.properties ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionGroupMedTile.scale-200.png ._cache_Fast.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\mojo_core.dll.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\stopNetworkServer.bat ._cache_Fast.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\README.html ._cache_Fast.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019DemoR_BypassTrial180-ppd.xrm-ms.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File created C:\Program Files\Java\jdk1.8.0_66\db\bin\setNetworkServerCP.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME.txt ._cache_Fast.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\DEEPBLUE\PREVIEW.GIF.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\pt-br\ui-strings.js.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ca.pak.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\nl-nl\ui-strings.js ._cache_Fast.exe File created C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\vlc.mo.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_h264_plugin.dll ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\StoreLogo.scale-100.png ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square44x44\PaintAppList.targetsize-256_altform-unplated.png ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\LibrarySquare150x150Logo.scale-125_contrast-black.png ._cache_Fast.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\LightTheme.acrotheme ._cache_Fast.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_en_135x40.svg ._cache_Fast.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\add-comment.png ._cache_Fast.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Trial2-ppd.xrm-ms.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubSplashScreen.scale-200.png ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\SplashScreen.scale-100.png ._cache_Fast.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\epl-v10.html ._cache_Fast.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_winxp_olv.css ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionLargeTile.scale-200.png ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\RuntimeConfiguration.dll ._cache_Fast.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.databinding.observable_1.4.1.v20140210-1835.jar.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\wordEtw.man ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxAccountsSplashLogo.scale-100.png ._cache_Fast.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ja-jp\ui-strings.js ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\manifests\BuiltinOnboardingCommands.xml ._cache_Fast.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\javax.servlet.jsp_2.2.0.v201112011158.jar ._cache_Fast.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\linesdistinctive.dotx.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-il\ui-strings.js.id[C4C2438D-2939].[[email protected]].faust ._cache_Fast.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\Microsoft.Build.Utilities.v3.5.resources.dll ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-16_altform-lightunplated.png ._cache_Fast.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Combine_R_RHP.aapp ._cache_Fast.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\ImmersiveVideoPlayback\Content\Shaders\LoadedModelShaders\Platform.hlsl ._cache_Fast.exe -
Drops file in Windows directory 4 IoCs
Processes:
._cache_Fast.exe._cache_Synaptics.exesvchost.comdescription ioc process File opened for modification C:\Windows\svchost.com ._cache_Fast.exe File opened for modification C:\Windows\svchost.com ._cache_Synaptics.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1964 vssadmin.exe -
Modifies registry class 4 IoCs
Processes:
Fast.exe._cache_Fast.exeSynaptics.exe._cache_Synaptics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Fast.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ._cache_Fast.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\Local Settings ._cache_Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4548 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
._cache_Fast.exepid process 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe 2452 ._cache_Fast.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
Processes:
._cache_Fast.exevssvc.exeWMIC.exewbengine.exedescription pid process Token: SeDebugPrivilege 2452 ._cache_Fast.exe Token: SeBackupPrivilege 1848 vssvc.exe Token: SeRestorePrivilege 1848 vssvc.exe Token: SeAuditPrivilege 1848 vssvc.exe Token: SeIncreaseQuotaPrivilege 3068 WMIC.exe Token: SeSecurityPrivilege 3068 WMIC.exe Token: SeTakeOwnershipPrivilege 3068 WMIC.exe Token: SeLoadDriverPrivilege 3068 WMIC.exe Token: SeSystemProfilePrivilege 3068 WMIC.exe Token: SeSystemtimePrivilege 3068 WMIC.exe Token: SeProfSingleProcessPrivilege 3068 WMIC.exe Token: SeIncBasePriorityPrivilege 3068 WMIC.exe Token: SeCreatePagefilePrivilege 3068 WMIC.exe Token: SeBackupPrivilege 3068 WMIC.exe Token: SeRestorePrivilege 3068 WMIC.exe Token: SeShutdownPrivilege 3068 WMIC.exe Token: SeDebugPrivilege 3068 WMIC.exe Token: SeSystemEnvironmentPrivilege 3068 WMIC.exe Token: SeRemoteShutdownPrivilege 3068 WMIC.exe Token: SeUndockPrivilege 3068 WMIC.exe Token: SeManageVolumePrivilege 3068 WMIC.exe Token: 33 3068 WMIC.exe Token: 34 3068 WMIC.exe Token: 35 3068 WMIC.exe Token: 36 3068 WMIC.exe Token: SeIncreaseQuotaPrivilege 3068 WMIC.exe Token: SeSecurityPrivilege 3068 WMIC.exe Token: SeTakeOwnershipPrivilege 3068 WMIC.exe Token: SeLoadDriverPrivilege 3068 WMIC.exe Token: SeSystemProfilePrivilege 3068 WMIC.exe Token: SeSystemtimePrivilege 3068 WMIC.exe Token: SeProfSingleProcessPrivilege 3068 WMIC.exe Token: SeIncBasePriorityPrivilege 3068 WMIC.exe Token: SeCreatePagefilePrivilege 3068 WMIC.exe Token: SeBackupPrivilege 3068 WMIC.exe Token: SeRestorePrivilege 3068 WMIC.exe Token: SeShutdownPrivilege 3068 WMIC.exe Token: SeDebugPrivilege 3068 WMIC.exe Token: SeSystemEnvironmentPrivilege 3068 WMIC.exe Token: SeRemoteShutdownPrivilege 3068 WMIC.exe Token: SeUndockPrivilege 3068 WMIC.exe Token: SeManageVolumePrivilege 3068 WMIC.exe Token: 33 3068 WMIC.exe Token: 34 3068 WMIC.exe Token: 35 3068 WMIC.exe Token: 36 3068 WMIC.exe Token: SeBackupPrivilege 264 wbengine.exe Token: SeRestorePrivilege 264 wbengine.exe Token: SeSecurityPrivilege 264 wbengine.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid process 4548 EXCEL.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
Fast.exe._cache_Fast.exeSynaptics.exe._cache_Synaptics.exesvchost.com._cache_Fast.execmd.execmd.exedescription pid process target process PID 1440 wrote to memory of 3264 1440 Fast.exe ._cache_Fast.exe PID 1440 wrote to memory of 3264 1440 Fast.exe ._cache_Fast.exe PID 1440 wrote to memory of 3264 1440 Fast.exe ._cache_Fast.exe PID 1440 wrote to memory of 2316 1440 Fast.exe Synaptics.exe PID 1440 wrote to memory of 2316 1440 Fast.exe Synaptics.exe PID 1440 wrote to memory of 2316 1440 Fast.exe Synaptics.exe PID 3264 wrote to memory of 2452 3264 ._cache_Fast.exe ._cache_Fast.exe PID 3264 wrote to memory of 2452 3264 ._cache_Fast.exe ._cache_Fast.exe PID 3264 wrote to memory of 2452 3264 ._cache_Fast.exe ._cache_Fast.exe PID 2316 wrote to memory of 1432 2316 Synaptics.exe ._cache_Synaptics.exe PID 2316 wrote to memory of 1432 2316 Synaptics.exe ._cache_Synaptics.exe PID 2316 wrote to memory of 1432 2316 Synaptics.exe ._cache_Synaptics.exe PID 1432 wrote to memory of 4368 1432 ._cache_Synaptics.exe svchost.com PID 1432 wrote to memory of 4368 1432 ._cache_Synaptics.exe svchost.com PID 1432 wrote to memory of 4368 1432 ._cache_Synaptics.exe svchost.com PID 4368 wrote to memory of 2252 4368 svchost.com _CACHE~2.EXE PID 4368 wrote to memory of 2252 4368 svchost.com _CACHE~2.EXE PID 4368 wrote to memory of 2252 4368 svchost.com _CACHE~2.EXE PID 2452 wrote to memory of 2136 2452 ._cache_Fast.exe cmd.exe PID 2452 wrote to memory of 2136 2452 ._cache_Fast.exe cmd.exe PID 2452 wrote to memory of 4200 2452 ._cache_Fast.exe cmd.exe PID 2452 wrote to memory of 4200 2452 ._cache_Fast.exe cmd.exe PID 4200 wrote to memory of 2296 4200 cmd.exe netsh.exe PID 4200 wrote to memory of 2296 4200 cmd.exe netsh.exe PID 2136 wrote to memory of 1964 2136 cmd.exe vssadmin.exe PID 2136 wrote to memory of 1964 2136 cmd.exe vssadmin.exe PID 4200 wrote to memory of 2104 4200 cmd.exe netsh.exe PID 4200 wrote to memory of 2104 4200 cmd.exe netsh.exe PID 2136 wrote to memory of 3068 2136 cmd.exe WMIC.exe PID 2136 wrote to memory of 3068 2136 cmd.exe WMIC.exe PID 2136 wrote to memory of 492 2136 cmd.exe bcdedit.exe PID 2136 wrote to memory of 492 2136 cmd.exe bcdedit.exe PID 2136 wrote to memory of 4220 2136 cmd.exe bcdedit.exe PID 2136 wrote to memory of 4220 2136 cmd.exe bcdedit.exe PID 2136 wrote to memory of 64 2136 cmd.exe wbadmin.exe PID 2136 wrote to memory of 64 2136 cmd.exe wbadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fast.exe"C:\Users\Admin\AppData\Local\Temp\Fast.exe"1⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\._cache_Fast.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Fast.exe"2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\._cache_Fast.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\._cache_Fast.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\._cache_Fast.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\._cache_Fast.exe"4⤵
- Executes dropped EXE
PID:3056 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:1964 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3068 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures5⤵
- Modifies boot configuration data using bcdedit
PID:492 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no5⤵
- Modifies boot configuration data using bcdedit
PID:4220 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet5⤵
- Deletes backup catalog
PID:64 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\system32\netsh.exenetsh advfirewall set currentprofile state off5⤵
- Modifies Windows Firewall
PID:2296 -
C:\Windows\system32\netsh.exenetsh firewall set opmode mode=disable5⤵
- Modifies Windows Firewall
PID:2104 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate5⤵
- Executes dropped EXE
PID:2252
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4548
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:264
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1464
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2912
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5176436d406fd1aabebae353963b3ebcf
SHA19ffdfdb8cc832a0c6501c4c0e85b23a0f7eff57a
SHA2562f947e3ca624ce7373080b4a3934e21644fb070a53feeaae442b15b849c2954f
SHA512a2d1a714e0c1e5463260c64048ba8fd5064cfa06d4a43d02fc04a30748102ff5ba86d20a08e611e200dc778e2b7b3ae808da48132a05a61aa09ac424a182a06a
-
Filesize
147KB
MD53b35b268659965ab93b6ee42f8193395
SHA18faefc346e99c9b2488f2414234c9e4740b96d88
SHA256750824b5f75c91a6c2eeb8c5e60ae28d7a81e323d3762c8652255bfea5cba0bb
SHA512035259a7598584ddb770db3da4e066b64dc65638501cdd8ff9f8e2646f23b76e3dfffa1fb5ed57c9bd15bb4efa3f7dd33fdc2e769e5cc195c25de0e340eb89ab
-
Filesize
623KB
MD56e84b6096aaa18cabc30f1122d5af449
SHA1e6729edd11b52055b5e34d39e5f3b8f071bbac4f
SHA256c6b7f9119cf867951f007c5468f75eb4dca59c7eedeb0afdd8ad9d5b9606e759
SHA512af5b33e7e190587bb152adf65fbcd4c1cd521f638863a6d1c7de29599cce6439b6c7b653180661cb0382007aefa0ae5a1b1b841eaaa116ce715f3a5ba0725a42
-
Filesize
121KB
MD5cbd96ba6abe7564cb5980502eec0b5f6
SHA174e1fe1429cec3e91f55364e5cb8385a64bb0006
SHA256405b8bd647fa703e233b8b609a18999abe465a8458168f1daf23197bd2ea36aa
SHA512a551001853f6b93dfbc6cf6a681820af31330a19d5411076ff3dbce90937b3d92173085a15f29ebf56f2ef12a4e86860ac6723ebc89c98ea31ea7a6c7e3d7cdc
-
Filesize
230KB
MD5e5589ec1e4edb74cc7facdaac2acabfd
SHA19b12220318e848ed87bb7604d6f6f5df5dbc6b3f
SHA2566ce92587a138ec07dac387a294d0bbe8ab629599d1a2868d2afaccea3b245d67
SHA512f36ab33894681f51b9cec7ea5a738eb081a56bcd7625bdd2f5ef2c084e4beb7378be8f292af3aeae79d9317ba57cc41df89f00aef52e58987bdb2eac3f48171a
-
Filesize
248KB
MD56a57dc8a285dc9738c88e78fba506d22
SHA16c7fbb72d162b60ae27df884aa379c9e41ecbf9d
SHA256b3c0c2c2eba96fb385979636c2593d7322ef3d72a6d67cad4bb9ef64f7eb4699
SHA5124d559ded8758ce92b4f2bb7ad819873aa6fcb4f351e1aec820d49ba87cb840a593f9c6dca6f5244bbe4748b9f1c623e981ba0e77ad57e1364a1876f6fc3a88f1
-
Filesize
342KB
MD55da33a7b7941c4e76208ee7cddec8e0b
SHA1cdd2e7b9b0e4be68417d4618e20a8283887c489c
SHA256531e735e4e8940dfe21e30be0d4179ceaecb57ce431cf63c5044e07048ac1751
SHA512977aeecfbc693c9d5746fedf08b99e0b0f6fd7b0c7b41ac2b34a832e68a2e6f3c68f38af2e65c87075fcf00c1c6103e34324df45d7da9412cbbeea7e410794b6
-
Filesize
439KB
MD5400836f307cf7dbfb469cefd3b0391e7
SHA17af3cbb12d3b2d8b5d9553c687c6129d1dd90a10
SHA256cb5c5abb625a812d47007c75e3855be3f29da527a41cf03730ad5c81f3eb629a
SHA512aa53cb304478585d6f83b19a6de4a7938ba2570d380a565a56ff5365aed073d5f56b95ad3228eb7d1e7e6110c6172a58b97bd6a5e57e4a8d39e762ed31dc17c8
-
Filesize
207KB
MD53b0e91f9bb6c1f38f7b058c91300e582
SHA16e2e650941b1a96bb0bb19ff26a5d304bb09df5f
SHA25657c993cadf4bf84810cea23a7112c6e260624beaab48d0e4332d3462900fec1d
SHA512a4fbe28a0135f4632e0a5b6bd775f8d010250b0fbfe223db1fe81d18552a6bc166ebce807853ba02e6a476e9829454805e415ca828a5e043bd1e63dc53599d0f
-
Filesize
338KB
MD51a92fabc434bbf13d4924b0eca194a96
SHA12c366dbccbe767050532d69f9845ef2e495c0009
SHA256c0bc695056153115bf669e1ce1440977c489b770de7885870c56e34e504e6d38
SHA512bd1caf8acfd73d330afd36eac39b27047df655ea84e7f2c5c409e237074f302429c8c01d9306e3b5a212cc2692cb7fc9d6e809fbdf6360d54556a1674505dac3
-
Filesize
1.6MB
MD5941dc4a9867fd2720ca5543bad28dcfb
SHA1f82f00e35c69c548e8aacd1decc43074c69bb65a
SHA256d39cd68b12a06be700deae6e80bceb6e994d7b14e04539e7ee4404f1f25a8fae
SHA51224ca083ec734076ff3cb2e7b9a877143ce9d90d439a1009b922f1a4e842f068a17057d48ddf483e2b625a457a500352a39771195015bed589747813c00175d68
-
Filesize
1.1MB
MD5301d7f5daa3b48c83df5f6b35de99982
SHA117e68d91f3ec1eabde1451351cc690a1978d2cd4
SHA256abe398284d90be5e5e78f98654b88664e2e14478f7eb3f55c5fd1c1bcf1bebee
SHA5124a72a24dec461d116fe8324c651913273ccaa50cb036ccdacb3ae300e417cf4a64aa458869b8d2f3b4c298c59977437d11b241d08b391a481c3226954bba22e4
-
Filesize
3.6MB
MD56ce350ad38c8f7cbe5dd8fda30d11fa1
SHA14f232b8cccd031c25378b4770f85e8038e8655d8
SHA25606a3bb0bdd2da870bc8dc2c6b760855cea7821273ce59fc0be158149e52915ba
SHA5124c18a112fec391f443a4ae217ac6d1850e0cfdad4b2d2cbe3f61cb01c0a1400ea6bd5c3ffe0a9978ead50e7f6cfab96ae5090bb9a611f988f1a86ccaa5d4cd4f
-
Filesize
2.8MB
MD5eb008f1890fed6dc7d13a25ff9c35724
SHA1751d3b944f160b1f77c1c8852af25b65ae9d649c
SHA256a9b7b9155af49d651b092bb1665447059f7a1d0061f88fa320d4f956b9723090
SHA5129cfe3480f24bf8970ad5773cb9df51d132ee90ada35cbf8ec1222e09a60ae46b2ff4b96862fea19085b1c32f93c47c69f604589fa3f4af17e5d67bef893b6bf1
-
Filesize
1.3MB
MD527543bab17420af611ccc3029db9465a
SHA1f0f96fd53f9695737a3fa6145bc5a6ce58227966
SHA25675530dc732f35cc796d19edd11ae6d6f6ef6499ddcf2e57307582b1c5299554c
SHA512a62c2dd60e1df309ec1bb48ea85184914962ba83766f29d878569549ca20fca68f304f4494702d9e5f09adedc2166e48ee0bc1f4a5d9e245c5490daf15036bea
-
Filesize
1.1MB
MD5a5d9eaa7d52bffc494a5f58203c6c1b5
SHA197928ba7b61b46a1a77a38445679d040ffca7cc8
SHA25634b8662d38e7d3d6394fa6c965d943d2c82ea06ba9d7a0af4f8e0571fb5a9c48
SHA512b6fdc8389bb4d736d608600469be6a4b0452aa3ea082f9a0791022a14c02b8fb7dcd62df133b0518e91283094eaba2be9318316f72d2c4aae6286d3e8686e787
-
Filesize
3.2MB
MD55119e350591269f44f732b470024bb7c
SHA14ccd48e4c6ba6e162d1520760ee3063e93e2c014
SHA2562b3aa9642b291932ba7f9f3d85221402a9d27078f56ef0e9c6bca633616e3873
SHA512599b4ec673169d42a348d1117737b4ad4d7539574153df5a5c7689130c9ac5ff5cd00f3c8ec39adf32ff2b56be074081efcabb6456272c649703c3ea6cdaded4
-
Filesize
267KB
MD515163eb05b0a8f65a5ca3c74a658077d
SHA18b116062a5754fa2d73fc4df9f635283ae1ccd02
SHA2568751c43ee0f3f0e080103a9b77be9e79346004769ed43d4cadd630ea15d26dcf
SHA512a8299e9a522aa58429847920b999598551c1863f63ba473178f61cde43fb91cab6ef62c9e1a51268e54338e012ccfe6428a7c37bc89007d1604fafa2560258c9
-
Filesize
96KB
MD51242872b9de9fe8b0fa75c19a97aa626
SHA16b6b111d67c4f156b851a2b4a5ba1d578ca2d38b
SHA256e68877f0971799322f31cfb01531d99e303edb981b96767765d5766d75817e0e
SHA512a8ce0cd60f5657567065ab8f569bcb95e6a936f380e7087cf98c37d5e63a71acb79e5cc8e0fc74e8dcca69d1ff34d72761790a9d7260bbff96d2601f3d5b36fc
-
Filesize
674KB
MD597510a7d9bf0811a6ea89fad85a9f3f3
SHA12ac0c49b66a92789be65580a38ae9798237711db
SHA256c48abbc29405559e68cc9f8fc6d218aa317a9d0023839c7846ca509c1f563fea
SHA5122a93e2a3bd187fdde160f87ef777ccd1d1c398d547b7c869e6b64469b9418ad04d887cdfe94af7407476377bf2d009f576de3935c025b7aefbab26fbcd8f90fb
-
Filesize
485KB
MD587f15006aea3b4433e226882a56f188d
SHA1e3ad6beb8229af62b0824151dbf546c0506d4f65
SHA2568d0045c74270281c705009d49441167c8a51ac70b720f84ff941b39fad220919
SHA512b01a8af6dc836044d2adc6828654fa7a187c3f7ffe2a4db4c73021be6d121f9c1c47b1643513c3f25c0e1b5123b8ce2dc78b2ca8ce638a09c2171f158762c7c1
-
Filesize
495KB
MD507e194ce831b1846111eb6c8b176c86e
SHA1b9c83ec3b0949cb661878fb1a8b43a073e15baf1
SHA256d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac
SHA51255f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5
-
Filesize
175KB
MD5576410de51e63c3b5442540c8fdacbee
SHA18de673b679e0fee6e460cbf4f21ab728e41e0973
SHA2563f00404dd591c2856e6f71bd78423ed47199902e0b85f228e6c4de72c59ddffe
SHA512f7761f3878775b30cc3d756fa122e74548dfc0a27e38fa4109e34a59a009df333d074bf14a227549ae347605f271be47984c55148685faac479aeb481f7191db
-
Filesize
368KB
MD53f2aae5da46d1362c5e62d5f52b33138
SHA1bb1ffceeae68fd3be291fc82d61a604631e4e31b
SHA25613149adde5bcf9ddaeb1a4022e41d9723c3571ae6b7173ddafb9b0cc4bfb7411
SHA512301ccea1e2d31879df3e6e8de86fe52a058b740d3c234273cd58b4cdab74668ee13bad04c09df5fb4a94214acb056a86b47c143a93f971dcde6d199da6d1e02c
-
Filesize
10.1MB
MD5c6151d501d89e3efd1950287199a7bbb
SHA11d91f4767f4fa4e42d5331353366a7d6df9ca6ed
SHA25629a706cc0e6bd8745dd618abf1aececc30e00d582b88eba968211443f4192e5c
SHA512321c7279744ceb6cc2ea0f9a173d755bb06508597b769e115a1afb87814cc51a61e5b843cf5a21694b4b393b8483eb559e72d640051b1db0499b9f8e56d583f4
-
Filesize
3.2MB
MD58a68e28531700e2859e2f0e0c7d11b2d
SHA17250c2e26c9033570d4a6cbc2075aa78a287dd4e
SHA2569496c6a90365f1f6b55abd593a59eac2aa566d95d8258cc3600c9248fbdc230c
SHA512343363f7181c92a9af77b5478abadbe03c1e745901847f7f184e7370012fd254818224f39b8a333d13fa464a490f13dd697056a4b923652b29859f53d90864a8
-
Filesize
127KB
MD5857228f0cfaf7f60edea0bd7bcb71e8c
SHA1b52bc4db729c60991c55e67e5862553667093d81
SHA2562c4fdbb93e11d0264718872ef88625bf4d129fbb622beb7c92c7b04dbb76eb91
SHA512a2fe020b365b07f2a5d29dcac41e2d77e8fac4610a771e435c1620bfb2632f70f67415780f87110efca71b383ebcebad8f034dd89f397d4f160cbb9a9927c3c7
-
Filesize
6.4MB
MD5d92ab4255d82c6a73983fc8e74f1c179
SHA1cccb75e63d0113aa9ecdbc7f58de62710dad777b
SHA256984532ba151ee06c1d931c9228cab36ec12bf29f5b47964eaa3904710bea65b9
SHA5129264231c78d8781cc4752d33b97a02f14321670b3c1839e9bd163c5ffd79234930726bb9682ef4948ba6856b05fff41ea97d210db7b427ccce7e965b78557c13
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe
Filesize183KB
MD59dfcdd1ab508b26917bb2461488d8605
SHA14ba6342bcf4942ade05fb12db83da89dc8c56a21
SHA256ecd5e94da88c653e4c34b6ab325e0aca8824247b290336f75c410caa16381bc5
SHA5121afc1b95f160333f1ff2fa14b3f22a28ae33850699c6b5498915a8b6bec1cfc40f33cb69583240aa9206bc2ea7ab14e05e071275b836502a92aa8c529fc1b137
-
Filesize
131KB
MD55791075058b526842f4601c46abd59f5
SHA1b2748f7542e2eebcd0353c3720d92bbffad8678f
SHA2565c3ef3ec7594c040146e908014791dd15201ba58b4d70032770bb661b6a0e394
SHA51283e303971ed64019fde9e4ba6f6e889f8fb105088490dfa7dcf579a12baff20ef491f563d132d60c7b24a4fd3cac29bd9dc974571cd162000fae8fba4e0e54fb
-
Filesize
294KB
MD58230b3c0d165eb0e33db49a647143e6b
SHA183d377dcbf5a38a11cc954a9cb935902de5da417
SHA256179664f3288450e5576ba7e893723e225ad715b8a2e0a3e6c3421f2cfd1d52f6
SHA5129a946c5b6161fd6cafb2c116f6d62f5a8d84baeb924180ba1920ee0a105cf49edd5aa91cc37643c60fc568f184c8b15082a30750f673344b98347b90dcf138a7
-
Filesize
386KB
MD58c753d6448183dea5269445738486e01
SHA1ebbbdc0022ca7487cd6294714cd3fbcb70923af9
SHA256473eb551101caeaf2d18f811342e21de323c8dd19ed21011997716871defe997
SHA5124f6fddefc42455540448eac0b693a4847e21b68467486376a4186776bfe137337733d3075b7b87ed7dac532478dc9afc63883607ec8205df3f155fee64c7a9be
-
Filesize
165KB
MD50d97118ca4e780d34152d48c2f612416
SHA1ec657a360574b26ed216800707e133452c919b95
SHA256e21912f32492543d097e3dd291ab81b7d2de4df264035f74ca52d4e498508b98
SHA5120bab399915609207fb2086b2268daa03451a773b6c914c01d55412c1510289488b6950b8313eabc7f45d4c77a49c66454e6b8642ae71d1cc552373ca4c1f400f
-
Filesize
183KB
MD51082ac5acb32fde9b264b9765d2da2a0
SHA169ce440dc0e1666d1a382e3d7f18c36b0bde0e57
SHA256081bd39c1729ec07b2005da7bde67650012a1eeef6d3a3cab52a970312a06959
SHA5128a94040cc993d82b4661813a67e733829308e88b8a118de25a6cdc0dd88b1dd87cd3923a66a9b1015699d49cce0f6a1d313374761b98e948cacd7dab205cd7ee
-
Filesize
278KB
MD512c29dd57aa69f45ddd2e47620e0a8d9
SHA1ba297aa3fe237ca916257bc46370b360a2db2223
SHA25622a585c183e27b3c732028ff193733c2f9d03700a0e95e65c556b0592c43d880
SHA512255176cd1a88dfa2af3838769cc20dc7ad9d969344801f07b9ebb372c12cee3f47f2dba3559f391deab10650875cad245d9724acfa23a42b336bfa96559a5488
-
Filesize
1.2MB
MD5931273e76420210a17e46b7b6a954513
SHA1339fdf36ddf486f9354ce56c8320e63ea69befad
SHA2565edc52c1210dc2c56069abfffd5088f9760e6d6d283e03f3b2c9ae66d72a3238
SHA5120688f8cb8529c00fbe1e0288742bd11fbcfffbfe66616d1e3aca9e9339b7b431b0f279739925aeb463ea4d7c9d6a6a3b9a4736439e7ed2e1309fff9d1e78e3a2
-
Filesize
454KB
MD5bcd0f32f28d3c2ba8f53d1052d05252d
SHA1c29b4591df930dabc1a4bd0fa2c0ad91500eafb2
SHA256bb07d817b8b1b6b4c25e62b6120e51dec10118557d7b6b696ad084a5ba5bfdeb
SHA51279f407735853f82f46870c52058ceee4d91857a89db14868ee1169abd5c0fd2e3fa1ed230ab90b5f479a9581b88998643d69b0df498defea29e73b0d487f3b10
-
Filesize
507KB
MD581a2273a8288fd2d593b3a18a6ed020c
SHA1e666390b5bb996970539f54d826c120c01b7e568
SHA256d814fffb9487d2fe6e974a57b60b3b9b3462f204e8fad8f4b90bd9f3f27616c5
SHA512f6bdb88f878d0e17d7abb3b99226623480509032325757326836a5db456e1ee963868df9b86f9c04082c35660a035fd7033ae5c5f7789a22896271f13cc582a0
-
Filesize
942KB
MD52d3cc5612a414f556f925a3c1cb6a1d6
SHA10fee45317280ed326e941cc2d0df848c4e74e894
SHA256fe46de1265b6fe2e316aca33d7f7f45c6ffdf7c49a044b464fd9dc88ec92091b
SHA512cc49b200adf92a915da6f9b73417543d4dcc77414e0c4bd2ce3bfdfc5d151e0b28249f8d64f6b7087cf8c3bab6aeeab5b152ac6199cb7cc63e64a66b4f03a9f5
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id[C4C2438D-2939].[[email protected]].faust
Filesize2.7MB
MD5be909bbe0bb8045cfe05dfa3e653f69a
SHA1ab8281c891c28bf19a0c38535a49037a0c4da884
SHA2562e39ec3d7e99b585f11896cbfc4bc1e85e70d8daa3ca9d32fa4f5971fc43bb1e
SHA512d46d3e08373f6b7225e865896c20f95891b6bd7b0b1ea9701d54cd10c078629182eb7ac02fa2b61f617d37a6cbf0dc7df942c578e9d0e2013744a69babffb515
-
Filesize
850KB
MD5f92744c70ebb0649cf37b58519426a33
SHA1789829f5b83e1bdb0d6b00996027dd146668204d
SHA2565c14908448ae75ccb33e9094d0b06f238c69a2d3e8aab66e21da91706bc00dc4
SHA512f11be0173f6d4ec930822943b6a696562e7cf583052e92b1ed508e4d66a0088ed0a1b6afd80638aab7287bcb5286c767590f58f2da941545fe1505d71bbeba4e
-
Filesize
850KB
MD5f92744c70ebb0649cf37b58519426a33
SHA1789829f5b83e1bdb0d6b00996027dd146668204d
SHA2565c14908448ae75ccb33e9094d0b06f238c69a2d3e8aab66e21da91706bc00dc4
SHA512f11be0173f6d4ec930822943b6a696562e7cf583052e92b1ed508e4d66a0088ed0a1b6afd80638aab7287bcb5286c767590f58f2da941545fe1505d71bbeba4e
-
Filesize
850KB
MD5f92744c70ebb0649cf37b58519426a33
SHA1789829f5b83e1bdb0d6b00996027dd146668204d
SHA2565c14908448ae75ccb33e9094d0b06f238c69a2d3e8aab66e21da91706bc00dc4
SHA512f11be0173f6d4ec930822943b6a696562e7cf583052e92b1ed508e4d66a0088ed0a1b6afd80638aab7287bcb5286c767590f58f2da941545fe1505d71bbeba4e
-
Filesize
494KB
MD505bdfd8a3128ab14d96818f43ebe9c0e
SHA1495cbbd020391e05d11c52aa23bdae7b89532eb7
SHA2567b945c7e6b8bfbb489f003ecd1d0dcd4803042003de4646d4206114361a0fbbb
SHA5128d9b9fc407986bd53fe3b56c96b7371cc782b4bac705253bfb0a2b0b1e6883fdb022f1ac87b8bfd7005291991b6a3dfbaceab54f5d494e0af70f0435a0b8b0da
-
Filesize
6.7MB
MD562cee57f68ee7e0e3ef51ef37792ac37
SHA1d21783c2e444c89467ed578f7fa735a3203316ee
SHA25672dd833db5bbb2796fe1e339656393cbabb171b114d6183da2e89940c39b9b4b
SHA512edf2bede3c6ba44eec65460fe39de612dcd3e43da555b3fec644eff66e6db581b98ee676c7924e11ef4b448a8cb037e74dfb5e2fa2347c50ae553d5d33e511eb
-
Filesize
96KB
MD51242872b9de9fe8b0fa75c19a97aa626
SHA16b6b111d67c4f156b851a2b4a5ba1d578ca2d38b
SHA256e68877f0971799322f31cfb01531d99e303edb981b96767765d5766d75817e0e
SHA512a8ce0cd60f5657567065ab8f569bcb95e6a936f380e7087cf98c37d5e63a71acb79e5cc8e0fc74e8dcca69d1ff34d72761790a9d7260bbff96d2601f3d5b36fc
-
Filesize
485KB
MD586749cd13537a694795be5d87ef7106d
SHA1538030845680a8be8219618daee29e368dc1e06c
SHA2568c35dcc975a5c7c687686a3970306452476d17a89787bc5bd3bf21b9de0d36a5
SHA5127b6ae20515fb6b13701df422cbb0844d26c8a98087b2758427781f0bf11eb9ec5da029096e42960bf99ddd3d4f817db6e29ac172039110df6ea92547d331db4c
-
Filesize
674KB
MD59c10a5ec52c145d340df7eafdb69c478
SHA157f3d99e41d123ad5f185fc21454367a7285db42
SHA256ccf37e88447a7afdb0ba4351b8c5606dbb05b984fb133194d71bcc00d7be4e36
SHA5122704cfd1a708bfca6db7c52467d3abf0b09313db0cdd1ea8e5d48504c8240c4bf24e677f17c5df9e3ac1f6a678e0328e73e951dc4481f35027cb03b2966dc38f
-
Filesize
495KB
MD59597098cfbc45fae685d9480d135ed13
SHA184401f03a7942a7e4fcd26e4414b227edd9b0f09
SHA25645966655baaed42df92cd6d8094b4172c0e7a0320528b59cf63fca7c25d66e9c
SHA51216afbdffe4b4b2e54b4cc96fe74e49ca367dea50752321ddf334756519812ba8ce147ef5459e421dc42e103bc3456aab1d185588cc86b35fa2315ac86b2a0164
-
Filesize
96KB
MD51242872b9de9fe8b0fa75c19a97aa626
SHA16b6b111d67c4f156b851a2b4a5ba1d578ca2d38b
SHA256e68877f0971799322f31cfb01531d99e303edb981b96767765d5766d75817e0e
SHA512a8ce0cd60f5657567065ab8f569bcb95e6a936f380e7087cf98c37d5e63a71acb79e5cc8e0fc74e8dcca69d1ff34d72761790a9d7260bbff96d2601f3d5b36fc
-
Filesize
96KB
MD51242872b9de9fe8b0fa75c19a97aa626
SHA16b6b111d67c4f156b851a2b4a5ba1d578ca2d38b
SHA256e68877f0971799322f31cfb01531d99e303edb981b96767765d5766d75817e0e
SHA512a8ce0cd60f5657567065ab8f569bcb95e6a936f380e7087cf98c37d5e63a71acb79e5cc8e0fc74e8dcca69d1ff34d72761790a9d7260bbff96d2601f3d5b36fc
-
Filesize
96KB
MD51242872b9de9fe8b0fa75c19a97aa626
SHA16b6b111d67c4f156b851a2b4a5ba1d578ca2d38b
SHA256e68877f0971799322f31cfb01531d99e303edb981b96767765d5766d75817e0e
SHA512a8ce0cd60f5657567065ab8f569bcb95e6a936f380e7087cf98c37d5e63a71acb79e5cc8e0fc74e8dcca69d1ff34d72761790a9d7260bbff96d2601f3d5b36fc
-
Filesize
96KB
MD51242872b9de9fe8b0fa75c19a97aa626
SHA16b6b111d67c4f156b851a2b4a5ba1d578ca2d38b
SHA256e68877f0971799322f31cfb01531d99e303edb981b96767765d5766d75817e0e
SHA512a8ce0cd60f5657567065ab8f569bcb95e6a936f380e7087cf98c37d5e63a71acb79e5cc8e0fc74e8dcca69d1ff34d72761790a9d7260bbff96d2601f3d5b36fc
-
Filesize
96KB
MD51242872b9de9fe8b0fa75c19a97aa626
SHA16b6b111d67c4f156b851a2b4a5ba1d578ca2d38b
SHA256e68877f0971799322f31cfb01531d99e303edb981b96767765d5766d75817e0e
SHA512a8ce0cd60f5657567065ab8f569bcb95e6a936f380e7087cf98c37d5e63a71acb79e5cc8e0fc74e8dcca69d1ff34d72761790a9d7260bbff96d2601f3d5b36fc
-
Filesize
56KB
MD5c0edb05bd1e26666764757e7d6f6f09b
SHA1330139df4594f4070ada6c89ec3d0a16abe14497
SHA256c29630324d768c6e40b814164f6c2c6f33dd741392edc940cc852e67e1667a57
SHA512f172c38d5d169523c56d5c551749c9b8bf6d1452b0c64666651757f46546ffe8bd445935b88faf16dc381a13a6b12a71934fef6c9fa434ee5974d0d3499d1790
-
Filesize
56KB
MD5c0edb05bd1e26666764757e7d6f6f09b
SHA1330139df4594f4070ada6c89ec3d0a16abe14497
SHA256c29630324d768c6e40b814164f6c2c6f33dd741392edc940cc852e67e1667a57
SHA512f172c38d5d169523c56d5c551749c9b8bf6d1452b0c64666651757f46546ffe8bd445935b88faf16dc381a13a6b12a71934fef6c9fa434ee5974d0d3499d1790
-
Filesize
56KB
MD5c0edb05bd1e26666764757e7d6f6f09b
SHA1330139df4594f4070ada6c89ec3d0a16abe14497
SHA256c29630324d768c6e40b814164f6c2c6f33dd741392edc940cc852e67e1667a57
SHA512f172c38d5d169523c56d5c551749c9b8bf6d1452b0c64666651757f46546ffe8bd445935b88faf16dc381a13a6b12a71934fef6c9fa434ee5974d0d3499d1790
-
Filesize
56KB
MD5c0edb05bd1e26666764757e7d6f6f09b
SHA1330139df4594f4070ada6c89ec3d0a16abe14497
SHA256c29630324d768c6e40b814164f6c2c6f33dd741392edc940cc852e67e1667a57
SHA512f172c38d5d169523c56d5c551749c9b8bf6d1452b0c64666651757f46546ffe8bd445935b88faf16dc381a13a6b12a71934fef6c9fa434ee5974d0d3499d1790
-
Filesize
56KB
MD5c0edb05bd1e26666764757e7d6f6f09b
SHA1330139df4594f4070ada6c89ec3d0a16abe14497
SHA256c29630324d768c6e40b814164f6c2c6f33dd741392edc940cc852e67e1667a57
SHA512f172c38d5d169523c56d5c551749c9b8bf6d1452b0c64666651757f46546ffe8bd445935b88faf16dc381a13a6b12a71934fef6c9fa434ee5974d0d3499d1790
-
Filesize
56KB
MD5c0edb05bd1e26666764757e7d6f6f09b
SHA1330139df4594f4070ada6c89ec3d0a16abe14497
SHA256c29630324d768c6e40b814164f6c2c6f33dd741392edc940cc852e67e1667a57
SHA512f172c38d5d169523c56d5c551749c9b8bf6d1452b0c64666651757f46546ffe8bd445935b88faf16dc381a13a6b12a71934fef6c9fa434ee5974d0d3499d1790
-
Filesize
96KB
MD51242872b9de9fe8b0fa75c19a97aa626
SHA16b6b111d67c4f156b851a2b4a5ba1d578ca2d38b
SHA256e68877f0971799322f31cfb01531d99e303edb981b96767765d5766d75817e0e
SHA512a8ce0cd60f5657567065ab8f569bcb95e6a936f380e7087cf98c37d5e63a71acb79e5cc8e0fc74e8dcca69d1ff34d72761790a9d7260bbff96d2601f3d5b36fc
-
Filesize
96KB
MD51242872b9de9fe8b0fa75c19a97aa626
SHA16b6b111d67c4f156b851a2b4a5ba1d578ca2d38b
SHA256e68877f0971799322f31cfb01531d99e303edb981b96767765d5766d75817e0e
SHA512a8ce0cd60f5657567065ab8f569bcb95e6a936f380e7087cf98c37d5e63a71acb79e5cc8e0fc74e8dcca69d1ff34d72761790a9d7260bbff96d2601f3d5b36fc
-
Filesize
96KB
MD51242872b9de9fe8b0fa75c19a97aa626
SHA16b6b111d67c4f156b851a2b4a5ba1d578ca2d38b
SHA256e68877f0971799322f31cfb01531d99e303edb981b96767765d5766d75817e0e
SHA512a8ce0cd60f5657567065ab8f569bcb95e6a936f380e7087cf98c37d5e63a71acb79e5cc8e0fc74e8dcca69d1ff34d72761790a9d7260bbff96d2601f3d5b36fc
-
Filesize
96KB
MD51242872b9de9fe8b0fa75c19a97aa626
SHA16b6b111d67c4f156b851a2b4a5ba1d578ca2d38b
SHA256e68877f0971799322f31cfb01531d99e303edb981b96767765d5766d75817e0e
SHA512a8ce0cd60f5657567065ab8f569bcb95e6a936f380e7087cf98c37d5e63a71acb79e5cc8e0fc74e8dcca69d1ff34d72761790a9d7260bbff96d2601f3d5b36fc
-
Filesize
40KB
MD536fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
Filesize
40KB
MD536fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
Filesize
5.1MB
MD502c3d242fe142b0eabec69211b34bc55
SHA1ea0a4a6d6078b362f7b3a4ad1505ce49957dc16e
SHA2562a1ed24be7e3859b46ec3ebc316789ead5f12055853f86a9656e04b4bb771842
SHA5120efb08492eaaa2e923beddc21566e98fbbef3a102f9415ff310ec616f5c84fd2ba3a7025b05e01c0bdf37e5e2f64dfd845f9254a376144cc7d827e7577dbb099