Analysis
-
max time kernel
148s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2023 03:38
Static task
static1
General
-
Target
Telesetup.msi
-
Size
90.9MB
-
MD5
b5c67913c8b2b41ca23b7cdda9c77d5d
-
SHA1
4cc23470dd88f05b71677839e577c45ecf115b03
-
SHA256
4222303a43daea00b3cb9515dcb48b60d71a28152da00de9747e9eea850b2da1
-
SHA512
bd555dc2aeb10a1e31c5f745b0cc126d25e9a46b38d4486cc540b55e2bb78ab13987d1747157606eed965b9d569e617bcab0b718053d7e36128e440565932b1c
-
SSDEEP
1572864:tCKawy0JEFm4X+8fXIA9nd+ckiMos0ZhnRfJcnKlujuDZbrkXI90K8geit54ALJ4:tCKRl18vFnx7DPZhngnKlujwbY49z1yI
Malware Config
Signatures
-
Processes:
reg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe -
Modifies Windows Firewall 1 TTPs 3 IoCs
Processes:
netsh.exenetsh.exenetsh.exepid process 3424 netsh.exe 3056 netsh.exe 2292 netsh.exe -
Executes dropped EXE 3 IoCs
Processes:
dac.exeConsoleProxy.exeTelegram.exepid process 2996 dac.exe 4208 ConsoleProxy.exe 1976 Telegram.exe -
Loads dropped DLL 10 IoCs
Processes:
MsiExec.exeMsiExec.exeConsoleProxy.exepid process 3888 MsiExec.exe 3888 MsiExec.exe 3888 MsiExec.exe 3888 MsiExec.exe 3888 MsiExec.exe 3888 MsiExec.exe 2004 MsiExec.exe 2004 MsiExec.exe 4208 ConsoleProxy.exe 4208 ConsoleProxy.exe -
Processes:
resource yara_rule behavioral1/memory/2996-221-0x0000000180000000-0x000000018003E000-memory.dmp upx behavioral1/memory/2996-222-0x0000000180000000-0x000000018003E000-memory.dmp upx behavioral1/memory/2996-224-0x0000000180000000-0x000000018003E000-memory.dmp upx behavioral1/memory/2996-225-0x0000000180000000-0x000000018003E000-memory.dmp upx behavioral1/memory/2996-226-0x0000000180000000-0x000000018003E000-memory.dmp upx behavioral1/memory/2996-237-0x0000000180000000-0x000000018003E000-memory.dmp upx behavioral1/memory/2996-256-0x0000000180000000-0x000000018003E000-memory.dmp upx -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exeConsoleProxy.exedescription ioc process File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: ConsoleProxy.exe File opened (read-only) \??\H: ConsoleProxy.exe File opened (read-only) \??\P: ConsoleProxy.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\G: ConsoleProxy.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\X: ConsoleProxy.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: ConsoleProxy.exe File opened (read-only) \??\R: ConsoleProxy.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: ConsoleProxy.exe File opened (read-only) \??\W: ConsoleProxy.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: ConsoleProxy.exe File opened (read-only) \??\K: ConsoleProxy.exe File opened (read-only) \??\N: ConsoleProxy.exe File opened (read-only) \??\Z: ConsoleProxy.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: ConsoleProxy.exe File opened (read-only) \??\S: ConsoleProxy.exe File opened (read-only) \??\V: ConsoleProxy.exe File opened (read-only) \??\I: ConsoleProxy.exe File opened (read-only) \??\U: ConsoleProxy.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\M: ConsoleProxy.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: ConsoleProxy.exe File opened (read-only) \??\L: msiexec.exe -
Drops file in System32 directory 6 IoCs
Processes:
dac.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_F7F9B7BDCC367A8E3539D28F7D4D4BA2 dac.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_F7F9B7BDCC367A8E3539D28F7D4D4BA2 dac.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7229E30BCFD0992128433D951137A421_F0BB2463DDCCB4B49DC9200CC9E498E9 dac.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7229E30BCFD0992128433D951137A421_F0BB2463DDCCB4B49DC9200CC9E498E9 dac.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7229E30BCFD0992128433D951137A421_76EBFC12D6FD7EE9DD82775C12CF3BD5 dac.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7229E30BCFD0992128433D951137A421_76EBFC12D6FD7EE9DD82775C12CF3BD5 dac.exe -
Drops file in Windows directory 10 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Windows\Installer\e590ecb.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{997F38C3-E68F-4219-8D4D-C234BE733C5E} msiexec.exe File opened for modification C:\Windows\Installer\MSI1843.tmp msiexec.exe File opened for modification C:\Windows\Installer\e590ecb.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI10BF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1208.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\e590ecd.msi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 53 IoCs
Processes:
dac.exemmc.exemmc.exeConsoleProxy.exemsiexec.exemmc.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" dac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie ConsoleProxy.exe Key created \REGISTRY\USER\S-1-5-18_Classes\Local Settings dac.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft ConsoleProxy.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ConsoleProxy.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Settings mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" dac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ConsoleProxy.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Recent File List mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ConsoleProxy.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum ConsoleProxy.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Recent File List mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" dac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ConsoleProxy.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" ConsoleProxy.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ConsoleProxy.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ dac.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" dac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft mmc.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Recent File List mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mmc.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Recent File List mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" dac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Settings mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Recent File List mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mmc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@mmcbase.dll,-14008 = "Folder" mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software ConsoleProxy.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Settings mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" dac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dac.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix dac.exe -
Modifies registry class 23 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\ProductName = "CS-TG-64" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\PackageCode = "170EED13E47890B4A9786EA977ED3682" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\Language = "2052" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\67708036E3027134CBB5C9BE30891990\3C83F799F86E9124D8D42C43EB37C3E5 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\SourceList\PackageName = "Telesetup.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\3C83F799F86E9124D8D42C43EB37C3E5 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\Version = "16777216" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\67708036E3027134CBB5C9BE30891990 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\DeploymentFlags = "3" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\3C83F799F86E9124D8D42C43EB37C3E5\MainFeature msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3C83F799F86E9124D8D42C43EB37C3E5\SourceList\Media\DiskPrompt = "[1]" msiexec.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Telegram.exepid process 1976 Telegram.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
msiexec.exeConsoleProxy.exepid process 208 msiexec.exe 208 msiexec.exe 4208 ConsoleProxy.exe 4208 ConsoleProxy.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 3824 msiexec.exe Token: SeIncreaseQuotaPrivilege 3824 msiexec.exe Token: SeSecurityPrivilege 208 msiexec.exe Token: SeCreateTokenPrivilege 3824 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3824 msiexec.exe Token: SeLockMemoryPrivilege 3824 msiexec.exe Token: SeIncreaseQuotaPrivilege 3824 msiexec.exe Token: SeMachineAccountPrivilege 3824 msiexec.exe Token: SeTcbPrivilege 3824 msiexec.exe Token: SeSecurityPrivilege 3824 msiexec.exe Token: SeTakeOwnershipPrivilege 3824 msiexec.exe Token: SeLoadDriverPrivilege 3824 msiexec.exe Token: SeSystemProfilePrivilege 3824 msiexec.exe Token: SeSystemtimePrivilege 3824 msiexec.exe Token: SeProfSingleProcessPrivilege 3824 msiexec.exe Token: SeIncBasePriorityPrivilege 3824 msiexec.exe Token: SeCreatePagefilePrivilege 3824 msiexec.exe Token: SeCreatePermanentPrivilege 3824 msiexec.exe Token: SeBackupPrivilege 3824 msiexec.exe Token: SeRestorePrivilege 3824 msiexec.exe Token: SeShutdownPrivilege 3824 msiexec.exe Token: SeDebugPrivilege 3824 msiexec.exe Token: SeAuditPrivilege 3824 msiexec.exe Token: SeSystemEnvironmentPrivilege 3824 msiexec.exe Token: SeChangeNotifyPrivilege 3824 msiexec.exe Token: SeRemoteShutdownPrivilege 3824 msiexec.exe Token: SeUndockPrivilege 3824 msiexec.exe Token: SeSyncAgentPrivilege 3824 msiexec.exe Token: SeEnableDelegationPrivilege 3824 msiexec.exe Token: SeManageVolumePrivilege 3824 msiexec.exe Token: SeImpersonatePrivilege 3824 msiexec.exe Token: SeCreateGlobalPrivilege 3824 msiexec.exe Token: SeCreateTokenPrivilege 3824 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3824 msiexec.exe Token: SeLockMemoryPrivilege 3824 msiexec.exe Token: SeIncreaseQuotaPrivilege 3824 msiexec.exe Token: SeMachineAccountPrivilege 3824 msiexec.exe Token: SeTcbPrivilege 3824 msiexec.exe Token: SeSecurityPrivilege 3824 msiexec.exe Token: SeTakeOwnershipPrivilege 3824 msiexec.exe Token: SeLoadDriverPrivilege 3824 msiexec.exe Token: SeSystemProfilePrivilege 3824 msiexec.exe Token: SeSystemtimePrivilege 3824 msiexec.exe Token: SeProfSingleProcessPrivilege 3824 msiexec.exe Token: SeIncBasePriorityPrivilege 3824 msiexec.exe Token: SeCreatePagefilePrivilege 3824 msiexec.exe Token: SeCreatePermanentPrivilege 3824 msiexec.exe Token: SeBackupPrivilege 3824 msiexec.exe Token: SeRestorePrivilege 3824 msiexec.exe Token: SeShutdownPrivilege 3824 msiexec.exe Token: SeDebugPrivilege 3824 msiexec.exe Token: SeAuditPrivilege 3824 msiexec.exe Token: SeSystemEnvironmentPrivilege 3824 msiexec.exe Token: SeChangeNotifyPrivilege 3824 msiexec.exe Token: SeRemoteShutdownPrivilege 3824 msiexec.exe Token: SeUndockPrivilege 3824 msiexec.exe Token: SeSyncAgentPrivilege 3824 msiexec.exe Token: SeEnableDelegationPrivilege 3824 msiexec.exe Token: SeManageVolumePrivilege 3824 msiexec.exe Token: SeImpersonatePrivilege 3824 msiexec.exe Token: SeCreateGlobalPrivilege 3824 msiexec.exe Token: SeCreateTokenPrivilege 3824 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3824 msiexec.exe Token: SeLockMemoryPrivilege 3824 msiexec.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
msiexec.exeTelegram.exepid process 3824 msiexec.exe 3824 msiexec.exe 1976 Telegram.exe 1976 Telegram.exe 1976 Telegram.exe 1976 Telegram.exe 1976 Telegram.exe 1976 Telegram.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
Telegram.exepid process 1976 Telegram.exe 1976 Telegram.exe 1976 Telegram.exe 1976 Telegram.exe 1976 Telegram.exe 1976 Telegram.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
dac.exemmc.exemmc.exemmc.exeConsoleProxy.exeTelegram.exepid process 2996 dac.exe 2996 dac.exe 3800 mmc.exe 3800 mmc.exe 1692 mmc.exe 1692 mmc.exe 956 mmc.exe 956 mmc.exe 4208 ConsoleProxy.exe 1976 Telegram.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
msiexec.exemmc.exemmc.exedac.execmd.exemmc.exeConsoleProxy.execmd.exedescription pid process target process PID 208 wrote to memory of 3888 208 msiexec.exe MsiExec.exe PID 208 wrote to memory of 3888 208 msiexec.exe MsiExec.exe PID 208 wrote to memory of 3888 208 msiexec.exe MsiExec.exe PID 208 wrote to memory of 1528 208 msiexec.exe srtasks.exe PID 208 wrote to memory of 1528 208 msiexec.exe srtasks.exe PID 208 wrote to memory of 2004 208 msiexec.exe MsiExec.exe PID 208 wrote to memory of 2004 208 msiexec.exe MsiExec.exe PID 208 wrote to memory of 2004 208 msiexec.exe MsiExec.exe PID 208 wrote to memory of 2996 208 msiexec.exe dac.exe PID 208 wrote to memory of 2996 208 msiexec.exe dac.exe PID 3800 wrote to memory of 2180 3800 mmc.exe netsh.exe PID 3800 wrote to memory of 2180 3800 mmc.exe netsh.exe PID 1692 wrote to memory of 4912 1692 mmc.exe netsh.exe PID 1692 wrote to memory of 4912 1692 mmc.exe netsh.exe PID 2996 wrote to memory of 4648 2996 dac.exe cmd.exe PID 2996 wrote to memory of 4648 2996 dac.exe cmd.exe PID 4648 wrote to memory of 4468 4648 cmd.exe reg.exe PID 4648 wrote to memory of 4468 4648 cmd.exe reg.exe PID 4648 wrote to memory of 688 4648 cmd.exe reg.exe PID 4648 wrote to memory of 688 4648 cmd.exe reg.exe PID 4648 wrote to memory of 3740 4648 cmd.exe reg.exe PID 4648 wrote to memory of 3740 4648 cmd.exe reg.exe PID 2996 wrote to memory of 3748 2996 dac.exe cmd.exe PID 2996 wrote to memory of 3748 2996 dac.exe cmd.exe PID 956 wrote to memory of 4208 956 mmc.exe ConsoleProxy.exe PID 956 wrote to memory of 4208 956 mmc.exe ConsoleProxy.exe PID 956 wrote to memory of 4208 956 mmc.exe ConsoleProxy.exe PID 4208 wrote to memory of 3424 4208 ConsoleProxy.exe netsh.exe PID 4208 wrote to memory of 3424 4208 ConsoleProxy.exe netsh.exe PID 4208 wrote to memory of 3424 4208 ConsoleProxy.exe netsh.exe PID 2996 wrote to memory of 1804 2996 dac.exe cmd.exe PID 2996 wrote to memory of 1804 2996 dac.exe cmd.exe PID 4208 wrote to memory of 3056 4208 ConsoleProxy.exe netsh.exe PID 4208 wrote to memory of 3056 4208 ConsoleProxy.exe netsh.exe PID 4208 wrote to memory of 3056 4208 ConsoleProxy.exe netsh.exe PID 4208 wrote to memory of 2292 4208 ConsoleProxy.exe netsh.exe PID 4208 wrote to memory of 2292 4208 ConsoleProxy.exe netsh.exe PID 4208 wrote to memory of 2292 4208 ConsoleProxy.exe netsh.exe PID 1804 wrote to memory of 3144 1804 cmd.exe PING.EXE PID 1804 wrote to memory of 3144 1804 cmd.exe PING.EXE PID 4208 wrote to memory of 1600 4208 ConsoleProxy.exe netsh.exe PID 4208 wrote to memory of 1600 4208 ConsoleProxy.exe netsh.exe PID 4208 wrote to memory of 1600 4208 ConsoleProxy.exe netsh.exe PID 4208 wrote to memory of 4608 4208 ConsoleProxy.exe netsh.exe PID 4208 wrote to memory of 4608 4208 ConsoleProxy.exe netsh.exe PID 4208 wrote to memory of 4608 4208 ConsoleProxy.exe netsh.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Telesetup.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3824
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7B855E3061F61B2690A4C0C7F67A827C C2⤵
- Loads dropped DLL
PID:3888 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:1528
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 270BC0B46EC75486FB2C548012437B9B2⤵
- Loads dropped DLL
PID:2004 -
C:\Users\Admin\AppData\Roaming\CS-TG-64\tdata\emoji\dac.exe"C:\Users\Admin\AppData\Roaming\CS-TG-64\tdata\emoji\dac.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Roaming\2h276.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t reg_dword /d 0 /F4⤵
- UAC bypass
PID:4468 -
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t reg_dword /d 0 /F4⤵
- UAC bypass
PID:688 -
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v PromptOnSecureDesktop /t reg_dword /d 0 /F4⤵
- UAC bypass
PID:3740 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /b C:\Users\Public\Pictures\8e8tF\74L6N@y\v + C:\Users\Public\Pictures\8e8tF\74L6N@y\b C:\Users\Public\Pictures\8e8tF\74L6N@y\openconsolewpcap.dll3⤵PID:3748
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Roaming\CS-TG-64\tdata\emoji\dac.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\system32\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:3144
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:4116
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set address 以太网 static 1.0.0.2 255.255.255.0 1.0.0.1 12⤵PID:2180
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set address \"WLAN\" static 1.0.0.3 255.255.255.0 1.0.0.1 12⤵PID:4912
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Public\Pictures\8e8tF\74L6N@y\ConsoleProxy.exe"C:\Users\Public\Pictures\8e8tF\74L6N@y\ConsoleProxy.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="" program="C:\Users\Public\Pictures\8e8tF\74L6N@y\ConsoleProxy.exe"3⤵
- Modifies Windows Firewall
PID:3424 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="" dir=in action=allow program="C:\Users\Public\Pictures\8e8tF\74L6N@y\ConsoleProxy.exe" description=""3⤵
- Modifies Windows Firewall
PID:3056 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="" dir=out action=allow program="C:\Users\Public\Pictures\8e8tF\74L6N@y\ConsoleProxy.exe" description=""3⤵
- Modifies Windows Firewall
PID:2292 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set address \"ÒÔÌ«Íø\" dhcp3⤵PID:1600
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set address \"WLAN\" dhcp3⤵PID:4608
-
C:\Users\Admin\AppData\Roaming\CS-TG-64\Telegram.exe"C:\Users\Admin\AppData\Roaming\CS-TG-64\Telegram.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1976
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5f41431617bd93ffb92266d68e502ba60
SHA1335c92679af418969be7765e4270a79243735136
SHA25698ba932d2f57eeee2d4204313160178438a92a27b674fd5846916dd014a7481e
SHA512cf2d168a407d431cd5505b2794fa979dca7f81c50abe37f1e57455eb0d8f816d272b4cbb05741ebe6e43b9240cbcee5c10de375e14bd1d37937e2b0748af1ab6
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
392B
MD530d6eb22d6aeec10347239b17b023bf4
SHA1e2a6f86d66c699f6e0ff1ac4e140af4a2a4637d1
SHA256659df6b190a0b92fc34e3a4457b4a8d11a26a4caf55de64dfe79eb1276181f08
SHA512500872c3f2f3f801ec51717690873194675cb7f32cc4a862c09d90c18638d364d49b0e04c32323f52734e5c806e3503a63ac755c7019d762786a72840123df76
-
Filesize
126.7MB
MD5b207b753976baf91f4a1cfb6a195fd9d
SHA14c7a1cf450d6a96f6f9321a6407cd2d6dd50abb9
SHA25696fbe1f018b68dc7be9b901eace3e9de00f8b6939af49153b8ebd88d868404d8
SHA5125e8d9b3a4b78dbf495f14f0136cd891ee4f2fa6bcb4a051b73ba0f1acced17ac1abfceb94748cd10ba759c467be09b107ce1493679791715d05b65e13c5241f1
-
Filesize
126.7MB
MD5b207b753976baf91f4a1cfb6a195fd9d
SHA14c7a1cf450d6a96f6f9321a6407cd2d6dd50abb9
SHA25696fbe1f018b68dc7be9b901eace3e9de00f8b6939af49153b8ebd88d868404d8
SHA5125e8d9b3a4b78dbf495f14f0136cd891ee4f2fa6bcb4a051b73ba0f1acced17ac1abfceb94748cd10ba759c467be09b107ce1493679791715d05b65e13c5241f1
-
Filesize
140B
MD554291af0f142fa44542dd9b923c62599
SHA1e4003f0b6f4647ec0f9b5aee43fd194657b0c272
SHA256725450027a36383781222d1eb19461bebae3d01c0ac16ec86e082e0aaec69fc1
SHA512f772fe404af8da115ec6773c68ea1946d0b9917ccb1d50497b365f6d7ca8595fbf0ed52b901b68d4f161e76895789d71b6437a9259b66d519db266468807cc3d
-
Filesize
521KB
MD5f927b4fe63715ccb8b4801ecc2b0d455
SHA1613811df57a5b731dc2252d6fdd8549269efbe01
SHA2563b3236943b2c5f46ce0a483b1a1e303ae4bb270ef4fe6e44e2d61fa64f9a4f80
SHA51232fbd874d190031d198a827338f8a15abc4ce9ca05f3cc4ff83d3295823719e6e922009f1fddb7241ea9ab58ea6f312ee9cd913df496deb2390622784e87d8d7
-
Filesize
648KB
MD5a9d5fcb4edadcf53399f1c5f9ae5d9ae
SHA1210377216a6869a40655c75f47a392b4600f6f44
SHA256a917a5dcf7e329dfb760ece674de96a01ab5e2f51751de95d032c4bb5e2a1f0e
SHA5127a47a64e1dacc0b3c621b13d9d0cc60bf98d58d2a93add9beb87ce476cce296029f028feea1970bfacbbbaae6b143e24f8245ac32bfdf6cee65089b568bf6ec4
-
Filesize
648KB
MD528c7a651b3411fff0be43767457541f3
SHA164cc0c0474f72deb03459a47e91e6f1b5cc5a867
SHA2560f1d63de6e20766acc95159db99724d5babbabbb9adb1506dc1337163ec61338
SHA512bc3a5492c72293bf0dcfa1883e586e17dd16afce06817d466c6672e9ac6c04a1c74bddaedd0753b1ddfff20bd88ab36d055643369416725be95bfb7a72f37070
-
Filesize
648KB
MD58bae1c34285e15fae092ef5afb4bdb9a
SHA1ce7098ffafa1a0150de43e390f4489bd0a35bfd1
SHA25648d4c29de7c7e13c65856da6963a20f41f9001dab80bb72b68d61cab7fee1d33
SHA512927581328052659a0e65df5499b5e16624145ff61512255c64770194384d7ea5b469c3b1301e63146de7b5fc01bf6acf6e81e567806cdfed3a4b306b98e18ca4
-
Filesize
648KB
MD528dc94bc2f0fd3ce3a70f5207ec35bde
SHA196cd2a1b1237270b857b72ac0b4f90c7111d0099
SHA2560b2cb32c6eda76598f5ef427a7ef9309bf3d6c2cb206ca1e37f164636ff25bc3
SHA5128eea266f16f517bbb2908738c5d027375b3452bae4032f187094e56c6830c05487acfb781182e02aa9dbdcb9c0e8d58fb28b5d7f9aca9ed7000488cbe0029fe0
-
Filesize
648KB
MD5fa7909ed2d3e1d9a593ab5fa0d66958b
SHA18b1baf1bbf8ecb8d34fd155746f84e6887665dc6
SHA2568935d03aa7c5c253c92ebf8fac42aaac5f0aa04b531ad3196954e45ee2b3a389
SHA512d43a6b169a6e2c60e63e71e3aefd05f8e8c4b691672536943ed81dc342eff372aab51e8b25e6e17d4dabe9166f3520850bef8cc03604d003c0ec01b382691748
-
Filesize
648KB
MD57076344b06be17207948f79de741e3e7
SHA1338e2311f944087807be80dd2fb2e8584e9bdd65
SHA25643c24b430152745f6fb61fd27d2598489e21d60ae2f0e0c89bb264f484afe899
SHA5129a518ad991a3263117c122b7cff14e6191ee91a40c5daa75e77fd854edbe7dac2c46a4a80fe0d91d5fda1ebf9d4ef0091b3d543c8abb52900584e0f0bdabc9dd
-
Filesize
648KB
MD5677eaf4328bfa07263b0518d7a538c68
SHA12daabe657291c7088e45d09125c10247f52b81e6
SHA2569522b74b926f4c3989e962f815ff7f1cb93e26f68522457e4f2e3dede4a64aeb
SHA51287b5eb241f7f854ffc2b49d83b3c40be73693dd1a6c900d2d07c047f8e689d9fc44d6198a168372a4df53532d910d045c4141b321a5f2b33e36081399362fa4b
-
Filesize
9.0MB
MD5be5628882d28ba1bdb9850dc4b7e7fa1
SHA16d37839c4b8ded05c0e8108696e1b794de59a2a8
SHA256def949e97a2a2d2e504f7c85a27a6f2fd44d3a898357398f4aaa7eb033dfb287
SHA51216037fd6ee2bb26e1014e9e69a2ee5d7290ebe5021ed1eedaa5908b73c39cc2ba6f66c553be9a39163b8831e8f519b10009e71fb94ce392c7229541192aa1c39
-
Filesize
9.0MB
MD5be5628882d28ba1bdb9850dc4b7e7fa1
SHA16d37839c4b8ded05c0e8108696e1b794de59a2a8
SHA256def949e97a2a2d2e504f7c85a27a6f2fd44d3a898357398f4aaa7eb033dfb287
SHA51216037fd6ee2bb26e1014e9e69a2ee5d7290ebe5021ed1eedaa5908b73c39cc2ba6f66c553be9a39163b8831e8f519b10009e71fb94ce392c7229541192aa1c39
-
Filesize
9.0MB
MD5be5628882d28ba1bdb9850dc4b7e7fa1
SHA16d37839c4b8ded05c0e8108696e1b794de59a2a8
SHA256def949e97a2a2d2e504f7c85a27a6f2fd44d3a898357398f4aaa7eb033dfb287
SHA51216037fd6ee2bb26e1014e9e69a2ee5d7290ebe5021ed1eedaa5908b73c39cc2ba6f66c553be9a39163b8831e8f519b10009e71fb94ce392c7229541192aa1c39
-
Filesize
9.0MB
MD5be5628882d28ba1bdb9850dc4b7e7fa1
SHA16d37839c4b8ded05c0e8108696e1b794de59a2a8
SHA256def949e97a2a2d2e504f7c85a27a6f2fd44d3a898357398f4aaa7eb033dfb287
SHA51216037fd6ee2bb26e1014e9e69a2ee5d7290ebe5021ed1eedaa5908b73c39cc2ba6f66c553be9a39163b8831e8f519b10009e71fb94ce392c7229541192aa1c39
-
Filesize
9.0MB
MD5be5628882d28ba1bdb9850dc4b7e7fa1
SHA16d37839c4b8ded05c0e8108696e1b794de59a2a8
SHA256def949e97a2a2d2e504f7c85a27a6f2fd44d3a898357398f4aaa7eb033dfb287
SHA51216037fd6ee2bb26e1014e9e69a2ee5d7290ebe5021ed1eedaa5908b73c39cc2ba6f66c553be9a39163b8831e8f519b10009e71fb94ce392c7229541192aa1c39
-
Filesize
9.0MB
MD5be5628882d28ba1bdb9850dc4b7e7fa1
SHA16d37839c4b8ded05c0e8108696e1b794de59a2a8
SHA256def949e97a2a2d2e504f7c85a27a6f2fd44d3a898357398f4aaa7eb033dfb287
SHA51216037fd6ee2bb26e1014e9e69a2ee5d7290ebe5021ed1eedaa5908b73c39cc2ba6f66c553be9a39163b8831e8f519b10009e71fb94ce392c7229541192aa1c39
-
Filesize
9.0MB
MD5be5628882d28ba1bdb9850dc4b7e7fa1
SHA16d37839c4b8ded05c0e8108696e1b794de59a2a8
SHA256def949e97a2a2d2e504f7c85a27a6f2fd44d3a898357398f4aaa7eb033dfb287
SHA51216037fd6ee2bb26e1014e9e69a2ee5d7290ebe5021ed1eedaa5908b73c39cc2ba6f66c553be9a39163b8831e8f519b10009e71fb94ce392c7229541192aa1c39
-
Filesize
1.1MB
MD5e0d699a63ecfb007d72bf4a158a1dea6
SHA115bae81866f8dc89d256bf6aa6fe29e6ae1099f2
SHA25689e572bbce672b25b93c9f95b4ae3e1295da308f79c7ed0342ad40e184b5a6e4
SHA512a397a0a64c5fe734e98ef911d929897f0fa6b4d272956d0c5eca170a7e226783b52f4eb7871bd73bbf6517a98c6ba5e93608b1f8d807b320ab97e8555719ae94
-
Filesize
1.1MB
MD5bb05e538eb0fd043124c1dbd7a54f6a0
SHA1c44c550a754d87880e3413cfa0cb3bcbe7523edb
SHA2560255d50c8fc8f036794a3cebdf2937a94821c6cf07caee1be90cf11fbf4f4c47
SHA512ff6a9b0862307ebe85d72a62eefc09054290995c373f3c5b248bb6f04a6246d68160f6227873bc11649b894cd011f263c0d258796dffa09afb31412d78a8be69
-
Filesize
1.1MB
MD592cf692ec1350a03271cf7241d696852
SHA17af420c4564b67485bb6ea043a242f366fedef12
SHA256ebd8b64b606c941b14c0b2a20d308672ecb0bae4e7bab5bf3180c820276f1355
SHA512f3955b98ecef489e35274f7eef8d37c0650c078e651ac167c3ced8b0109536e0b3479cbe65d5c4b71aba0b0a8cccd531e6448740f638729159c70455d104a851
-
Filesize
1.1MB
MD5cf672c2191ad9aabd4c380a95bf426e0
SHA1e0c8d175e98483242f61efcb9885a8369051a9e8
SHA25688e08b41b3470b4c1438f95d8e72164c5d8d9471f956d4545489e4f3ebd683d2
SHA512ec68dd9a0d7292d9a570500d3e119db2056869814f0195f2d0b69d043a50a6031a0b122c016229a92015d2b3f34cba8f9939888fb469f1f73592f004d59af351
-
Filesize
1.1MB
MD5eeea43d3974ad7c693bc76ecd2f687da
SHA1939720d7aaf86ca815d75f08bea4cdb5d588f4bd
SHA25664caf40aea1b4605b064f7aea7bce2eb745ec6ff1bea5621fc8d0e401e804f4f
SHA51215a2396e3b06253add6b9e117540e65a63a1acc6c48b6a52c1f9b8929aacba3addb8e11bb879b3b7d8a75278c626886877cbe0ae4ae0ba498e1b4c2c76ba4618
-
Filesize
1.1MB
MD530692e87e6b0f97e6277ede297df9e84
SHA19184fe68950608bf81e706bb93f8f5b6dec26030
SHA256b9e6942fcb22fd19400980b3fe0ce66cb1b90cae0f0a3d9e263f84265c6cb371
SHA51207c7bd39596ca10ad8e3496eed24ed6b843a1dad3ef758c0a2a12993207b281e218f88dd71a8b73e7b78fd1c0c0686864a8cb79f5f1181e5bab41d5edf927b59
-
Filesize
22.7MB
MD540372573612978998c563496c7f0ded1
SHA1a9cd1668b3d706a1b53620e49a920a27c5d58be5
SHA25667248edec879e8c9872bd3cbf5978e485eb17595b50636ccb176ef1231babc05
SHA512dc4c9173310d37adab320dc780d35aa104c85b045f01a7e588adb3960d030a60c948d6efc38e9c0cad9447a4303a74bacb8475d85eed32809f1056efafa1a6e0
-
Filesize
22.7MB
MD540372573612978998c563496c7f0ded1
SHA1a9cd1668b3d706a1b53620e49a920a27c5d58be5
SHA25667248edec879e8c9872bd3cbf5978e485eb17595b50636ccb176ef1231babc05
SHA512dc4c9173310d37adab320dc780d35aa104c85b045f01a7e588adb3960d030a60c948d6efc38e9c0cad9447a4303a74bacb8475d85eed32809f1056efafa1a6e0
-
Filesize
1KB
MD544172c590a8ca9599229aa0c38baba53
SHA1fb599d9422bd8c01b56474c7dc5b1fb6c01d88a4
SHA2562f7d3c137ca7f6adddc12c601484f05b001889ff1a56812efcb2f0daf742b83f
SHA512450279af0a36da24dc0ab231ce52fdae7c0fd434ed621864fde9db3dbb83c1aaa47ff8cf5cedd7980b1989be01ca4c7429e82543826be1d51b8404be0a52d409
-
Filesize
404B
MD5874b930b4c2fddc8043f59113c044a14
SHA175b14a96fe1194f27913a096e484283b172b1749
SHA256f4f666f4b831e84710983b0e9e905e87342b669f61109fd693688d89c12309d8
SHA512f4b0337fba5c5f4d7e7a02aa5d4538334edd38f5df179e4f1701fa2f1c4d3d856a074fa55ea724c4e2a6c5a1ac1dbfc7e9966c814475c7cd2c65cd44fca14621
-
Filesize
2KB
MD5cc850fd9abce3912c944d77d8955ebc9
SHA171e699b4b680aad0bc339a6511afc75ebb898064
SHA256e98e0cc330528886e469d795e74a240693968d6a88f3de214878d8f5b08d4bad
SHA512a8d5aad5fe365d9ea261636956952f705353833456a6cf9dbb4b88d87bbdb2fd52823dad9e77932af8615f2a3e7a1c1c1bacdb5cb00e65affb2644ee3f2def80
-
Filesize
8B
MD502fcd3a4e0f4bef1016affcce43facfe
SHA17aabd850de5437a3c468eee9c04bed4beb775279
SHA256af85e9ba6adee8fc04b413d9e865e49268e9b5f6f61557ab17d0c8c1294e1666
SHA5120d69295f1f9585bac640cb6b2277e6d820778e71f35df80296298799365fff73ede43c7e1b6bb07da7c22d73541b5de3f5ea087b83a64fd08792d4368cbd7bb1
-
Filesize
904KB
MD507664d67b56857133ce91e0ede047ec6
SHA1c83dd9f00278e567f23b918791e2f1ba1b025c8b
SHA256effe2e868cb9f885a1f91044be10eca56057f0fd2fea43f0fc4ad349e344c15f
SHA512610b68bfc4acba3307b9ae106b388777040d024cb6ce5a3cee92462ab0d20986d1bf1a0ab9a827fe45fc48442b5e0c771329ac47e6ebacd4d9d793cf81fa036d
-
Filesize
904KB
MD507664d67b56857133ce91e0ede047ec6
SHA1c83dd9f00278e567f23b918791e2f1ba1b025c8b
SHA256effe2e868cb9f885a1f91044be10eca56057f0fd2fea43f0fc4ad349e344c15f
SHA512610b68bfc4acba3307b9ae106b388777040d024cb6ce5a3cee92462ab0d20986d1bf1a0ab9a827fe45fc48442b5e0c771329ac47e6ebacd4d9d793cf81fa036d
-
Filesize
156KB
MD593e286150f382fc83cbc081ed7a5c941
SHA14ed0a9260103da9ff9a40e3e9a96f4f0ecd14f4a
SHA256ddfc87b471eba9a149b15f2bd24509e6feabe158baaed15fc81c3a2fa930fee4
SHA51283c9e724494e194182d8f7f640adf4711e19d054273c42ad098209ff3f5668f1a6df5ed61ed7e9637e78984b73e548485ee15bea4e3203a441bddee4ff1fe80c
-
Filesize
102KB
MD5ba1a207331df76488a44daa42ff88436
SHA1915901b1685aca2dceef1a88ba1edfd25b93235d
SHA2560f5fb4f08ac2c40771e68b62a059843653cd7c892a61208efec5390f7ce093d6
SHA5123898fe097794725f27fcd0aa68491ed60be3f0c36aa859a0f0e65fb0e6b88686f899c320965c944383cd9d18e2e447959d98d53f7d8e587bf32407f1b50b3fa6
-
Filesize
126KB
MD575601eb6b85df77b3b8328e524cdd8be
SHA158e732acec0c0e65370030fc61e6577a2cc0d4af
SHA256530010b5cb8a82bae6e244bca0a1a5202ece0cf59c83f7434af77b2a8ed32a84
SHA512cc01c13b7926d31354a90db66b317c02fb4e155785f4c27eee24fdecdda4b5d18cdaf09581d4e54f0d10169708e4c2f904144a669cb5f4019146e19acef3f982
-
Filesize
126KB
MD575601eb6b85df77b3b8328e524cdd8be
SHA158e732acec0c0e65370030fc61e6577a2cc0d4af
SHA256530010b5cb8a82bae6e244bca0a1a5202ece0cf59c83f7434af77b2a8ed32a84
SHA512cc01c13b7926d31354a90db66b317c02fb4e155785f4c27eee24fdecdda4b5d18cdaf09581d4e54f0d10169708e4c2f904144a669cb5f4019146e19acef3f982
-
Filesize
204KB
MD55728a6ddf1940b1935ad600d0b9270c1
SHA1c3a9346461aac62e7ae42e127ea2224672a844e6
SHA256ceb099b8b8ca6ef29544b392c0c68436cb4b4b5265c1f4b3a86917a389698456
SHA5125532baa06f5a0b54c9d57bdd67fda9d209719a6080e90b9196d55aa6c9eed9e461d5fdd24773b076ba29ecb6e5de39a2fec7a449ab95cf449fbe55cd9f4f8528
-
Filesize
204KB
MD55728a6ddf1940b1935ad600d0b9270c1
SHA1c3a9346461aac62e7ae42e127ea2224672a844e6
SHA256ceb099b8b8ca6ef29544b392c0c68436cb4b4b5265c1f4b3a86917a389698456
SHA5125532baa06f5a0b54c9d57bdd67fda9d209719a6080e90b9196d55aa6c9eed9e461d5fdd24773b076ba29ecb6e5de39a2fec7a449ab95cf449fbe55cd9f4f8528
-
Filesize
102KB
MD51292e185616078ca29a3868dfbb878f2
SHA10e2a46913f2156efcc4fe30d759a3cbad582eedc
SHA2565dc6e7469bd2027598794a93c885233b460c2d8eb216536bc74962ae79d4a975
SHA51294bc45e84a37a35bcaeea146dc130f1d9ab5343c118fce13955f89e27c16fc8b11c586664f366eb751a59fae9d31be4f77d81c3f37e787f835d27b417c0e686c
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
90.9MB
MD5b5c67913c8b2b41ca23b7cdda9c77d5d
SHA14cc23470dd88f05b71677839e577c45ecf115b03
SHA2564222303a43daea00b3cb9515dcb48b60d71a28152da00de9747e9eea850b2da1
SHA512bd555dc2aeb10a1e31c5f745b0cc126d25e9a46b38d4486cc540b55e2bb78ab13987d1747157606eed965b9d569e617bcab0b718053d7e36128e440565932b1c
-
Filesize
23.0MB
MD53f096bd88041efd6c3be7cf53c94c6de
SHA1751830c1bcf85939044d7ae09653140ed731ba85
SHA256fcb0a062a1a944c20d04664e335a2de0620516dd44f2ac0a2d327a642ec7cba5
SHA512708c0e6216b4963ec22bbbeadb8432938dd9f106fdc86627170186e1293d912dcd8e94e1c9668f8944da9fa09c3954e218a9cf8edc31ab3a6316fac5ce2439f6
-
\??\Volume{e5d54008-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{b1dc2415-688d-4bbb-81e6-019800fb607c}_OnDiskSnapshotProp
Filesize5KB
MD51c901c7a0ff4fc84d72dd5f3aea1600e
SHA1db02b231a82b64e5fb5a0b9730cf72399e3dac77
SHA256640b7497aab974e46094883a1833ea34b8f40f0c22d9b1dad3f763fb845b4658
SHA512301bd774723ed48c0da9abf975d3855560ffe501d4eeeef1972fcf2a8fd2514af7b369c24636d00830a68f5e6990ae0903a08d63be0e60cb1d3c7dd440a03c57