Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
KMS_VL_ALL_AIO.cmd
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
KMS_VL_ALL_AIO.cmd
Resource
win10v2004-20240709-en
General
-
Target
KMS_VL_ALL_AIO.cmd
-
Size
305KB
-
MD5
33f59b72aaa2d7257384f15e5fd9a536
-
SHA1
f2b980813fc36e39bfa45e14bf87ec18368a3cf4
-
SHA256
9a1ceb9bf93c1a7c920105b55755ea8d773f24989a0a0179d5d9f5a891e9d37a
-
SHA512
f71e0a7da3f4d4d41519be05eb5e3aaa18e6502087c2f30351c7498a297493945a4d63010912edc6ba62f3a0a211419b62cce1a2e51a9e3628f34392d6a630fc
-
SSDEEP
6144:YTJ9JzFmdIc8dGT6SLCc6Ekr6gIeQ6TsHjcqBD+N8H5:yJ9JzoIcfN6EkrzISTsHAqN26
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 16 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\GlobalFlag = "256" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\KMS_Emulation = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\VerifierDebug = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\VerifierFlags = "2147483648" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\KMS_ActivationInterval = "43200" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\KMS_RenewalInterval = "43200" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\KMS_HWID = "4187226795851251830" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\VerifierDlls = "SppExtComObjHook.dll" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe reg.exe -
Loads dropped DLL 1 IoCs
pid Process 1816 Process not Found -
pid Process 2752 powershell.exe 4796 powershell.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\SppExtComObjHook.dll powershell.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3036 sc.exe 1488 sc.exe 3048 sc.exe 2560 sc.exe 4324 sc.exe -
Modifies registry key 1 TTPs 38 IoCs
pid Process 4820 reg.exe 2264 reg.exe 4188 reg.exe 4692 reg.exe 4336 reg.exe 1988 reg.exe 1676 reg.exe 4056 reg.exe 3620 reg.exe 2952 reg.exe 1752 reg.exe 3928 reg.exe 2832 reg.exe 2936 reg.exe 3620 reg.exe 1652 reg.exe 1828 reg.exe 3092 reg.exe 2488 reg.exe 3588 reg.exe 4664 reg.exe 2820 reg.exe 3484 reg.exe 3200 reg.exe 416 reg.exe 896 reg.exe 1580 reg.exe 4908 reg.exe 2324 reg.exe 392 reg.exe 4980 reg.exe 1492 reg.exe 2676 reg.exe 4672 reg.exe 1864 reg.exe 1752 reg.exe 1496 reg.exe 4412 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4872 powershell.exe 4872 powershell.exe 4596 powershell.exe 4596 powershell.exe 4796 powershell.exe 4796 powershell.exe 2752 powershell.exe 2752 powershell.exe 2752 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4620 WMIC.exe Token: SeSecurityPrivilege 4620 WMIC.exe Token: SeTakeOwnershipPrivilege 4620 WMIC.exe Token: SeLoadDriverPrivilege 4620 WMIC.exe Token: SeSystemProfilePrivilege 4620 WMIC.exe Token: SeSystemtimePrivilege 4620 WMIC.exe Token: SeProfSingleProcessPrivilege 4620 WMIC.exe Token: SeIncBasePriorityPrivilege 4620 WMIC.exe Token: SeCreatePagefilePrivilege 4620 WMIC.exe Token: SeBackupPrivilege 4620 WMIC.exe Token: SeRestorePrivilege 4620 WMIC.exe Token: SeShutdownPrivilege 4620 WMIC.exe Token: SeDebugPrivilege 4620 WMIC.exe Token: SeSystemEnvironmentPrivilege 4620 WMIC.exe Token: SeRemoteShutdownPrivilege 4620 WMIC.exe Token: SeUndockPrivilege 4620 WMIC.exe Token: SeManageVolumePrivilege 4620 WMIC.exe Token: 33 4620 WMIC.exe Token: 34 4620 WMIC.exe Token: 35 4620 WMIC.exe Token: 36 4620 WMIC.exe Token: SeIncreaseQuotaPrivilege 4620 WMIC.exe Token: SeSecurityPrivilege 4620 WMIC.exe Token: SeTakeOwnershipPrivilege 4620 WMIC.exe Token: SeLoadDriverPrivilege 4620 WMIC.exe Token: SeSystemProfilePrivilege 4620 WMIC.exe Token: SeSystemtimePrivilege 4620 WMIC.exe Token: SeProfSingleProcessPrivilege 4620 WMIC.exe Token: SeIncBasePriorityPrivilege 4620 WMIC.exe Token: SeCreatePagefilePrivilege 4620 WMIC.exe Token: SeBackupPrivilege 4620 WMIC.exe Token: SeRestorePrivilege 4620 WMIC.exe Token: SeShutdownPrivilege 4620 WMIC.exe Token: SeDebugPrivilege 4620 WMIC.exe Token: SeSystemEnvironmentPrivilege 4620 WMIC.exe Token: SeRemoteShutdownPrivilege 4620 WMIC.exe Token: SeUndockPrivilege 4620 WMIC.exe Token: SeManageVolumePrivilege 4620 WMIC.exe Token: 33 4620 WMIC.exe Token: 34 4620 WMIC.exe Token: 35 4620 WMIC.exe Token: 36 4620 WMIC.exe Token: SeDebugPrivilege 4872 powershell.exe Token: SeDebugPrivilege 4596 powershell.exe Token: SeIncreaseQuotaPrivilege 2752 WMIC.exe Token: SeSecurityPrivilege 2752 WMIC.exe Token: SeTakeOwnershipPrivilege 2752 WMIC.exe Token: SeLoadDriverPrivilege 2752 WMIC.exe Token: SeSystemProfilePrivilege 2752 WMIC.exe Token: SeSystemtimePrivilege 2752 WMIC.exe Token: SeProfSingleProcessPrivilege 2752 WMIC.exe Token: SeIncBasePriorityPrivilege 2752 WMIC.exe Token: SeCreatePagefilePrivilege 2752 WMIC.exe Token: SeBackupPrivilege 2752 WMIC.exe Token: SeRestorePrivilege 2752 WMIC.exe Token: SeShutdownPrivilege 2752 WMIC.exe Token: SeDebugPrivilege 2752 WMIC.exe Token: SeSystemEnvironmentPrivilege 2752 WMIC.exe Token: SeRemoteShutdownPrivilege 2752 WMIC.exe Token: SeUndockPrivilege 2752 WMIC.exe Token: SeManageVolumePrivilege 2752 WMIC.exe Token: 33 2752 WMIC.exe Token: 34 2752 WMIC.exe Token: 35 2752 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3088 wrote to memory of 1880 3088 cmd.exe 87 PID 3088 wrote to memory of 1880 3088 cmd.exe 87 PID 3088 wrote to memory of 1788 3088 cmd.exe 88 PID 3088 wrote to memory of 1788 3088 cmd.exe 88 PID 3088 wrote to memory of 896 3088 cmd.exe 89 PID 3088 wrote to memory of 896 3088 cmd.exe 89 PID 3088 wrote to memory of 1132 3088 cmd.exe 90 PID 3088 wrote to memory of 1132 3088 cmd.exe 90 PID 3088 wrote to memory of 4620 3088 cmd.exe 91 PID 3088 wrote to memory of 4620 3088 cmd.exe 91 PID 3088 wrote to memory of 1808 3088 cmd.exe 92 PID 3088 wrote to memory of 1808 3088 cmd.exe 92 PID 3088 wrote to memory of 4872 3088 cmd.exe 94 PID 3088 wrote to memory of 4872 3088 cmd.exe 94 PID 3088 wrote to memory of 3436 3088 cmd.exe 95 PID 3088 wrote to memory of 3436 3088 cmd.exe 95 PID 3088 wrote to memory of 1900 3088 cmd.exe 97 PID 3088 wrote to memory of 1900 3088 cmd.exe 97 PID 3088 wrote to memory of 2112 3088 cmd.exe 98 PID 3088 wrote to memory of 2112 3088 cmd.exe 98 PID 2112 wrote to memory of 4812 2112 cmd.exe 99 PID 2112 wrote to memory of 4812 2112 cmd.exe 99 PID 3088 wrote to memory of 2724 3088 cmd.exe 100 PID 3088 wrote to memory of 2724 3088 cmd.exe 100 PID 3088 wrote to memory of 1640 3088 cmd.exe 101 PID 3088 wrote to memory of 1640 3088 cmd.exe 101 PID 1640 wrote to memory of 1524 1640 cmd.exe 102 PID 1640 wrote to memory of 1524 1640 cmd.exe 102 PID 3088 wrote to memory of 4512 3088 cmd.exe 103 PID 3088 wrote to memory of 4512 3088 cmd.exe 103 PID 3088 wrote to memory of 2104 3088 cmd.exe 104 PID 3088 wrote to memory of 2104 3088 cmd.exe 104 PID 3088 wrote to memory of 2268 3088 cmd.exe 105 PID 3088 wrote to memory of 2268 3088 cmd.exe 105 PID 3088 wrote to memory of 2348 3088 cmd.exe 106 PID 3088 wrote to memory of 2348 3088 cmd.exe 106 PID 3088 wrote to memory of 3628 3088 cmd.exe 107 PID 3088 wrote to memory of 3628 3088 cmd.exe 107 PID 3088 wrote to memory of 2132 3088 cmd.exe 108 PID 3088 wrote to memory of 2132 3088 cmd.exe 108 PID 3088 wrote to memory of 4576 3088 cmd.exe 109 PID 3088 wrote to memory of 4576 3088 cmd.exe 109 PID 3088 wrote to memory of 3036 3088 cmd.exe 110 PID 3088 wrote to memory of 3036 3088 cmd.exe 110 PID 3088 wrote to memory of 4688 3088 cmd.exe 111 PID 3088 wrote to memory of 4688 3088 cmd.exe 111 PID 3088 wrote to memory of 3904 3088 cmd.exe 112 PID 3088 wrote to memory of 3904 3088 cmd.exe 112 PID 3088 wrote to memory of 1068 3088 cmd.exe 113 PID 3088 wrote to memory of 1068 3088 cmd.exe 113 PID 3088 wrote to memory of 1752 3088 cmd.exe 114 PID 3088 wrote to memory of 1752 3088 cmd.exe 114 PID 3088 wrote to memory of 392 3088 cmd.exe 115 PID 3088 wrote to memory of 392 3088 cmd.exe 115 PID 3088 wrote to memory of 2872 3088 cmd.exe 116 PID 3088 wrote to memory of 2872 3088 cmd.exe 116 PID 3088 wrote to memory of 4772 3088 cmd.exe 117 PID 3088 wrote to memory of 4772 3088 cmd.exe 117 PID 3088 wrote to memory of 1680 3088 cmd.exe 118 PID 3088 wrote to memory of 1680 3088 cmd.exe 118 PID 3088 wrote to memory of 3928 3088 cmd.exe 119 PID 3088 wrote to memory of 3928 3088 cmd.exe 119 PID 3088 wrote to memory of 3416 3088 cmd.exe 120 PID 3088 wrote to memory of 3416 3088 cmd.exe 120
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\KMS_VL_ALL_AIO.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\System32\cmd.execmd /v:on /c echo(^!param^!2⤵PID:1880
-
-
C:\Windows\System32\findstr.exefindstr /R "[| ` ~ ! @ % \^ & ( ) \[ \] { } + = ; ' , |]*^"2⤵PID:1788
-
-
C:\Windows\System32\reg.exereg query HKLM\SYSTEM\CurrentControlSet\Services\WinMgmt /v Start2⤵
- Modifies registry key
PID:896
-
-
C:\Windows\System32\find.exefind /i "0x4"2⤵PID:1132
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_ComputerSystem get CreationClassName /value2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Windows\System32\find.exefind /i "ComputerSystem"2⤵PID:1808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -c $ExecutionContext.SessionState.LanguageMode2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
C:\Windows\System32\find.exefind /i "Full"2⤵PID:3436
-
-
C:\Windows\System32\reg.exereg query HKU\S-1-5-192⤵PID:1900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop2⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\System32\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop3⤵PID:4812
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ver2⤵PID:2724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v UBR 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\System32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v UBR3⤵PID:1524
-
-
-
C:\Windows\System32\reg.exereg query "HKCU\SOFTWARE\Microsoft\Windows Script Host\Settings" /v Enabled2⤵PID:4512
-
-
C:\Windows\System32\find.exefind /i "0x0"2⤵PID:2104
-
-
C:\Windows\System32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows Script Host\Settings" /v Enabled2⤵PID:2268
-
-
C:\Windows\System32\find.exefind /i "0x0"2⤵PID:2348
-
-
C:\Windows\System32\reg.exereg query "HKCU\Console" /v ForceV22⤵PID:3628
-
-
C:\Windows\System32\find.exefind /i "0x0"2⤵PID:2132
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /ad C:\Windows\System32\spp\tokens\skus2⤵PID:4576
-
-
C:\Windows\System32\sc.exesc query osppsvc2⤵
- Launches sc.exe
PID:3036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /ad C:\Windows\System32\spp\tokens\addons 2>nul2⤵PID:4688
-
-
C:\Windows\System32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sppsvc.exe"2⤵PID:3904
-
-
C:\Windows\System32\mode.commode con cols=80 lines=342⤵PID:1068
-
-
C:\Windows\System32\reg.exereg query HKCU\SOFTWARE\Microsoft\Office\16.0\Common\Licensing\LicensingNext2⤵
- Modifies registry key
PID:1752
-
-
C:\Windows\System32\reg.exereg query HKCU\SOFTWARE\Microsoft\Office\16.0\Common\Licensing\LicensingNext2⤵
- Modifies registry key
PID:392
-
-
C:\Windows\System32\findstr.exefindstr /i /r ".*retail"2⤵PID:2872
-
-
C:\Windows\System32\findstr.exefindstr /i /v "project visio"2⤵PID:4772
-
-
C:\Windows\System32\find.exefind /i "0x2"2⤵PID:1680
-
-
C:\Windows\System32\reg.exereg query HKCU\SOFTWARE\Microsoft\Office\16.0\Common\Licensing\LicensingNext2⤵
- Modifies registry key
PID:3928
-
-
C:\Windows\System32\findstr.exefindstr /i /r ".*retail"2⤵PID:3416
-
-
C:\Windows\System32\findstr.exefindstr /i /v "project visio"2⤵PID:1248
-
-
C:\Windows\System32\find.exefind /i "0x3"2⤵PID:2136
-
-
C:\Windows\System32\reg.exereg query HKCU\SOFTWARE\Microsoft\Office\16.0\Common\Licensing\LicensingNext2⤵
- Modifies registry key
PID:4692
-
-
C:\Windows\System32\findstr.exefindstr /i /r ".*volume"2⤵PID:1676
-
-
C:\Windows\System32\findstr.exefindstr /i /v "project visio"2⤵PID:4716
-
-
C:\Windows\System32\find.exefind /i "0x2"2⤵PID:2936
-
-
C:\Windows\System32\reg.exereg query HKCU\SOFTWARE\Microsoft\Office\16.0\Common\Licensing\LicensingNext2⤵
- Modifies registry key
PID:2488
-
-
C:\Windows\System32\findstr.exefindstr /i /r ".*volume"2⤵PID:2036
-
-
C:\Windows\System32\findstr.exefindstr /i /v "project visio"2⤵PID:4188
-
-
C:\Windows\System32\find.exefind /i "0x3"2⤵PID:436
-
-
C:\Windows\System32\reg.exereg query HKCU\SOFTWARE\Microsoft\Office\16.0\Common\Licensing\LicensingNext2⤵
- Modifies registry key
PID:1496
-
-
C:\Windows\System32\findstr.exefindstr /i /r "project.*"2⤵PID:2084
-
-
C:\Windows\System32\find.exefind /i "0x2"2⤵PID:2736
-
-
C:\Windows\System32\reg.exereg query HKCU\SOFTWARE\Microsoft\Office\16.0\Common\Licensing\LicensingNext2⤵
- Modifies registry key
PID:4412
-
-
C:\Windows\System32\findstr.exefindstr /i /r "project.*"2⤵PID:4624
-
-
C:\Windows\System32\find.exefind /i "0x3"2⤵PID:4708
-
-
C:\Windows\System32\reg.exereg query HKCU\SOFTWARE\Microsoft\Office\16.0\Common\Licensing\LicensingNext2⤵
- Modifies registry key
PID:3588
-
-
C:\Windows\System32\findstr.exefindstr /i /r "visio.*"2⤵PID:1560
-
-
C:\Windows\System32\find.exefind /i "0x2"2⤵PID:4520
-
-
C:\Windows\System32\reg.exereg query HKCU\SOFTWARE\Microsoft\Office\16.0\Common\Licensing\LicensingNext2⤵
- Modifies registry key
PID:2832
-
-
C:\Windows\System32\findstr.exefindstr /i /r "visio.*"2⤵PID:3632
-
-
C:\Windows\System32\find.exefind /i "0x3"2⤵PID:2620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "prompt #$H#$E# & echo on & for %B in (1) do rem"2⤵PID:4880
-
-
C:\Windows\System32\choice.exechoice /c 1234567890EDRSVX /n /m "> Choose a menu option, or press 0 to Exit: "2⤵PID:1460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -c "&{$W=$Host.UI.RawUI.WindowSize;$B=$Host.UI.RawUI.BufferSize;$W.Height=31;$B.Height=300;$Host.UI.RawUI.WindowSize=$W;$Host.UI.RawUI.BufferSize=$B;}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
C:\Windows\System32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\CurrentVersion\Software Protection Platform" /v NoGenTicket /t REG_DWORD /d 1 /f2⤵PID:2528
-
-
C:\Windows\System32\sc.exesc query sppsvc2⤵
- Launches sc.exe
PID:1488
-
-
C:\Windows\System32\find.exefind /i "STOPPED"2⤵PID:3248
-
-
C:\Windows\System32\net.exenet stop sppsvc /y2⤵PID:768
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sppsvc /y3⤵PID:1996
-
-
-
C:\Windows\System32\sc.exesc query sppsvc2⤵
- Launches sc.exe
PID:3048
-
-
C:\Windows\System32\find.exefind /i "STOPPED"2⤵PID:2820
-
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Windows\System32\SppExtComObjHook.dll" Force=True2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -c "$d='C:\Windows\System32';$f=[IO.File]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\KMS_VL_ALL_AIO.cmd') -split ':embdbin\:.*';iex ($f[1]);X 2"2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4796 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Windows\Temp\4f2gawsp\4f2gawsp.cmdline"3⤵PID:4452
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Windows\Temp\RES554F.tmp" "c:\Windows\Temp\4f2gawsp\CSC757C551370C54951B735BE1CF4D3E4E6.TMP"4⤵PID:548
-
-
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe" /f /v Debugger2⤵PID:4300
-
-
C:\Windows\System32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe" /f /v VerifierDlls /t REG_SZ /d "SppExtComObjHook.dll"2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:4444
-
-
C:\Windows\System32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe" /f /v VerifierDebug /t REG_DWORD /d 0x000000002⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:4012
-
-
C:\Windows\System32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe" /f /v VerifierFlags /t REG_DWORD /d 0x800000002⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:2520
-
-
C:\Windows\System32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe" /f /v GlobalFlag /t REG_DWORD /d 0x000001002⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:3960
-
-
C:\Windows\System32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe" /f /v KMS_Emulation /t REG_DWORD /d 12⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:4260
-
-
C:\Windows\System32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe" /f /v KMS_ActivationInterval /t REG_DWORD /d 432002⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:404
-
-
C:\Windows\System32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe" /f /v KMS_RenewalInterval /t REG_DWORD /d 432002⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:2144
-
-
C:\Windows\System32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe" /f /v KMS_HWID /t REG_QWORD /d "0x3A1C049600B60076"2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:3544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages" /f "Microsoft-Windows-*Edition~31bf3856ad364e35" /k 2>nul | FIND /I "CurrentVersion"2⤵PID:4324
-
C:\Windows\System32\reg.exeREG QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages" /f "Microsoft-Windows-*Edition~31bf3856ad364e35" /k3⤵PID:4856
-
-
C:\Windows\System32\find.exeFIND /I "CurrentVersion"3⤵PID:4612
-
-
-
C:\Windows\System32\reg.exeREG QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages\Microsoft-Windows-ProfessionalEdition~31bf3856ad364e35~amd64~~10.0.19041.1288" /v "CurrentState"2⤵PID:4720
-
-
C:\Windows\System32\find.exeFIND /I "0x70"2⤵PID:4748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ECHO Microsoft-Windows-ProfessionalEdition~31bf3856ad364e35~amd64~~10.0.19041.12882⤵PID:2872
-
-
C:\Windows\System32\reg.exeREG QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages\Microsoft-Windows-ProfessionalEdition~31bf3856ad364e35~amd64~~10.0.19041.264" /v "CurrentState"2⤵PID:392
-
-
C:\Windows\System32\find.exeFIND /I "0x70"2⤵PID:1680
-
-
C:\Windows\System32\net.exenet start sppsvc /y2⤵PID:1752
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start sppsvc /y3⤵PID:3720
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic path SoftwareLicensingProduct where "ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f' AND PartialProductKey is not NULL" get LicenseFamily /value 2>nul2⤵PID:4784
-
C:\Windows\System32\Wbem\WMIC.exewmic path SoftwareLicensingProduct where "ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f' AND PartialProductKey is not NULL" get LicenseFamily /value3⤵PID:4824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v ProductName 2>nul2⤵PID:1844
-
C:\Windows\System32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v ProductName3⤵PID:4024
-
-
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun /v InstallPath2⤵
- Modifies registry key
PID:1580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun /v InstallPath" 2>nul2⤵PID:5044
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun /v InstallPath3⤵
- Modifies registry key
PID:1988
-
-
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun\Configuration /v ProductReleaseIds2⤵
- Modifies registry key
PID:4980
-
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\15.0\ClickToRun /v InstallPath2⤵
- Modifies registry key
PID:2936
-
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\14.0\CVH /f Click2run /k2⤵
- Modifies registry key
PID:1676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\14.0\Common\InstallRoot /v Path" 2>nul2⤵PID:4692
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\14.0\Common\InstallRoot /v Path3⤵
- Modifies registry key
PID:4664
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\14.0\Common\InstallRoot /v Path" 2>nul2⤵PID:3440
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\14.0\Common\InstallRoot /v Path3⤵
- Modifies registry key
PID:3620
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\15.0\Common\InstallRoot /v Path" 2>nul2⤵PID:2084
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\15.0\Common\InstallRoot /v Path3⤵
- Modifies registry key
PID:2676
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\15.0\Common\InstallRoot /v Path" 2>nul2⤵PID:1568
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\15.0\Common\InstallRoot /v Path3⤵
- Modifies registry key
PID:4336
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\16.0\Common\InstallRoot /v Path" 2>nul2⤵PID:3572
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\16.0\Common\InstallRoot /v Path3⤵
- Modifies registry key
PID:4908
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Common\InstallRoot /v Path" 2>nul2⤵PID:1260
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Common\InstallRoot /v Path3⤵
- Modifies registry key
PID:4056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun\Configuration /v ProductReleaseIds2⤵PID:4204
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun\Configuration /v ProductReleaseIds3⤵
- Modifies registry key
PID:2820
-
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"MondoVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:4520
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProPlusVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:3844
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectProVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:2904
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioProVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:2444
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"StandardVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:4832
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectStdVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:3800
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioStdVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:4844
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"AccessVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:1916
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"SkypeforBusinessVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:388
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"OneNoteVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:4308
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ExcelVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:1000
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"OutlookVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:2772
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"PowerPointVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:2964
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"PublisherVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:4924
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"WordVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:1980
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectProXVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:4960
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectStdXVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:2708
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioProXVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:228
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioStdXVolume" "C:\Windows\Temp\c2rchk.txt"2⤵PID:1788
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"MondoRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:3436
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProPlusRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:1264
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectProRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:4512
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioProRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:2104
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"StandardRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:4812
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectStdRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:3312
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioStdRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:384
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"AccessRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:4612
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"SkypeforBusinessRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:4660
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"OneNoteRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:380
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ExcelRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:900
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"OutlookRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:1584
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"PowerPointRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:2316
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"PublisherRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:4828
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"WordRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:1412
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProfessionalRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:972
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"HomeBusinessRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:4768
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"HomeStudentRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:2824
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"O365BusinessRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:4824
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"O365SmallBusPremRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:2324
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"O365HomePremRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:2260
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"O365EduCloudRetail" "C:\Windows\Temp\c2rchk.txt"2⤵PID:1460
-
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun\Configuration /v ProductReleaseIds2⤵
- Modifies registry key
PID:4672
-
-
C:\Windows\System32\findstr.exefindstr 20192⤵PID:1720
-
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun\Configuration /v ProductReleaseIds2⤵
- Modifies registry key
PID:3484
-
-
C:\Windows\System32\findstr.exefindstr 20212⤵PID:4980
-
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun\Configuration /v ProductReleaseIds2⤵
- Modifies registry key
PID:3200
-
-
C:\Windows\System32\findstr.exefindstr 20242⤵PID:1676
-
-
C:\Windows\System32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\msoxmled.exe"2⤵PID:3988
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path SoftwareLicensingProduct where "Description like '%KMSCLIENT%' AND NOT Name like '%MondoR_KMS_Automation%'" get Name /value2⤵PID:5100
-
-
C:\Windows\System32\find.exefind /i "Office 16" "C:\Windows\Temp\sppchk.txt"2⤵PID:2736
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path SoftwareLicensingProduct where "ApplicationID='0ff1ce15-a989-479d-af46-f275c6370663' AND NOT Name like '%O365%'" get Name /value2⤵PID:4488
-
-
C:\Windows\System32\find.exefind /i "R_Retail" "C:\Windows\Temp\sppchk.txt"2⤵PID:3160
-
-
C:\Windows\System32\find.exefind /i "Office 14"2⤵PID:1260
-
-
C:\Windows\System32\find.exefind /i "R_Retail" "C:\Windows\Temp\sppchk.txt"2⤵PID:3588
-
-
C:\Windows\System32\find.exefind /i "Office 15"2⤵PID:1560
-
-
C:\Windows\System32\find.exefind /i "R_Retail" "C:\Windows\Temp\sppchk.txt"2⤵PID:2076
-
-
C:\Windows\System32\find.exefind /i "Office 16"2⤵PID:2752
-
-
C:\Windows\System32\find.exefind /i "R_Retail" "C:\Windows\Temp\sppchk.txt"2⤵PID:3380
-
-
C:\Windows\System32\find.exefind /i "Office 19"2⤵PID:2904
-
-
C:\Windows\System32\find.exefind /i "R_Retail" "C:\Windows\Temp\sppchk.txt"2⤵PID:1808
-
-
C:\Windows\System32\find.exefind /i "Office 21"2⤵PID:3760
-
-
C:\Windows\System32\find.exefind /i "R_Retail" "C:\Windows\Temp\sppchk.txt"2⤵PID:4296
-
-
C:\Windows\System32\find.exefind /i "Office 24"2⤵PID:2776
-
-
C:\Windows\System32\find.exefind /i "Office16ProPlusR" "C:\Windows\Temp\sppchk.txt"2⤵PID:64
-
-
C:\Windows\System32\find.exefind /i "Office16StandardR" "C:\Windows\Temp\sppchk.txt"2⤵PID:4880
-
-
C:\Windows\System32\find.exefind /i "Office16AccessR" "C:\Windows\Temp\sppchk.txt"2⤵PID:3016
-
-
C:\Windows\System32\find.exefind /i "Office16SkypeforBusinessR" "C:\Windows\Temp\sppchk.txt"2⤵PID:632
-
-
C:\Windows\System32\find.exefind /i "Office16ExcelR" "C:\Windows\Temp\sppchk.txt"2⤵PID:4892
-
-
C:\Windows\System32\find.exefind /i "Office16OutlookR" "C:\Windows\Temp\sppchk.txt"2⤵PID:4360
-
-
C:\Windows\System32\find.exefind /i "Office16PowerPointR" "C:\Windows\Temp\sppchk.txt"2⤵PID:4300
-
-
C:\Windows\System32\find.exefind /i "Office16PublisherR" "C:\Windows\Temp\sppchk.txt"2⤵PID:4444
-
-
C:\Windows\System32\find.exefind /i "Office16WordR" "C:\Windows\Temp\sppchk.txt"2⤵PID:2800
-
-
C:\Windows\System32\find.exefind /i "Office16ProfessionalR" "C:\Windows\Temp\sppchk.txt"2⤵PID:2520
-
-
C:\Windows\System32\find.exefind /i "Office16HomeBusinessR" "C:\Windows\Temp\sppchk.txt"2⤵PID:1632
-
-
C:\Windows\System32\find.exefind /i "Office16HomeStudentR" "C:\Windows\Temp\sppchk.txt"2⤵PID:3944
-
-
C:\Windows\System32\find.exefind /i "Office16ProjectProR" "C:\Windows\Temp\sppchk.txt"2⤵PID:3500
-
-
C:\Windows\System32\find.exefind /i "Office16ProjectStdR" "C:\Windows\Temp\sppchk.txt"2⤵PID:2392
-
-
C:\Windows\System32\find.exefind /i "Office16VisioProR" "C:\Windows\Temp\sppchk.txt"2⤵PID:2144
-
-
C:\Windows\System32\find.exefind /i "Office16VisioStdR" "C:\Windows\Temp\sppchk.txt"2⤵PID:4856
-
-
C:\Windows\System32\sc.exesc query ClickToRunSvc2⤵
- Launches sc.exe
PID:2560
-
-
C:\Windows\System32\sc.exesc query OfficeSvc2⤵
- Launches sc.exe
PID:4324
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun /v InstallPath" 2>nul2⤵PID:1068
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun /v InstallPath3⤵
- Modifies registry key
PID:4820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\ClickToRun /v InstallPath" 2>nul2⤵PID:1476
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\ClickToRun /v InstallPath3⤵
- Modifies registry key
PID:1864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\15.0\ClickToRun /v InstallPath" 2>nul2⤵PID:4984
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\15.0\ClickToRun /v InstallPath3⤵
- Modifies registry key
PID:2264
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\15.0\ClickToRun /v InstallPath" 2>nul2⤵PID:2588
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\15.0\ClickToRun /v InstallPath3⤵
- Modifies registry key
PID:1752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun /v InstallPath" 2>nul2⤵PID:4448
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun /v InstallPath3⤵
- Modifies registry key
PID:1652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun /v InstallPath" 2>nul2⤵PID:564
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun /v InstallPath3⤵
- Modifies registry key
PID:416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun /v PackageGUID" 2>nul2⤵PID:4024
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun /v PackageGUID3⤵
- Modifies registry key
PID:2324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun\Configuration /v ProductReleaseIds" 2>nul2⤵PID:2088
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun\Configuration /v ProductReleaseIds3⤵
- Modifies registry key
PID:4188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun\ProductReleaseIDs /v ActiveConfiguration" 2>nul2⤵PID:904
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun\ProductReleaseIDs /v ActiveConfiguration3⤵
- Modifies registry key
PID:1492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\Microsoft\Office\15.0\Common\InstallRoot /v Path" 2>nul2⤵PID:3368
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\15.0\Common\InstallRoot /v Path3⤵
- Modifies registry key
PID:1828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\15.0\Common\InstallRoot /v Path" 2>nul2⤵PID:4692
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Office\15.0\Common\InstallRoot /v Path3⤵
- Modifies registry key
PID:3092
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic path SoftwareLicensingService get Version /value2⤵PID:3440
-
C:\Windows\System32\Wbem\WMIC.exewmic path SoftwareLicensingService get Version /value3⤵PID:1496
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path SoftwareLicensingProduct where "ApplicationID='0ff1ce15-a989-479d-af46-f275c6370663' AND LicenseStatus='1' AND PartialProductKey is not NULL" get Description2⤵PID:3572
-
-
C:\Windows\System32\findstr.exefindstr /V /R "^$"2⤵PID:2288
-
-
C:\Windows\System32\find.exefind /i "RETAIL channel" "C:\Windows\Temp\crvRetail.txt"2⤵PID:2820
-
-
C:\Windows\System32\find.exefind /i "RETAIL(MAK) channel" "C:\Windows\Temp\crvRetail.txt"2⤵PID:1560
-
-
C:\Windows\System32\find.exefind /i "TIMEBASED_SUB channel" "C:\Windows\Temp\crvRetail.txt"2⤵PID:3844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -c "$f=[IO.File]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\KMS_VL_ALL_AIO.cmd') -split ':embdbin\:.*';iex ($f[5])"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path SoftwareLicensingProduct where "ApplicationID='0ff1ce15-a989-479d-af46-f275c6370663'" get LicenseFamily2⤵PID:4880
-
-
C:\Windows\System32\findstr.exefindstr /V /R "^$"2⤵PID:3044
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Professional2024Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4892
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"HomeBusiness2024Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4960
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"HomeStudent2024Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2708
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Home2024Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2976
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProPlus2024Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4872
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Standard2024Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3436
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Excel2024Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1264
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Outlook2024Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4512
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"PowerPoint2024Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4212
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Word2024Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2104
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Access2024Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3312
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"SkypeforBusiness2024Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4000
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectPro2024Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4876
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectStd2024Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:380
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioPro2024Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4820
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioStd2024Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1584
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Professional2021Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:900
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"HomeBusiness2021Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4828
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"HomeStudent2021Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2264
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProPlus2021Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2780
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Standard2021Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1588
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Excel2021Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3668
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Outlook2021Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1652
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"PowerPoint2021Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1844
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Publisher2021Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:416
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Word2021Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2036
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Access2021Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2324
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"SkypeforBusiness2021Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1720
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectPro2021Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4188
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectStd2021Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4980
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioPro2021Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1492
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioStd2021Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1676
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Professional2019Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2488
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"HomeBusiness2019Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4500
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"HomeStudent2019Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3988
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProPlus2019Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:5016
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Standard2019Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4056
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Excel2019Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1496
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Outlook2019Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4624
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"PowerPoint2019Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2012
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Publisher2019Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4576
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Word2019Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4220
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Access2019Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3316
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"SkypeforBusiness2019Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3160
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectPro2019Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1716
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectStd2019Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2956
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioPro2019Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3996
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioStd2019Retail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4680
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProfessionalRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1724
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"HomeBusinessRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4452
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"HomeStudentRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:548
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"O365ProPlusRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:388
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"O365BusinessRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1000
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"O365SmallBusPremRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2904
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"O365HomePremRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3380
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"O365EduCloudRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2692
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"MondoRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2440
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"StandardRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2752
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ExcelRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2176
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"OutlookRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2204
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"PowerPointRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3044
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"PublisherRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1980
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"WordRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4300
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"AccessRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4444
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"SkypeforBusinessRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1788
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectProRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:228
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectStdRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3976
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioProRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2112
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioStdRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:848
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"OneNoteRetail" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2392
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProPlus2019Volume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2144
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Standard2019Volume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4604
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Excel2019Volume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4720
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Outlook2019Volume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4772
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"PowerPoint2019Volume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4116
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Publisher2019Volume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4688
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Word2019Volume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1864
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"Access2019Volume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1476
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"SkypeforBusiness2019Volume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2316
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectPro2019Volume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:972
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectStd2019Volume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1752
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioPro2019Volume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3276
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioStd2019Volume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1412
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"MondoVolume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:332
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"StandardVolume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4824
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ExcelVolume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:564
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"OutlookVolume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3772
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"PowerPointVolume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:4024
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"PublisherVolume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2544
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"WordVolume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3344
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"AccessVolume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3924
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"SkypeforBusinessVolume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:904
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectProVolume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3200
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"ProjectStdVolume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:2528
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioProVolume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3444
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"VisioStdVolume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:3464
-
-
C:\Windows\System32\findstr.exefindstr /I /C:"OneNoteVolume" "C:\Windows\Temp\crvProductIds.txt"2⤵PID:1756
-
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun\ProductReleaseIDs\DF15FCEA-4EE4-4717-AEF3-17B0F643CB2A\ProPlusRetail.162⤵
- Modifies registry key
PID:3620
-
-
C:\Windows\System32\find.exefind /i "Office16ProPlusVL_KMS_Client" "C:\Windows\Temp\crvVolume.txt"2⤵PID:3560
-
-
C:\Windows\System32\reg.exereg query HKLM\SOFTWARE\Microsoft\Office\ClickToRun\ProductReleaseIDs\DF15FCEA-4EE4-4717-AEF3-17B0F643CB2A\ProPlusVolume.162⤵
- Modifies registry key
PID:2952
-
-
C:\Windows\System32\find.exefind /i "Office16MondoVL_KMS_Client" "C:\Windows\Temp\crvVolume.txt"2⤵PID:4412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
64B
MD51a11402783a8686e08f8fa987dd07bca
SHA1580df3865059f4e2d8be10644590317336d146ce
SHA2569b1d1b468932a2d88548dc18504ac3066f8248079ecb083e919460bdb88398c0
SHA5125f7f9f76d9d12a25fdc5b8d193391fb42c37515c657250fe01a9bfd9fe4cc4eab9d5ec254b2596ac1b9005f12511905f19fdae41f057062261d75bd83254b510
-
Filesize
944B
MD58857491a4a65a9a1d560c4705786a312
SHA14f3caf2ad5d66a2410c9cca0381d26a46e832cb4
SHA256b6e1a16a11075cb4e0bae0cebdb6ac15f5d66e0005f557703708a04cd11bd360
SHA512d9497c47898cdc4c4fc62158830dc931990e08bb4a28a5d19d4187a87a2afab8a4bd58ca346563210b476c9adb9a714bfe1057e0ebce85d1fd94731be6d02660
-
Filesize
1KB
MD5e5bfec1063a497048fffb231a0621403
SHA197cf6a89f237f43b9c22e3e081f7d45924d435ba
SHA256325d1ffa65e9593a834f3662168d0c1950de148c63f1e43b86727087f3881d6f
SHA512e38c5189054cf09fb15de017d0bbe226338124ee02bb04530943c8fcfc303dbe5fe5fd28c9c1aea1b552d1a2b0b76cabbedd284a38a07d41ec9cf9e55b44dd0e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
19KB
MD55ee1dd6608439d755f7161bb83c62216
SHA11a6a3e40f610a6394ef539a039308dbe2f526ac1
SHA2565420b32332112564ab739d2305bba45f0c6559a708c360bf76becf8ef0cfba7a
SHA512555a1cebb5d68f49ca4eb9785c98b317561781681d68f39c77b4c2d0924899a052db2f341048fa9883e8e3843326e1195e59f5adca250b3078fab5c8c9adb0f8
-
Filesize
4KB
MD51fe7a13dadcbcca0afd80faaf61755ef
SHA1a2b553ce04300ddd591ef2a49fe366f40df107b7
SHA256e4cb9fc24b980dd9de2806d7aee5e5a683f6ac8b60a6278683dd61679c7e6cd7
SHA5121f69ac564510d912c0e942239554e3b29e48d5a2b3e953e6f98c2dc859516f61d912bb7d08a5eeb314d3ab65d257eb8a1873f77ea2b8249dd04be3c00af80de1
-
Filesize
1KB
MD5f32f75144a585bf260a99c470d1dec39
SHA1a55200bf64643019c0498fa2982640e05d38a5fc
SHA256fef33e5a843d4965514d90eaa7593601e190bbecff798ab7cea2bc92fb63df24
SHA5123ac91de558613e0da11c0bf603483d145a824074b67e88735cb31ec10a945630da9deccf7719081c680be1500c4e87a871a6b3605757cb00b294be0a2f27db43
-
Filesize
15B
MD5606d9abf768025ebe0b25958d417be6c
SHA181b33a8807f17530f00225d09943a30a2d2bc94d
SHA2565e2af1accb0147d7d52f896091e14821abd697a04a67855eee2b8219281c8f9d
SHA512e3ebded19b43b85453750127f866e92e6623509559bd30048da8685dc9f3a784a0cd0a0f36e64760f6cfb9e55145e560151e8ecfb97499dca9684d6f6fec0d1f
-
Filesize
80B
MD58bf63053cd3d9b456db6f0f5364fbdd8
SHA166f296e2f8f2557651948768d23940a364fbbd8b
SHA2566745801207605da64109696eb8edc436e5599da0012092fc5b5b0d3fc58649d8
SHA51206f09dde15ae5077b19149f4ef682ece57cd8d83ab1ab1dc30b342b24f534e7926a6671d7268e365dcd9378529bf6f9af682798dd985a4f5522044c047e901a0
-
Filesize
764B
MD58456d990c84b5638c6ba6753dd31b114
SHA163c7d3d35294c74b8340d8e6b077b4b95c68e06e
SHA25616f408b7d9474efb9893f7a090f51e72ea679ae0cd3e16a8701685f357bec4d2
SHA512ce30e2af40d3c05fe5b2c17e9ddbdd29231229fdb50b1ce290590c8cf91867800f8c84468c4f9e133d8b766b6c5aa56bac1deac17577bbc7719a0c209f29f40f
-
Filesize
1KB
MD59ca430ff9d23c91111e7f982880bb1b5
SHA1d19b69dfcf697895275aadc5c4d43cf77c5f2de9
SHA2569297e408b04114294f766ca92924527538621948c094adbdc70255af3ef92634
SHA51201df1ae217f1ed261984cd09bb864874b2a945886bc3e565477c5769710e80fd307f28247edc119167992cc7d4d8c1e1a926eb9ac029e5d27ba9169474465dcb
-
Filesize
884B
MD5eafbb318108fc62a15b458ebba405940
SHA10c5f45d0cab61ef4fa12f13f020ca45cba04863a
SHA25645ee3dd57aa47fcf92c09a44276de5ef1688bb0563e09206d8e882528e6de9d2
SHA512bac80550d7fedc768522907ba72f2802ac2fead886015356a417533f9fc0e2a767b992c58010e67160b4ee071971c7cc6a5337ffb948cf685dca0811ccaa52f8
-
Filesize
333B
MD5694bf9e16642666ad0268a832e72bd16
SHA19d205d7d3022aae3269562d30f83b12bbc5ace2a
SHA256b084d7878863e305a370a95463d27166f3460e0475dcc741c20a41056697203c
SHA512ad93d027fabbe076d7f27807e07910fce5ebd8d4197b13507cd6d604fb5624158cf35b2614b377a8b6deb2e61e4331f19ffac77db227580c67b2e46d50be7074
-
Filesize
652B
MD50e5769851683ed9b0d96ffa6339e4db0
SHA1e2eba6419143a2b0579bbf0ff5ae28acc8a07a6c
SHA256f76fbfcc5406451bc3ccb8d93547aaa747418d26953b739844e9b5d77061afa9
SHA512d778a786b8f90d91e180b6a2ae8263b70e58af0152140ee57fdd0ae27608bcc76e9250baf04a3b87f6222270cc6bcc6f2bca2a274783ea3b7743ebae383d66c8