Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 12:31
Static task
static1
Behavioral task
behavioral1
Sample
Chrome-h.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Chrome-h.msi
Resource
win10v2004-20240802-en
General
-
Target
Chrome-h.msi
-
Size
119.4MB
-
MD5
9c1d169523718e83ffc6383637051682
-
SHA1
9dab4b018efb2da67cdb2597fcf43124ccb32094
-
SHA256
ac5ac00d4c06180d6f1421fa94cda235e9510ae314d8243a2cf0c21cbcbc4750
-
SHA512
0a9c8faaa0430bd0775db2f9bc03bc2f355e8f56e390c5e17ceb9e1baca5a1183882c6964247cc1ab36ceb348c6be456afd0469de41f7c5688b0cdcaa12734dd
-
SSDEEP
3145728:2WyXrlu9nzxXaddV9KosQ0fon6RIUeROMvLSG8gtL0T:2WybluRal9Ko10A6+UeowLSGzL0T
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\SET32E3.tmp rundll32.exe File created C:\Windows\system32\DRIVERS\SET32E3.tmp rundll32.exe File opened for modification C:\Windows\system32\DRIVERS\nFsFlt64.sys rundll32.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Mswtd\Parameters\ServiceDll = "C:\\Windows\\SysWOW64\\Mswtd.dll" NSecRTS.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\ = "Google Chrome" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\StubPath = "\"C:\\Program Files\\Google\\Chrome\\Application\\109.0.5414.120\\Installer\\chrmstp.exe\" --configure-user-settings --verbose-logging --system-level" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\Localized Name = "Google Chrome" setup.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: instrap.exe File opened (read-only) \??\L: NSecRTS.exe File opened (read-only) \??\S: NSecRTS.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: NSecRTS.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: NSecRTS.exe File opened (read-only) \??\F: NSecRTS.exe File opened (read-only) \??\K: NSecRTS.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: NSecRTS.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\I: NSecRTS.exe File opened (read-only) \??\W: NSecRTS.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: NSecRTS.exe File opened (read-only) \??\Y: NSecRTS.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: NSecRTS.exe File opened (read-only) \??\H: NSecRTS.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\M: NSecRTS.exe File opened (read-only) \??\P: NSecRTS.exe File opened (read-only) \??\T: NSecRTS.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Q: NSecRTS.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\F: NSecRTS.exe File opened (read-only) \??\X: NSecRTS.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleUpdate.exe GoogleUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleUpdate.exe\DisableExceptionChainValidation = "0" GoogleUpdate.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\International\Geo\Nation chrome.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\Mswtd.dll NSecRTS.exe File opened for modification C:\Windows\SysWOW64\InstallUtil.InstallLog InstallUtil.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\696F3DE637E6DE85B458996D49D759AD NSecRTS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\696F3DE637E6DE85B458996D49D759AD NSecRTS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\26E638C519997CC5D7E38BA592ADCFA9 NSecRTS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\26E638C519997CC5D7E38BA592ADCFA9 NSecRTS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7396C420A8E1BC1DA97F1AF0D10BAD21 NSecRTS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7396C420A8E1BC1DA97F1AF0D10BAD21 NSecRTS.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer chrome.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\NSEC\Data\KVDB\POLICY_103.100.159.235.crc NSecRTS.exe File created C:\Program Files (x86)\Google\Temp\GUMDECC.tmp\goopdateres_ro.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMDECC.tmp\goopdateres_zh-CN.dll ChromeSetup.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\7z\7z.exe setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\nxd\beta\drivers\ntdes\arm64\NxdSupport.dll setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Google\Temp\GUMDECC.tmp\goopdateres_ja.dll ChromeSetup.exe File created C:\Program Files (x86)\Common Files\NSEC\drivers\ntdes\arm\nxdds2.dll setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\nxd\beta\drivers\ntdes\arm64\NxdIsolate.dll setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File opened for modification C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\NSecsoft.NativeModule.dll Nx.UI.MessageCenter.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\nxd\beta\drivers\ntdes\arm\nxdds2.inf setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\nxd\la\drivers\ntdes\arm64\nxdisolate.cat setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files\Google\Chrome\Temp\source1740_1318192280\Chrome-bin\109.0.5414.120\VisualElements\LogoCanary.png setup.exe File created C:\Program Files\Google\Chrome\Temp\source1740_1318192280\Chrome-bin\109.0.5414.120\Locales\et.pak setup.exe File created C:\Program Files (x86)\Google\Temp\GUMDECC.tmp\goopdateres_sv.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\psmachine_64.dll GoogleUpdate.exe File created C:\Program Files (x86)\Common Files\NSEC\WinImDeca.dll setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\nxd\beta\drivers\ntdes\arm64\NxdDt2.dll setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\nxd\la\drivers\ntdes\arm\nxdisolate.inf setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Google\Temp\GUMDECC.tmp\goopdateres_ru.dll ChromeSetup.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\RD\logging.dll setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\nxd\beta\drivers\ntdes\arm\nxdisolate.inf setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe setup.exe File opened for modification C:\Program Files (x86)\Common Files\NSEC\Data\KVDB\DES_Global setup.exe File created C:\Program Files (x86)\Common Files\NSEC\drivers\nsdiskcrypt\nsdiskcrypt-x64.sys setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\NSecUI\DevExpress.Dashboard.v22.1.Core.dll setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\NSecUI\zh-Hans\DevExpress.ExpressApp.FileAttachment.Blazor.v22.1.resources.dll setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\NSecUI\DevExpress.TreeMap.v22.1.Core.dll setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\nsis\Include\Win\Propkey.nsh setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File opened for modification C:\Program Files (x86)\Common Files\NSEC\Data\KVDB\DES_Global.crc setup.exe File created C:\Program Files (x86)\Common Files\NSEC\drivers\nskrnl\win10\NSecKrnl64.sys setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\NSecUI\DevExpress.XtraSpreadsheet.v22.1.dll setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\nxd\beta\drivers\ntdes\x64\nxddt2.sys setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Google\Temp\GUMDECC.tmp\goopdateres_mr.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_da.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_zh-TW.dll GoogleUpdate.exe File created C:\Program Files (x86)\Common Files\NSEC\curl.exe setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\data\fileopermatchedrules.json setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File opened for modification C:\Program Files (x86)\Common Files\NSEC\Data\KVDB\99_Global.crc NSecRTS.exe File opened for modification C:\Program Files (x86)\Common Files\NSEC\Data chrome.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\NSecUI\zh-Hans\DevExpress.Pdf.v22.1.Core.resources.dll setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\nxd\beta\drivers\ntdes\x64\nxdsupport.cat setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files\Google\Chrome\Temp\source1740_1318192280\Chrome-bin\109.0.5414.120\default_apps\external_extensions.json setup.exe File created C:\Program Files (x86)\Google\Temp\GUMDECC.tmp\GoogleUpdateSetup.exe ChromeSetup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_lv.dll GoogleUpdate.exe File created C:\Program Files (x86)\Common Files\NSEC\data\NsLogon\windows10_20.jpg setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\drivers\nfsflt\arm\nFsFlt32.inf setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\Signature.exe setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File opened for modification C:\Program Files (x86)\Common Files\NSEC\Data\KVDB\CONFIG_Global chrome.exe File created C:\Program Files (x86)\Common Files\NSEC\drivers\nnfp\nnfp_wfp_x64.dll setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\drivers\ntdes\x86\nxddt2.inf setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\NSecUI\DevExpress.Images.v22.1.dll setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\NSecUI\zh-Hans\DevExpress.ExpressApp.ScriptRecorder.Win.v22.1.resources.dll setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files\Google\Chrome\Temp\source1740_1318192280\Chrome-bin\109.0.5414.120\Locales\sk.pak setup.exe File opened for modification C:\Program Files (x86)\Common Files\NSEC\Data\KVDB\CONFIG_Global.crc setup.exe File created C:\Program Files (x86)\Common Files\NSEC\NFPCore.dll setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\drivers\nsdiskcrypt\win10\nsdiskcrypt-x86.sys setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\nxd\la\drivers\ntdes\x86\nxdsupport.inf setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File opened for modification C:\Program Files (x86)\Common Files\NSEC\Data\KVDB\CONFIG_Global.crc NSecRTS.exe File created C:\Program Files\Google\Chrome\Temp\source1740_1318192280\Chrome-bin\109.0.5414.120\VisualElements\SmallLogo.png setup.exe File created C:\Program Files (x86)\Common Files\NSEC\plugins\nsis\Include\x64.nsh setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Google\Temp\GUMDECC.tmp\goopdateres_bn.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_kn.dll GoogleUpdate.exe File created C:\Program Files (x86)\Common Files\NSEC\WinDevInfo.dll setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe File created C:\Program Files (x86)\Common Files\NSEC\data\NsLogon\eyes.png setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe -
Drops file in Windows directory 20 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\WindowsUpdate.log wusa.exe File opened for modification C:\Windows\Installer\MSID9BC.tmp msiexec.exe File created C:\Windows\Installer\f76d923.msi msiexec.exe File opened for modification C:\Windows\INF\setupapi.app.log rundll32.exe File created C:\Windows\wusa.lock wusa.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log wusa.exe File opened for modification C:\Windows\Logs\DPX\setupact.log wusa.exe File opened for modification C:\Windows\Logs\DPX\setupact.log wusa.exe File opened for modification C:\Windows\WindowsUpdate.log wusa.exe File created C:\Windows\Installer\f76d920.msi msiexec.exe File opened for modification C:\Windows\Installer\f76d920.msi msiexec.exe File created C:\Windows\Installer\f76d921.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIDA78.tmp msiexec.exe File opened for modification C:\Windows\Installer\f76d921.ipi msiexec.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log wusa.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\wusa.lock wusa.exe -
Executes dropped EXE 50 IoCs
pid Process 1760 ChromeSetup.exe 1320 GoogleUpdate.exe 2412 GoogleUpdate.exe 1692 GoogleUpdate.exe 556 GoogleUpdateComRegisterShell64.exe 584 GoogleUpdateComRegisterShell64.exe 1700 GoogleUpdateComRegisterShell64.exe 1388 GoogleUpdate.exe 2952 GoogleUpdate.exe 3004 GoogleUpdate.exe 3036 setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe 1868 NSec.exe 1372 instrap.exe 1716 NSecRTS.exe 932 NSecRTS.exe 2436 fixit.exe 2544 wg.exe 3028 wg.exe 2824 NSecRTS.exe 2184 NSecDs.exe 2196 NSecDs.exe 2876 109.0.5414.120_chrome_installer.exe 1740 setup.exe 3056 setup.exe 2104 Fixit.exe 2860 NSecRTS.exe 656 Nx.UI.MessageCenter.exe 960 NSecRTS.exe 992 NSecRTS.exe 792 NSecRTS.exe 2760 NSecRTX2.exe 3016 setup.exe 1696 setup.exe 2332 GoogleCrashHandler.exe 2284 GoogleCrashHandler64.exe 2160 GoogleUpdate.exe 1936 GoogleUpdateOnDemand.exe 2320 GoogleUpdate.exe 760 chrome.exe 484 chrome.exe 3092 chrome.exe 3076 chrome.exe 3104 chrome.exe 3244 chrome.exe 3252 chrome.exe 3336 elevation_service.exe 3396 chrome.exe 3744 chrome.exe 3844 chrome.exe 1316 7z.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2064 sc.exe -
Loads dropped DLL 64 IoCs
pid Process 2076 MsiExec.exe 2076 MsiExec.exe 2076 MsiExec.exe 2076 MsiExec.exe 2076 MsiExec.exe 740 MsiExec.exe 2076 MsiExec.exe 2076 MsiExec.exe 2076 MsiExec.exe 1760 ChromeSetup.exe 1320 GoogleUpdate.exe 1320 GoogleUpdate.exe 1320 GoogleUpdate.exe 1320 GoogleUpdate.exe 2412 GoogleUpdate.exe 2412 GoogleUpdate.exe 2412 GoogleUpdate.exe 1320 GoogleUpdate.exe 1692 GoogleUpdate.exe 1692 GoogleUpdate.exe 1692 GoogleUpdate.exe 556 GoogleUpdateComRegisterShell64.exe 1692 GoogleUpdate.exe 1692 GoogleUpdate.exe 1692 GoogleUpdate.exe 584 GoogleUpdateComRegisterShell64.exe 1692 GoogleUpdate.exe 1692 GoogleUpdate.exe 1692 GoogleUpdate.exe 1700 GoogleUpdateComRegisterShell64.exe 1692 GoogleUpdate.exe 1320 GoogleUpdate.exe 1320 GoogleUpdate.exe 1320 GoogleUpdate.exe 1388 GoogleUpdate.exe 1320 GoogleUpdate.exe 1320 GoogleUpdate.exe 2952 GoogleUpdate.exe 2952 GoogleUpdate.exe 2952 GoogleUpdate.exe 3004 GoogleUpdate.exe 3004 GoogleUpdate.exe 3004 GoogleUpdate.exe 3004 GoogleUpdate.exe 2952 GoogleUpdate.exe 2076 MsiExec.exe 2076 MsiExec.exe 3036 setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe 3036 setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe 3036 setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe 1372 instrap.exe 932 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 2436 fixit.exe 932 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 2824 NSecRTS.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NSecRTS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NSecRTS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 2104 msiexec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NSecDs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NSecRTS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nx.UI.MessageCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NSec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NSecDs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdateOnDemand.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wusa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChromeSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fixit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NSecRTX2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NSecRTS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1388 GoogleUpdate.exe 2160 GoogleUpdate.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 NSecRTS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString NSecRTS.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 580 systeminfo.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wmic.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E\52C64B7E\@%SystemRoot%\system32\mlang.dll,-4386 = "English (United States)" systeminfo.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs NSecRTS.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" runonce.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates NSecRTS.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\GrpConv grpconv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates NSecRTS.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" runonce.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE NSecRTS.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe -
Modifies registry class 64 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928} GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BCDCB538-01C0-46D1-A6A7-52F4D021C272}\ProxyStubClsid32\ = "{82BB48E2-2057-4C07-A383-B2C2F8A0FD01}" GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{534F5323-3569-4F42-919D-1E1CF93E5BF6}\VERSIONINDEPENDENTPROGID GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BCDCB538-01C0-46D1-A6A7-52F4D021C272}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2D363682-561D-4C3A-81C6-F2F82107562A} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D106AB5F-A70E-400E-A21B-96208C1D8DBB}\NumMethods GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FE908CDD-22BB-472A-9870-1A0390E42F36} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\.xht\OpenWithProgids setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F5438C29-4011-4997-A4A2-B568732B040C}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4EB61BAC-A3B6-4760-9581-655041EF4D69}\ProgID GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\NumMethods\ = "8" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D05F64F-71E3-48A5-BF6B-83315BC8AE1F}\ = "IAppCommand2" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{05A30352-EB25-45B6-8449-BCA7B0542CE5}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ABC01078-F197-4B0B-ADBC-CFE684B39C82}\VersionIndependentProgID\ = "GoogleUpdate.ProcessLauncher" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F5438C29-4011-4997-A4A2-B568732B040C}\ = "DESFileMenu Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{084D78A8-B084-4E14-A629-A2C419B0E3D9} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2E629606-312A-482F-9B12-2C4ABF6F0B6D}\ProxyStubClsid32 GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4DE778FE-F195-4EE3-9DAB-FE446C239221}\ = "IAppCommand" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{76F7B787-A67C-4C73-82C7-31F5E3AABC5C}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FE908CDD-22BB-472A-9870-1A0390E42F36}\ProxyStubClsid32\ = "{82BB48E2-2057-4C07-A383-B2C2F8A0FD01}" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\NSecDs.EXE NSecDs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{247954F9-9EDC-4E68-8CC3-150C2B89EADF}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{19692F10-ADD2-4EFF-BE54-E61C62E40D13}\ProxyStubClsid32\ = "{82BB48E2-2057-4C07-A383-B2C2F8A0FD01}" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31AC3F11-E5EA-4A85-8A3D-8E095A39C27B}\ProxyStubClsid32\ = "{82BB48E2-2057-4C07-A383-B2C2F8A0FD01}" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\NumMethods GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DB17455-4E85-46E7-9D23-E555E4B005AF} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{82BB48E2-2057-4C07-A383-B2C2F8A0FD01}\InProcServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2D363682-561D-4C3A-81C6-F2F82107562A}\ProxyStubClsid32\ = "{82BB48E2-2057-4C07-A383-B2C2F8A0FD01}" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1C642CED-CA3B-4013-A9DF-CA6CE5FF6503}\NumMethods\ = "9" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4DE778FE-F195-4EE3-9DAB-FE446C239221}\NumMethods\ = "11" GoogleUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ADDF22CF-3E9B-4CD7-9139-8169EA6636E4}\ELEVATION GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D0C0B0265BA6EC14E82B92E486C99259\SourceList\Media\1 = ";" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\INPROCSERVER32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5B25A8DC-1780-4178-A629-6BE8B8DEFAA2} GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{18D0F672-18B4-48E6-AD36-6E6BF01DBBC4}\ = "IAppWeb" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B3D28DBD-0DFA-40E4-8071-520767BADC7E}\ProgID GoogleUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\INPROCSERVER32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\NumMethods\ = "24" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\NumMethods\ = "8" GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ABC01078-F197-4B0B-ADBC-CFE684B39C82}\VERSIONINDEPENDENTPROGID GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{521FDB42-7130-4806-822A-FC5163FAD983} GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F5438C29-4011-4997-A4A2-B568732B040C} regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{463ABECF-410D-407F-8AF5-0DF35A005CC8} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{084D78A8-B084-4E14-A629-A2C419B0E3D9}\ = "IApp2" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{19692F10-ADD2-4EFF-BE54-E61C62E40D13}\ProxyStubClsid32 GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{DCAB8386-4F03-4DBD-A366-D90BC9F68DE6}\ProxyStubClsid32\ = "{82BB48E2-2057-4C07-A383-B2C2F8A0FD01}" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2E629606-312A-482F-9B12-2C4ABF6F0B6D}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.CoreMachineClass\ = "Google Update Core Class" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8c32302c-3970-446e-9ac5-478648c7ab53}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9465B4B4-5216-4042-9A2C-754D3BCDC410}\VERSIONINDEPENDENTPROGID GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31AC3F11-E5EA-4A85-8A3D-8E095A39C27B} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2E629606-312A-482F-9B12-2C4ABF6F0B6D}\NumMethods GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B3A47570-0A85-4AEA-8270-529D47899603}\NumMethods GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4E223325-C16B-4EEB-AEDC-19AA99A237FA}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DAB1D343-1B2A-47F9-B445-93DC50704BFE}\NumMethods\ = "4" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{909489C2-85A6-4322-AA56-D25278649D67}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C673BA1D-2EDC-4A64-AF56-1355219C129D}\ = "IDesPropSheet" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D106AB5F-A70E-400E-A21B-96208C1D8DBB}\ = "IProcessLauncher2" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B3D28DBD-0DFA-40E4-8071-520767BADC7E}\Elevation GoogleUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{25461599-633D-42B1-84FB-7CD68D026E53}\VERSIONINDEPENDENTPROGID GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\DESFileMenu\ = "{F5438C29-4011-4997-A4A2-B568732B040C}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{909489C2-85A6-4322-AA56-D25278649D67}\NumMethods\ = "4" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{27634814-8E41-4C35-8577-980134A96544}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\ = "IAppBundleWeb" GoogleUpdateComRegisterShell64.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 Nx.UI.MessageCenter.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 0f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d432000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 Nx.UI.MessageCenter.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa62000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 Nx.UI.MessageCenter.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 04000000010000001000000087ce0b7b2a0e4900e158719b37a893720f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d43190000000100000010000000749966cecc95c1874194ca7203f9b6202000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 Nx.UI.MessageCenter.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2824 NSecRTS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2388 msiexec.exe 2388 msiexec.exe 1320 GoogleUpdate.exe 1320 GoogleUpdate.exe 1320 GoogleUpdate.exe 1320 GoogleUpdate.exe 1320 GoogleUpdate.exe 1320 GoogleUpdate.exe 1868 NSec.exe 932 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 792 NSecRTS.exe 792 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 992 NSecRTS.exe 992 NSecRTS.exe 2824 NSecRTS.exe 792 NSecRTS.exe 792 NSecRTS.exe 932 NSecRTS.exe 932 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 992 NSecRTS.exe 992 NSecRTS.exe 792 NSecRTS.exe 792 NSecRTS.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 NSecRTS.exe -
Suspicious behavior: LoadsDriver 25 IoCs
pid Process 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2104 msiexec.exe Token: SeIncreaseQuotaPrivilege 2104 msiexec.exe Token: SeRestorePrivilege 2388 msiexec.exe Token: SeTakeOwnershipPrivilege 2388 msiexec.exe Token: SeSecurityPrivilege 2388 msiexec.exe Token: SeCreateTokenPrivilege 2104 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2104 msiexec.exe Token: SeLockMemoryPrivilege 2104 msiexec.exe Token: SeIncreaseQuotaPrivilege 2104 msiexec.exe Token: SeMachineAccountPrivilege 2104 msiexec.exe Token: SeTcbPrivilege 2104 msiexec.exe Token: SeSecurityPrivilege 2104 msiexec.exe Token: SeTakeOwnershipPrivilege 2104 msiexec.exe Token: SeLoadDriverPrivilege 2104 msiexec.exe Token: SeSystemProfilePrivilege 2104 msiexec.exe Token: SeSystemtimePrivilege 2104 msiexec.exe Token: SeProfSingleProcessPrivilege 2104 msiexec.exe Token: SeIncBasePriorityPrivilege 2104 msiexec.exe Token: SeCreatePagefilePrivilege 2104 msiexec.exe Token: SeCreatePermanentPrivilege 2104 msiexec.exe Token: SeBackupPrivilege 2104 msiexec.exe Token: SeRestorePrivilege 2104 msiexec.exe Token: SeShutdownPrivilege 2104 msiexec.exe Token: SeDebugPrivilege 2104 msiexec.exe Token: SeAuditPrivilege 2104 msiexec.exe Token: SeSystemEnvironmentPrivilege 2104 msiexec.exe Token: SeChangeNotifyPrivilege 2104 msiexec.exe Token: SeRemoteShutdownPrivilege 2104 msiexec.exe Token: SeUndockPrivilege 2104 msiexec.exe Token: SeSyncAgentPrivilege 2104 msiexec.exe Token: SeEnableDelegationPrivilege 2104 msiexec.exe Token: SeManageVolumePrivilege 2104 msiexec.exe Token: SeImpersonatePrivilege 2104 msiexec.exe Token: SeCreateGlobalPrivilege 2104 msiexec.exe Token: SeCreateTokenPrivilege 2104 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2104 msiexec.exe Token: SeLockMemoryPrivilege 2104 msiexec.exe Token: SeIncreaseQuotaPrivilege 2104 msiexec.exe Token: SeMachineAccountPrivilege 2104 msiexec.exe Token: SeTcbPrivilege 2104 msiexec.exe Token: SeSecurityPrivilege 2104 msiexec.exe Token: SeTakeOwnershipPrivilege 2104 msiexec.exe Token: SeLoadDriverPrivilege 2104 msiexec.exe Token: SeSystemProfilePrivilege 2104 msiexec.exe Token: SeSystemtimePrivilege 2104 msiexec.exe Token: SeProfSingleProcessPrivilege 2104 msiexec.exe Token: SeIncBasePriorityPrivilege 2104 msiexec.exe Token: SeCreatePagefilePrivilege 2104 msiexec.exe Token: SeCreatePermanentPrivilege 2104 msiexec.exe Token: SeBackupPrivilege 2104 msiexec.exe Token: SeRestorePrivilege 2104 msiexec.exe Token: SeShutdownPrivilege 2104 msiexec.exe Token: SeDebugPrivilege 2104 msiexec.exe Token: SeAuditPrivilege 2104 msiexec.exe Token: SeSystemEnvironmentPrivilege 2104 msiexec.exe Token: SeChangeNotifyPrivilege 2104 msiexec.exe Token: SeRemoteShutdownPrivilege 2104 msiexec.exe Token: SeUndockPrivilege 2104 msiexec.exe Token: SeSyncAgentPrivilege 2104 msiexec.exe Token: SeEnableDelegationPrivilege 2104 msiexec.exe Token: SeManageVolumePrivilege 2104 msiexec.exe Token: SeImpersonatePrivilege 2104 msiexec.exe Token: SeCreateGlobalPrivilege 2104 msiexec.exe Token: SeCreateTokenPrivilege 2104 msiexec.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 2104 msiexec.exe 2104 msiexec.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1868 NSec.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 2824 NSecRTS.exe 792 NSecRTS.exe 792 NSecRTS.exe 792 NSecRTS.exe 792 NSecRTS.exe 760 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2076 2388 msiexec.exe 31 PID 2388 wrote to memory of 2076 2388 msiexec.exe 31 PID 2388 wrote to memory of 2076 2388 msiexec.exe 31 PID 2388 wrote to memory of 2076 2388 msiexec.exe 31 PID 2388 wrote to memory of 2076 2388 msiexec.exe 31 PID 2388 wrote to memory of 2076 2388 msiexec.exe 31 PID 2388 wrote to memory of 2076 2388 msiexec.exe 31 PID 2388 wrote to memory of 740 2388 msiexec.exe 36 PID 2388 wrote to memory of 740 2388 msiexec.exe 36 PID 2388 wrote to memory of 740 2388 msiexec.exe 36 PID 2388 wrote to memory of 740 2388 msiexec.exe 36 PID 2388 wrote to memory of 740 2388 msiexec.exe 36 PID 2388 wrote to memory of 740 2388 msiexec.exe 36 PID 2388 wrote to memory of 740 2388 msiexec.exe 36 PID 2076 wrote to memory of 1760 2076 MsiExec.exe 37 PID 2076 wrote to memory of 1760 2076 MsiExec.exe 37 PID 2076 wrote to memory of 1760 2076 MsiExec.exe 37 PID 2076 wrote to memory of 1760 2076 MsiExec.exe 37 PID 2076 wrote to memory of 1760 2076 MsiExec.exe 37 PID 2076 wrote to memory of 1760 2076 MsiExec.exe 37 PID 2076 wrote to memory of 1760 2076 MsiExec.exe 37 PID 1760 wrote to memory of 1320 1760 ChromeSetup.exe 38 PID 1760 wrote to memory of 1320 1760 ChromeSetup.exe 38 PID 1760 wrote to memory of 1320 1760 ChromeSetup.exe 38 PID 1760 wrote to memory of 1320 1760 ChromeSetup.exe 38 PID 1760 wrote to memory of 1320 1760 ChromeSetup.exe 38 PID 1760 wrote to memory of 1320 1760 ChromeSetup.exe 38 PID 1760 wrote to memory of 1320 1760 ChromeSetup.exe 38 PID 1320 wrote to memory of 2412 1320 GoogleUpdate.exe 39 PID 1320 wrote to memory of 2412 1320 GoogleUpdate.exe 39 PID 1320 wrote to memory of 2412 1320 GoogleUpdate.exe 39 PID 1320 wrote to memory of 2412 1320 GoogleUpdate.exe 39 PID 1320 wrote to memory of 2412 1320 GoogleUpdate.exe 39 PID 1320 wrote to memory of 2412 1320 GoogleUpdate.exe 39 PID 1320 wrote to memory of 2412 1320 GoogleUpdate.exe 39 PID 1320 wrote to memory of 1692 1320 GoogleUpdate.exe 40 PID 1320 wrote to memory of 1692 1320 GoogleUpdate.exe 40 PID 1320 wrote to memory of 1692 1320 GoogleUpdate.exe 40 PID 1320 wrote to memory of 1692 1320 GoogleUpdate.exe 40 PID 1320 wrote to memory of 1692 1320 GoogleUpdate.exe 40 PID 1320 wrote to memory of 1692 1320 GoogleUpdate.exe 40 PID 1320 wrote to memory of 1692 1320 GoogleUpdate.exe 40 PID 1692 wrote to memory of 556 1692 GoogleUpdate.exe 41 PID 1692 wrote to memory of 556 1692 GoogleUpdate.exe 41 PID 1692 wrote to memory of 556 1692 GoogleUpdate.exe 41 PID 1692 wrote to memory of 556 1692 GoogleUpdate.exe 41 PID 1692 wrote to memory of 584 1692 GoogleUpdate.exe 42 PID 1692 wrote to memory of 584 1692 GoogleUpdate.exe 42 PID 1692 wrote to memory of 584 1692 GoogleUpdate.exe 42 PID 1692 wrote to memory of 584 1692 GoogleUpdate.exe 42 PID 1692 wrote to memory of 1700 1692 GoogleUpdate.exe 43 PID 1692 wrote to memory of 1700 1692 GoogleUpdate.exe 43 PID 1692 wrote to memory of 1700 1692 GoogleUpdate.exe 43 PID 1692 wrote to memory of 1700 1692 GoogleUpdate.exe 43 PID 1320 wrote to memory of 1388 1320 GoogleUpdate.exe 44 PID 1320 wrote to memory of 1388 1320 GoogleUpdate.exe 44 PID 1320 wrote to memory of 1388 1320 GoogleUpdate.exe 44 PID 1320 wrote to memory of 1388 1320 GoogleUpdate.exe 44 PID 1320 wrote to memory of 1388 1320 GoogleUpdate.exe 44 PID 1320 wrote to memory of 1388 1320 GoogleUpdate.exe 44 PID 1320 wrote to memory of 1388 1320 GoogleUpdate.exe 44 PID 1320 wrote to memory of 2952 1320 GoogleUpdate.exe 45 PID 1320 wrote to memory of 2952 1320 GoogleUpdate.exe 45 PID 1320 wrote to memory of 2952 1320 GoogleUpdate.exe 45 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NSecRTS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\SoftwareSASGeneration = "1" NSecRTS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer NSecRTS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutorun = "0" NSecRTS.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Chrome-h.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2104
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 91FC477124DC8127A185D9DCA4001CEA C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Chrome\ChromeSetup.exe"C:\Program Files (x86)\Chrome\ChromeSetup.exe"3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Google\Temp\GUMDECC.tmp\GoogleUpdate.exe"C:\Program Files (x86)\Google\Temp\GUMDECC.tmp\GoogleUpdate.exe" /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={9F0C1F44-1C50-396A-483A-08DA4896FF0B}&lang=zh-CN&browser=4&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty"4⤵
- Event Triggered Execution: Image File Execution Options Injection
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2412
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:556
-
-
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:584
-
-
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1700
-
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgaW5zdGFsbF90aW1lX21zPSI2NDAiLz48L2FwcD48L3JlcXVlc3Q-5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1388
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /handoff "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={9F0C1F44-1C50-396A-483A-08DA4896FF0B}&lang=zh-CN&browser=4&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty" /installsource taggedmi /sessionid "{7EB3A942-D307-46E5-BA94-087CB173B4BA}"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2952
-
-
-
-
C:\Program Files (x86)\setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe"C:\Program Files (x86)\setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe" /silent3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Program Files (x86)\Common Files\NSEC\NSec.exe"C:\Program Files (x86)\Common Files\NSEC\NSec.exe" -ip4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1868
-
-
C:\Program Files (x86)\Common Files\NSEC\instrap.exe"C:\Program Files (x86)\Common Files\NSEC\instrap.exe"4⤵
- Enumerates connected drives
- Executes dropped EXE
- Loads dropped DLL
PID:1372 -
C:\Program Files (x86)\Common Files\NSEC\NSecRTS.exe"C:\Program Files (x86)\Common Files\NSEC\NSecRTS.exe" -i5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1716
-
-
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 56B254A786CE91322724385F578951A42⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:740
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2736
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004CC" "00000000000005D4"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2480
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Program Files (x86)\Google\Update\Install\{ADD870CE-2D68-43F3-9812-AD43DB6FBF94}\109.0.5414.120_chrome_installer.exe"C:\Program Files (x86)\Google\Update\Install\{ADD870CE-2D68-43F3-9812-AD43DB6FBF94}\109.0.5414.120_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{ADD870CE-2D68-43F3-9812-AD43DB6FBF94}\gui27ED.tmp"2⤵
- Executes dropped EXE
PID:2876 -
C:\Program Files (x86)\Google\Update\Install\{ADD870CE-2D68-43F3-9812-AD43DB6FBF94}\CR_5EEF6.tmp\setup.exe"C:\Program Files (x86)\Google\Update\Install\{ADD870CE-2D68-43F3-9812-AD43DB6FBF94}\CR_5EEF6.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Google\Update\Install\{ADD870CE-2D68-43F3-9812-AD43DB6FBF94}\CR_5EEF6.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{ADD870CE-2D68-43F3-9812-AD43DB6FBF94}\gui27ED.tmp"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Program Files directory
- Executes dropped EXE
- Modifies registry class
PID:1740 -
C:\Program Files (x86)\Google\Update\Install\{ADD870CE-2D68-43F3-9812-AD43DB6FBF94}\CR_5EEF6.tmp\setup.exe"C:\Program Files (x86)\Google\Update\Install\{ADD870CE-2D68-43F3-9812-AD43DB6FBF94}\CR_5EEF6.tmp\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=109.0.5414.120 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fc91148,0x13fc91158,0x13fc911684⤵
- Executes dropped EXE
PID:3056
-
-
C:\Program Files (x86)\Google\Update\Install\{ADD870CE-2D68-43F3-9812-AD43DB6FBF94}\CR_5EEF6.tmp\setup.exe"C:\Program Files (x86)\Google\Update\Install\{ADD870CE-2D68-43F3-9812-AD43DB6FBF94}\CR_5EEF6.tmp\setup.exe" --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:3016 -
C:\Program Files (x86)\Google\Update\Install\{ADD870CE-2D68-43F3-9812-AD43DB6FBF94}\CR_5EEF6.tmp\setup.exe"C:\Program Files (x86)\Google\Update\Install\{ADD870CE-2D68-43F3-9812-AD43DB6FBF94}\CR_5EEF6.tmp\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=109.0.5414.120 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fc91148,0x13fc91158,0x13fc911685⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:1696
-
-
-
-
-
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler.exe"2⤵
- Executes dropped EXE
PID:2332
-
-
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler64.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler64.exe"2⤵
- Executes dropped EXE
PID:2284
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzA3IiBzb3VyY2VfdXJsX2luZGV4PSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iMzA3MyIgZG93bmxvYWRfdGltZV9tcz0iMTI5MzIiIGRvd25sb2FkZWQ9IjkzMTIyNjAwIiB0b3RhbD0iOTMxMjI2MDAiIGluc3RhbGxfdGltZV9tcz0iMjg3ODIiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- System Network Configuration Discovery: Internet Connection Discovery
PID:2160
-
-
C:\Program Files (x86)\Common Files\NSEC\NSecRTS.exe"C:\Program Files (x86)\Common Files\NSEC\NSecRTS.exe" -r1⤵
- Server Software Component: Terminal Services DLL
- Enumerates connected drives
- Drops file in System32 directory
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:932 -
C:\Program Files (x86)\Common Files\NSEC\fixit.exe"C:\Program Files (x86)\Common Files\NSEC\fixit.exe" -df -flag=000002042⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Program Files (x86)\Common Files\NSEC\Plugins\wg\wg.exe"C:\Program Files (x86)\Common Files\NSEC\Plugins\wg\wg.exe" genkey2⤵
- Executes dropped EXE
PID:2544
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c type "C:\Program Files (x86)\Common Files\NSEC\Data\netguard_privateKey.key" | "C:\Program Files (x86)\Common Files\NSEC\Plugins\wg\wg.exe" pubkey > "C:\Program Files (x86)\Common Files\NSEC\Data\netguard_publicKey.key"2⤵
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c type "C:\Program Files (x86)\Common Files\NSEC\Data\netguard_privateKey.key"3⤵
- System Location Discovery: System Language Discovery
PID:1580
-
-
C:\Program Files (x86)\Common Files\NSEC\Plugins\wg\wg.exe"C:\Program Files (x86)\Common Files\NSEC\Plugins\wg\wg.exe" pubkey3⤵
- Executes dropped EXE
PID:3028
-
-
-
C:\Program Files (x86)\Common Files\NSEC\NSecRTS.exe"C:\Program Files (x86)\Common Files\NSEC\NSecRTS.exe" -elevated2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2824 -
C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe"C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe"3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:656
-
-
C:\Program Files (x86)\Common Files\NSEC\x64\NSecRTS.exe"C:\Program Files (x86)\Common Files\NSEC\x64\NSecRTS.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:792
-
-
-
C:\Program Files (x86)\Common Files\NSEC\NSecDs.exe"C:\Program Files (x86)\Common Files\NSEC\NSecDs.exe" /Service2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2184
-
-
C:\Windows\SysWOW64\net.exenet start NSecDs2⤵PID:1924
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start NSecDs3⤵
- System Location Discovery: System Language Discovery
PID:496
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" "C:\Program Files (x86)\Common Files\NSEC\plugins\NSecUI\NSecRTX2.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:976
-
-
C:\Windows\SysWOW64\net.exenet stop mswtd2⤵PID:2896
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mswtd3⤵PID:2940
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe "/C systeminfo"2⤵
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo"3⤵
- Gathers system information
- Modifies data under HKEY_USERS
PID:580
-
-
-
C:\Windows\SysWOW64\sc.exesc delete mswtd2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Program Files (x86)\Microsoft Research\NSEC\NShellExt32.dll"2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2180
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Program Files (x86)\Microsoft Research\NSEC\NShellExt64.dll"2⤵
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Microsoft Research\NSEC\NShellExt64.dll"3⤵
- Modifies registry class
PID:2396
-
-
-
C:\Program Files (x86)\Common Files\NSEC\NSecRTS.exe"C:\Program Files (x86)\Common Files\NSEC\NSecRTS.exe" -install_nfsflt_drivers2⤵
- Executes dropped EXE
PID:2860 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\setupapi.dll,InstallHinfSection DefaultInstall 132 C:\Program Files (x86)\Common Files\NSEC\drivers\nfsflt\arm\nFsFlt64.inf3⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Windows directory
PID:556 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r4⤵
- Modifies data under HKEY_USERS
PID:1272 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o5⤵
- Modifies data under HKEY_USERS
PID:964
-
-
-
-
-
C:\Windows\SysWOW64\net.exenet start NSecKrnl2⤵
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start NSecKrnl3⤵
- System Location Discovery: System Language Discovery
PID:2360
-
-
-
C:\Program Files (x86)\Common Files\NSEC\x64\NSecRTS.exe"C:\Program Files (x86)\Common Files\NSEC\x64\NSecRTS.exe" -i2⤵
- Executes dropped EXE
PID:960
-
-
C:\Windows\SysWOW64\net.exenet start nFsFlt2⤵
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nFsFlt3⤵
- System Location Discovery: System Language Discovery
PID:1588
-
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic qfe GET hotfixid2⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2812
-
-
C:\Windows\SysWOW64\net.exenet start NSecKrnl2⤵
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start NSecKrnl3⤵
- System Location Discovery: System Language Discovery
PID:1936
-
-
-
C:\Windows\SysWOW64\net.exenet start nFsFlt2⤵
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nFsFlt3⤵PID:336
-
-
-
C:\Windows\SysWOW64\net.exenet start nFsFlt2⤵PID:1632
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nFsFlt3⤵
- System Location Discovery: System Language Discovery
PID:1388
-
-
-
C:\Windows\SysWOW64\net.exenet start NSecKrnl2⤵
- System Location Discovery: System Language Discovery
PID:2088 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start NSecKrnl3⤵
- System Location Discovery: System Language Discovery
PID:1388
-
-
-
C:\Windows\SysWOW64\wusa.exe"C:\Windows\system32\wusa.exe" "C:\Program Files (x86)\Common Files\NSEC\Plugins\windows_updates\windows6.1-kb4474419-v3-x64_b5614c6cea5cb4e198717789633dca16308ef79c.msu" /quiet /norestart2⤵
- Drops file in Windows directory
PID:2560
-
-
C:\Windows\SysWOW64\wusa.exe"C:\Windows\system32\wusa.exe" "C:\Program Files (x86)\Common Files\NSEC\Plugins\windows_updates\windows6.1-kb4490628-x64_d3de52d6987f7c8bdc2c015dca69eac96047c76e.msu" /quiet /norestart2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3304
-
-
C:\Windows\SysWOW64\net.exenet start nFsFlt2⤵
- System Location Discovery: System Language Discovery
PID:3340 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nFsFlt3⤵
- System Location Discovery: System Language Discovery
PID:3696
-
-
-
C:\Windows\SysWOW64\net.exenet start NSecKrnl2⤵
- System Location Discovery: System Language Discovery
PID:3812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start NSecKrnl3⤵
- System Location Discovery: System Language Discovery
PID:3332
-
-
-
C:\Windows\SysWOW64\net.exenet start nFsFlt2⤵
- System Location Discovery: System Language Discovery
PID:3544 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nFsFlt3⤵
- System Location Discovery: System Language Discovery
PID:3168
-
-
-
C:\Windows\SysWOW64\net.exenet start NSecKrnl2⤵
- System Location Discovery: System Language Discovery
PID:3612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start NSecKrnl3⤵
- System Location Discovery: System Language Discovery
PID:3712
-
-
-
C:\Windows\SysWOW64\net.exenet start NSecKrnl2⤵
- System Location Discovery: System Language Discovery
PID:3268 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start NSecKrnl3⤵PID:3292
-
-
-
C:\Windows\SysWOW64\net.exenet start nFsFlt2⤵
- System Location Discovery: System Language Discovery
PID:3376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nFsFlt3⤵PID:3404
-
-
-
C:\Program Files (x86)\Common Files\NSEC\Plugins\7z\7z.exe"C:\Program Files (x86)\Common Files\NSEC\Plugins\7z\7z.exe" x -y -aoa -o"C:\Program Files (x86)\Common Files\NSEC\res" "C:\Program Files (x86)\Common Files\NSEC\icon.zip"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1316
-
-
C:\Windows\SysWOW64\net.exenet start NSecKrnl2⤵PID:3952
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start NSecKrnl3⤵PID:3844
-
-
-
C:\Windows\SysWOW64\net.exenet start nFsFlt2⤵
- System Location Discovery: System Language Discovery
PID:924 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nFsFlt3⤵PID:3528
-
-
-
C:\Windows\SysWOW64\net.exenet start NSecKrnl2⤵
- System Location Discovery: System Language Discovery
PID:4092 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start NSecKrnl3⤵PID:3100
-
-
-
C:\Windows\SysWOW64\net.exenet start nFsFlt2⤵PID:3220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nFsFlt3⤵PID:3300
-
-
-
C:\Windows\SysWOW64\net.exenet start NSecKrnl2⤵
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start NSecKrnl3⤵
- System Location Discovery: System Language Discovery
PID:3456
-
-
-
C:\Windows\SysWOW64\net.exenet start nFsFlt2⤵
- System Location Discovery: System Language Discovery
PID:3468 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nFsFlt3⤵
- System Location Discovery: System Language Discovery
PID:3596
-
-
-
C:\Windows\SysWOW64\net.exenet start nFsFlt2⤵
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nFsFlt3⤵PID:2152
-
-
-
C:\Windows\SysWOW64\net.exenet start NSecKrnl2⤵
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start NSecKrnl3⤵PID:1856
-
-
-
C:\Windows\SysWOW64\net.exenet start nFsFlt2⤵
- System Location Discovery: System Language Discovery
PID:3444 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nFsFlt3⤵PID:2944
-
-
-
C:\Windows\SysWOW64\net.exenet start NSecKrnl2⤵
- System Location Discovery: System Language Discovery
PID:3756 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start NSecKrnl3⤵PID:3864
-
-
-
C:\Windows\SysWOW64\net.exenet start nFsFlt2⤵PID:3908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nFsFlt3⤵
- System Location Discovery: System Language Discovery
PID:3936
-
-
-
C:\Windows\SysWOW64\net.exenet start NSecKrnl2⤵
- System Location Discovery: System Language Discovery
PID:3556 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start NSecKrnl3⤵
- System Location Discovery: System Language Discovery
PID:3732
-
-
-
C:\Program Files (x86)\Common Files\NSEC\NSecDs.exe"C:\Program Files (x86)\Common Files\NSEC\NSecDs.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2196
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k NetworkServicePnp1⤵
- System Location Discovery: System Language Discovery
PID:1392 -
C:\Program Files (x86)\Microsoft Research\NSEC\Fixit.exe"C:\Program Files (x86)\Microsoft Research\NSEC\Fixit.exe" -dfx2⤵
- Executes dropped EXE
PID:2104
-
-
C:\Program Files (x86)\Common Files\NSEC\x64\NSecRTS.exe"C:\Program Files (x86)\Common Files\NSEC\x64\NSecRTS.exe" -r1⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:992
-
C:\Program Files (x86)\Common Files\NSEC\plugins\NSecUI\NSecRTX2.exe"C:\Program Files (x86)\Common Files\NSEC\plugins\NSecUI\NSecRTX2.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2760
-
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateOnDemand.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateOnDemand.exe" -Embedding1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1936 -
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ondemand2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --from-installer3⤵
- Checks computer location settings
- Checks system information in the registry
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=109.0.5414.120 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5276b58,0x7fef5276b68,0x7fef5276b784⤵
- Executes dropped EXE
PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1292 --field-trial-handle=1376,i,7179102461451316157,10273781443324047807,131072 /prefetch:24⤵
- Executes dropped EXE
PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1584 --field-trial-handle=1376,i,7179102461451316157,10273781443324047807,131072 /prefetch:84⤵
- Executes dropped EXE
PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1740 --field-trial-handle=1376,i,7179102461451316157,10273781443324047807,131072 /prefetch:84⤵
- Executes dropped EXE
PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1376,i,7179102461451316157,10273781443324047807,131072 /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2296 --field-trial-handle=1376,i,7179102461451316157,10273781443324047807,131072 /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3220 --field-trial-handle=1376,i,7179102461451316157,10273781443324047807,131072 /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2680 --field-trial-handle=1376,i,7179102461451316157,10273781443324047807,131072 /prefetch:84⤵
- Executes dropped EXE
PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1624 --field-trial-handle=1376,i,7179102461451316157,10273781443324047807,131072 /prefetch:24⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:3844
-
-
-
-
C:\Program Files\Google\Chrome\Application\109.0.5414.120\elevation_service.exe"C:\Program Files\Google\Chrome\Application\109.0.5414.120\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3336
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Defense Evasion
Impair Defenses
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD586912ce0c849e8cfbde651ce359e84aa
SHA1c1d58ceff7d1b092789c05dc5286d971d6c264fc
SHA256a1205e6a48ec6a0eddd0ace8d37df3001c69eefde6c7b3fae3b0bef11ba21dbf
SHA5122ad6d801f2529b8301ba1b7f74fe121a0c2d5c069e344c6e6079e764b5065e4c6fcf5af952bf449373e7f231ecb8f41c777179622d518935ef169e7ed1d7bdca
-
Filesize
2KB
MD53d44bb4751a791b4548a296433d8f55c
SHA1e8a65a37e454818991fc0e4e7a300e8087d27111
SHA2568e3dcf35f7425505e705ed8d11f613dc652fc56eaaa808c48e5b309f42f86732
SHA512958d944db53848495d5dc69ccd16797ea2b79ed02564fa8d17400d7110d545cce5118870bd4d6bc1c6c4f05c716a8255601ae478557ef3426745d13dcb11f24b
-
Filesize
3KB
MD592506a25bc8d5d6538a417530386b4cf
SHA1f5a87b1336d5dfc8ed45b3e6420c02f98cfab436
SHA2568077477a73a82fe7587117fb9d045e4e84acd954ecbcddc62a7136b1e1f4f6cc
SHA512c6d24af5688341fb4c2a54ba92499808931dbed7068af248eb4a6868955f8a2aea2573ed677a14fe7fdf23de6267e1bfc08a869b8ee2a44f05cd62dedd37e5f5
-
Filesize
5KB
MD5ef8d0e50531468726f0db8441172575e
SHA146cf066df1364195ebd890475c387301817a0d7a
SHA2560b479f69f533b5a0112b7d0239c5033eab7a8d95a6a02d45b1a0513c2f92cc7b
SHA5129899f7f9474d9e0869048a883002f55021e4df0b271cb265e2e734900362f5c38a3402e2f15475e613053fd499f07ba5ad51d9b1eecd2da7a1f36120544368fd
-
Filesize
3KB
MD5d795eee37d6240f7fb485506aa0deb73
SHA11ca69017be4673a6a568e527052099f441bdf2f9
SHA2563705332fa3065cd017da8564794aa9f126cfda49a688285c98a08d0190b1af06
SHA51268627d069de75c81f24157a3363e734291e0c47a099c313412cffabe858511bc36a632333599d0b4b6e6c08a28ba1e538a0479f447f08af65d7b33e840ce467f
-
Filesize
4KB
MD50b86ecb5dcd59860acf7d4f8c4235301
SHA1a140df2df1f250dbdcc8f37a0cda4bd9e8c3b995
SHA2564c525a0a2a5a4c09367b5ad84dc9b3096c4214050539d9aa8f15c2eb765ba6d3
SHA512534a0f12a0637db8b970e47a820ff9b1b261e6f78d9e458521261ba4dad5647ddd0823bda202668db7d43e7abc05a4b24ccb76f5b3c4014b21b69527da2bbf93
-
Filesize
42B
MD509bdb3a5c36461e06d789722d99a595c
SHA14184714aae591f79fdf82d9ce7bd864ec73ee90f
SHA25635d9e7571c3e29f8bedbf82b226067d3710e19e20088f4403bb0072cd00402cc
SHA5129366aae5e3818a76e2d63fd421e1ef991bc89c30576a5b17a213bdccca5471ab8fded884cf9a0a1bf4cda35705652e113c45b3c17cd0a14654d5b1d417b10cbe
-
Filesize
1.3MB
MD54a94844260d6a08828d781d488cef61d
SHA1de8169fdb5ab8a120df577d92eb25a2767431738
SHA25646d7a8abe3bb9d7302529246cd8ee6e7d0360d1045fe92662cc7580e72ef5132
SHA51282549c1e525a90003fb0174ebba2bc3b4f58706ef9fd5e6ee07d489ab536ef286e408db6c15a52b039d3f59c09bd55e35d045def79007da5d414d5d589d34f4f
-
Filesize
12KB
MD5ead2e144d5ff2a74a0dd09bb3360f8cb
SHA19c7f50b8205455bba3d5e9221e579552302a36aa
SHA256b9832d26b6940d0efcf4c93a7b09fca4df6d77586d127db002cf18e13e936871
SHA512753cc2594c3399676e4ef1013c8f9444ed914c3c7bff3b397cce8b94842a3a27a7de858fdcaacbdee5a33ab168335fe3ba01413a16c1a788bcfb85a61513a60f
-
Filesize
12KB
MD5d9c5a18131ec711625c192048d98b7fd
SHA1eb7ec99e20c5d20d946b30a9848495906bddf9d8
SHA25698c5a487d5117e50002e385d609269cca475515971e65149162fb36da4c9f2e9
SHA512ae8338cb3fd5143c65471ba41222559c0a100f948037c0ac6b7db3a32647ad6c253131a4070078b905de14e58f65fce102aecd93923ced0981f7b94fa7d51d64
-
Filesize
12KB
MD5e135ab979e12c87c353022198b3a9c1a
SHA142a6f7c44c55816912c8f9ad7e0dd686fa50fe34
SHA25652192f754f2e3a158210ea35d2df83c19bf0ae5a920abfecb0b02f62cffb5b66
SHA512c723909afa61c8c774e43b4bf555839b52ed3e4267f4846d8042334cf1bddfc89cf935a12e0ef3604d900d4352f0ac99a486d7276c33c43bda7b7ed6d180a693
-
Filesize
24KB
MD5f552cd2c80b213beb4ea8d4cfb5c13b1
SHA1785ca27d87056d47c25845002659ef9cd87fe62a
SHA256738598e805d4fa1cab38830424e700ca18262e377d67483ab4cedf83f6a52290
SHA5129d1ec395b14a6011c1c9bd3e07d57d199581bbdba688d003e691d7a19d7ae79ebda6acd2a2f641ab732763b3051b6b6929ace663e299328f8cf750903588fea9
-
Filesize
320B
MD57f9edbcdc5445d8a24b81521705f5cd2
SHA103e95431c25351f878493a13d098ce38bd2f6593
SHA256d54b9a438f1ac02afc76531d4efe534b851ff4ee6ba969777a6e51d93c0a1029
SHA512b672293af1b53088f038770d8bea10d543d89b109f6f1c23a4ffeed4fa7db77d81397c034778599b97f196f15cfb2f354b00cf86d020fc752c75d096702b5d25
-
Filesize
777B
MD5752ea02d74c0f0cde557aeec486fd26d
SHA161e62ba223f34a60368e578c2e4b3897efbfd404
SHA25650ff678f01a0518e81d2e37878fbc9c398ea614845c7de1d28930105ba482058
SHA5121789c99e428475fe3d90b3a0ae4d1831beed568be3cfdfefde2c88c89b00926079888719b80c505a5d4e842e4dcbee35e36b41f57ef1fd0e18810440c72463f8
-
Filesize
2.9MB
MD5deb2bb69ceb270527d79a73fd3a2cc85
SHA18a9d82ca0038e6e26261648b19227430244a8f67
SHA256f390d67535f1a915b55fd501e7c228cfc0513236d1380fa2e69760eb49be84c1
SHA51205f9ed9637c0a2ad9c2f2b6cadb43c61c3fb0b0b3e89df55daa43b229cce84602c1800c6da338bdea58e7e7498042ed9c4aec41eed2303c2dacda113e59c4b98
-
Filesize
294KB
MD5a11ce10ac47f5f83b9bc980567331a1b
SHA163ee42e347b0328f8d71a3aa4dde4c6dc46da726
SHA256101dbf984c4b3876defe2699d6160acbf1bb3f213e02a32f08fdcdc06821c542
SHA512ff2f86c4061188ead1bfeebd36de7dbc312adcc95267537697f2bfcbb0c53e7c4ab0cd268cef22f0182391796c4612c97cbdc1266d9ee1960cdd2610d8c2bcb3
-
Filesize
392KB
MD5b659663611a4c2216dff5ab1b60dd089
SHA19a14392a5bdb9ea6b8c3e60224b7ff37091d48b5
SHA256cad4aa1cf58f6b2e2aceb789d53b18418e67066ec406b2fac786cb845ef89d2b
SHA5121065f9072cd6f1f4364f1354108f2647ee1d89f87e908a22fcd63bd3149c864c457e62268067a439d0486d8d4aa150aa984ad8ac8b51cae49014b67b80496040
-
Filesize
181KB
MD5be535d8b68dd064442f73211466e5987
SHA1aa49313d9513fd9c2d2b25da09ea24d09cc03435
SHA256c109bcb63391ac3ea93fb97fbdf3f6ed71316cacb592ef46efaea0024bc9ed59
SHA512eb50eebeaf83be10aea8088e35a807f9001d07d17d2bc1655c3bc0cb254d0f54303348988514ba5590ebd9d3bde3f1149c3f700f62fbce63c0199ea3cfb1f638
-
Filesize
217KB
MD5af51ea4d9828e21f72e935b0deae50f2
SHA1c7fe57c2a16c9f5a5ebdd3cc0910427cba5308bd
SHA2563575011873d0f6d49c783095dae06e6619f8f5463da578fbe284ca5d1d449619
SHA512ec9828d0bade39754748fb53cfc7efdc5e57955198bac3c248ea9b5a9a607182bb1477819f220549a8e9eadbe6bf69a12da6c8af3761980d2dd9078eaeaa932f
-
Filesize
1.9MB
MD5dae72b4b8bcf62780d63b9cbb5b36b35
SHA11d9b764661cfe4ee0f0388ff75fd0f6866a9cd89
SHA256b0ca6700e7a4ea667d91bcf3338699f28649c2e0a3c0d8b4f2d146ab7c843ab6
SHA512402c00cab6dac8981e200b6b8b4263038d76afe47c473d5f2abf0406222b32fff727b495c6b754d207af2778288203ce0774a6200b3e580e90299d08ce0c098f
-
Filesize
42KB
MD5849bc7e364e30f8ee4c157f50d5b695e
SHA1b52b8efa1f3a2c84f436f328decd2912efeb1b18
SHA256f1384a25a6f40e861455c62190d794415f3e9bfca6317c214847e9535dfc3fb9
SHA5126fd7f542a7073b3bbf1b0c200bb306b30f1b35a64a1fb013f25c7df76f63ef377d9bd736e8da2e9372f1c994785eaeedb6b60e3a0d4a4e8734c266ad61782d3b
-
Filesize
41KB
MD5163695df53cea0728f9f58a46a08e102
SHA171b39eec83260e2ccc299fac165414acb46958bd
SHA256f89dddda3e887385b42ea88118ba8fb1cc68fde0c07d44b851164564eb7c1ec8
SHA5126dfb70a175097f3c96ae815a563c185136cb5a35f361288cc81570facfa1f1d28f49eaa61172d1da4982ebb76bd3e32c4de77cf97dedfb79f18113d7594d0989
-
Filesize
44KB
MD5c523ec13643d74b187b26b410d39569b
SHA146aff0297036c60f22ad30d4e58f429890d9e09d
SHA25680505863866bcd93a7e617dd8160531401d6d05f48d595348cd321cf7d97aeac
SHA512ecf98e29a3481b05ab23c3ff89fa3caf054b874ed15462a5e33022aacf561d8fea4a0de35cc5f7450f62110ca4ace613e0c67f543ad22eb417e79eb3ebf24ed7
-
Filesize
44KB
MD5dafa45a82ce30cf2fd621e0a0b8c031f
SHA1e39ed5213f9bb02d9da2c889425fab8ca6978db7
SHA256d58e5f0fa894123de1d9b687a5b84826e095eca128ee5df8870f2db74f4233a2
SHA5122b772ebc128eb59d636eec36583329962ead8e0a399fd56394b1244486bf815f4e033ceef74a62a9930ab2bf6ec1ba5e2d3c942183f7cb2355a716a3e2c6c7a1
-
Filesize
44KB
MD539e25ba8d69f493e6f18c4ef0cf96de8
SHA15584a94a85d83514a46030c4165e8f7a942e63e2
SHA2561f66ebdcaae482a201a6e0fab9c1f4501c23a0d4ad819ccd555fdca9cc7edb94
SHA512773c995b449d64e36eb8cab174db29e29e29985bcfd714799d6b05b01bb7d4a0fc2aefaf2e27ff02b0e105fbe0d34d7efe29b193a1bc3365ec47e1f1003bed26
-
Filesize
43KB
MD5b9033db8d0e5bf254979b0f47d10e93d
SHA12859de0d851b5f4fd3056e8f9015cece2436c307
SHA25612c41c2f472b6a05fd6392e9d4f8aeb9a40840c2cbefd68b39d20f9d1d4d77ed
SHA51252075df4ae5c86ebb0bac20604ea072a163761ae058c1473211bf4bb0eeed043cfc5a92386f876b53484cdf4e3f8a7b75d8f4bf9894c24f8c22ec23a50b70b7c
-
Filesize
43KB
MD59f2e018a4f9a1d278983d0b677b91218
SHA1c58ee1fc0d8ef9d99f85426b48c7f28f381a2c17
SHA256d0dcdc68236eecd6b5f0b437eb92b8935741dabf1fa276a552399815af22edec
SHA51220b74b6a9f81527d4a5fe30671d2559261fb682576f4ab04da7856280fbbaeb6af83894009c9d7cb83deeae988d0ac5ec7ec32b277b7eb45829faec2857d7014
-
Filesize
45KB
MD596d92500b9a763f4b862c511c17e0a47
SHA12fd441eb8685d15e14fa6405e82359adea3e7148
SHA25658829d135ff41e574ed5fc5e0421e4aa204267b02ca3ffaf08d8efb0a70fdd4c
SHA512a1014584f1f278160d579848fa188f627676aee819e9395517490b00e273db6f583d7ddd31af6e35c9d251021df7fb26c88512aaa1c865c2ee3ba60c0a2db49a
-
Filesize
44KB
MD5ecdd26049573614b6f41d8a102ffcf21
SHA15140c6cff5d596267a64df1559ac36c4e8f49e42
SHA256a3377520f2a95b8cc06bd30e493962c07f97eebf4661a69d03efb36b2ca515c5
SHA512933c181d7575f20480c8deadac3f3e9190081456169122216c72e7b9a04aa75612140fc37697098c7c20b77001a67966fa1661cdc9110c40634c944f833a65b1
-
Filesize
42KB
MD5f82ccf890c3ae14bfd7a263d07276e60
SHA16a915d6eb8c99d065e36a721d721d556b74bb377
SHA2566b07a4fd3039541e30c68a8c31c371cda2cea480787f95e0ddbca3cc2fbff0cc
SHA5124cbf9e6728e08de8d61f34b17bb20d92b6a699969edb9afa013fe962c8fd39238288adcd826134c9bca459904d8574a804c519daac6b301e0d38f68722c0359e
-
Filesize
42KB
MD5741211652c66a8a6790396e1875eefa9
SHA12ccd5653b5fc78bcc19f86b493cef11844ba7a0c
SHA256e0945deacdb6b75ff2587dea975774b9b800747e2ee3f3917e5b40ddb87eda10
SHA512b70f847d8ca8828c89bbb67b543950fbd514c733cf62b52ad7fc0dab7b2168fe56d1f21bef3210f5c7f563f72831455d870a5f9aa6c557f1e3543ef7329c42f9
-
Filesize
43KB
MD51c0b1c3625c9ccace1b23e0c64095ee9
SHA13904a80d016e0a9a267c0b5feb8e6747b44b5fa1
SHA256f030757e1911e9efde0d74a02c22694fa5ef139f73897a7f97acab9da05f7c8b
SHA5120a988edef8d67cd83c2be65cbfa07059df311732ee92ad73fb9411d7cf7d853a2b8d2ab801733d05ab6afaccab33a2684117bbc1d80b362b677cc53ae9de42f0
-
Filesize
45KB
MD5dae64d49ee97339b7327b52c9f720848
SHA115f159c4808f9e4fe6a2f1a4a19faa5d84ac630b
SHA256e76400e62ae0ab31565e50b05d1001b775a91aa487a54dc90e53c0e103c717c2
SHA5129ae72e5a658aa0e1fb261d62ccef474cd42d9bec2b4a50f71925d131ffea22b8f60fb961772587ce71cb30a32da3b7986e7483ecea960a509e0450d3983c84b0
-
Filesize
42KB
MD5dfa1d51ca956e3aaa1008503aaeb3dd8
SHA194511faf996c1ce9b2397c7fc3f78f32fbf8f966
SHA2563781d18bab1524cff8104167caaccb7eee6614394068dbb7b7c412c7c9b5aae9
SHA512b25f9a14053acab26f1d353e9d908cbe769a640d0e8d66c30209c2a5d76c503b8e7fb04651f37ff482f7c4df4ffed33013d37b1f7bb6650e25447006f447b85d
-
Filesize
42KB
MD590d38d6669931e76faa1e69aee2ab3e2
SHA1e0de420b422c7ad4e73ace2c84db45f6db2b1d6e
SHA2561fe4bc690efc72cb8737d4b451c2c843d2987d71bf60723471bf66cf53fcc714
SHA5121cc66e166b4dc3b6c1f96340489652bd313d8d6de31a3165bac9da8fd42146843f840ee7a5f163512163fc8f90b865a06cc29a147c44389f40eb1edafd6d3743
-
Filesize
43KB
MD55c530468d61708123c8919a8480e5967
SHA12d85a2335bc688d2c2045299c1e36b39b179603e
SHA25621aa3b8d540c7b2ea33c4a11fb35fdd721b69f04a660edb2ac2031d98f38e239
SHA512bfe4ce4762ef5de853635a2341249012da27b7a02e3f4722841792345527d7951fb20661d1b7c8a58293c4ac5ee0b34cea0e190fa5f74efd12aeacba3c74a2aa
-
Filesize
44KB
MD57be40d81658abf5ad064b1d2b47bab85
SHA16275af886533320522a8aa5d56c1ce96bd951e50
SHA256a063ef2570a5ae5f43284ca29cf5b9723cdc5a013b7ee7743c1f35b21b4d6de3
SHA512fb9ebefdc2bd895c06971abef0ab1d3e7483c2e38b564881a723c38e39be1dc4e7ab6996e1d6fbe2ca5864909002342afc0a478eaa660ef18c891dc164e56153
-
Filesize
44KB
MD5463f8ddab25348ea0897ead89146402f
SHA1a0f160a05139ad95c066ebdac738789a796229c5
SHA256737210fd8e9a4c601693d0e9c95a323881d125b02f9f82b0a3820ca223b29af6
SHA512e40e59d8dca80b9860359feb464933e1c9644f8d57ff5a9fdff6e598b1805ee6b0c1757cef68f9c9bb330dc3cce0fd285f22764cd2f6007d0ea42c792e61d262
-
Filesize
44KB
MD5bab8d0e0de3cce8c6bb37f0ad0c32998
SHA18e874d3fa8964445af18edd2261c29d32fce949a
SHA25668f33b5cc51cc5acacfb4b8e2501f2f15f586ba8d355773f941bf3818f4d0456
SHA512f71f2d5c657cd934521a14c9b0a4807a3b8635d4bef0ced77f095a3a71eb1963cbbe7cbba5acf34b8fecba0413f608b30fe250df893d2c42a07214d7308f1897
-
Filesize
43KB
MD5c49920211ea0dbcf0e345fca094d861a
SHA107280830e9dbe42cb92987432ec16b5811710582
SHA25620c2df074927fd7e2fc62f346e0b4fb55823a3d4d531f861bf50de96ac64d092
SHA512ae6a6b0df91d95cf7a510aa1195ce1da89f06245cae427ca7b5a72874bffd81d03c2fdd01c9ef478e303a9741ea5aa38c8b6f2f136652798aa531569916d3bf2
-
Filesize
43KB
MD52716da909b0391389cbe63c4ac400a57
SHA1bd393b5d1628dc5f3c4a5f97442841dfffe82201
SHA256e211322d446dbe1c37696583be70a6b4b60536b60e7a188d7f3e186b72e5c438
SHA51284d495de33a70bce97a1ceaab229656089d8b615e649b39ce43a400fc91d0d62637987a0425b6fa573870c3e6ae3bbc9b1f7e7777bb20479d54f514f9a5763ed
-
Filesize
43KB
MD5643d812265c32ef08d24ad85a4e96865
SHA13c576de29d0aff8b727856e16b0aefca81f9fd83
SHA2568a9fb1677b9ff34a15dae299bdffdb1a2eb2d31d18c8f424b00a8779d2c2a7ce
SHA51257c9acf0710f10f5d1478603ce47506a2147722c639366ef0b0330be7d278fc0fd2089a7d49e5a514d524c37bb282e8c9c8cd2290da6df7d741228e32645de32
-
Filesize
42KB
MD5ee84269990052544e742980dbaf0d83f
SHA152aa93d2a7143429e8af23aa82d02d08f82c53a4
SHA2569f6e7f7eb54e9016536f99c0b4be8860957d89083a40f571e28fade5dd7b74fd
SHA5124d2e5cc0d395d645b8134a71b10cab84c74a8058c0d45db4d45ce6e72153fedfb752ef0c0262eb28966d1dd2065cc59bc5aa86643736216eedb4a1bff60e710f
-
Filesize
42KB
MD560356f1cf81af2df4f1249e44746e6c7
SHA12ef6d5a8fc130f2f64b462f3570ba7ca2251bb22
SHA256e1370b54a0d8c228d7a0db25126c73a0952ef627c156eb6c694528f661bd80ae
SHA5128ca6febf031afa634e1f67ed23fafc7140705a919193fb7179fd915a0d5a9ae8cff507c737831cface640ba228180f37a360080952a1a7874995103cd2c90f40
-
Filesize
44KB
MD509a9fc2170493a2a41d170a50ba8bca1
SHA1d16655f4ed41dd6c237c7a656fac5a1d701d3fb9
SHA256ac69dc0d86be68b99092e88cdaa9790a7a8696508826ee203d5cb3b4a5d70127
SHA512296e5a7789efb04197235c32c50c082069dd0c73e7a006a7564a8e5dfeac752e0be0061638755f878a533c567654506391f788ebfbe35b2abd5af7301503718c
-
Filesize
40KB
MD57ffd5276481f3f5fef9f1d9dac8497e1
SHA170a395091cd2bd4daa577d5d9d3f0adfef913d5c
SHA256fd0d2ce2649f568572136d2fb05166d2ea359f09a144d74d18d7af300747ff74
SHA512da5849817f2d36aff69508fcb8cc2876e2e3f4488b78ba31a88220ccd4f733cd3a9f7ebdeda3a0bc71b59e2046cce468e6feaf804f14df228bc72ab0ead7d9cd
-
Filesize
39KB
MD59da8d2e3d88263cd7f812d11ab9bc2c9
SHA1dbcdc83da62cc4e017887b7bf922a0bbc84c2725
SHA256bb48d17f2ba1a12cf8fc36261e0127331c0335576989135e6a26f39b06370a72
SHA5121f9890057feee22dddfdfda15d70b28021091648b5709641cf24219b8fba47327ac73c47ebdf5dd3d7d78e4d0191174c5eebc6374c9ba97fddc2d0655d195561
-
Filesize
44KB
MD53dc995da466a474a48eafa898fb82358
SHA1b77da19778316cc5a08271d34843454010d9f00a
SHA256f90ed49e60496ae9c2a14916730571266429879a2fe1e573ce124b23a431cc24
SHA512b818f076ba0711bd84a584b360eba7134393d056403a0b001e594937b613e9b0bc6f68eb592f0206f461c95f0c50db0f182d7e6d1dba0fc0653326410ef579d4
-
Filesize
38KB
MD5817334b58dbb927ce4c48c3a3020951c
SHA13a6cf01fec1df2539c6120d22c09ed60d7e2cbff
SHA256d3cef44dccba742ca5436958c084fc493cd466f025d6d16bdb672fcf2caca1a4
SHA512f966388939746ebbe4c9cf39c20a8afd629197e8bb1c7901cc1566de2eb9cfafa600eb4c3a383bfdaba17bd231137a440c1ed15dc3dcd6fca31318547d3ef3d5
-
Filesize
42KB
MD53222350eb4fd2be3cf6988e9a9434615
SHA1da9bbbfecd332737632ab0242cdcf1b21b45e325
SHA256ac7c39bc73487216415ccc6ba924a501d343d3639ba714e19d00b2d7d01c96bb
SHA512c2f00d8a442f39c2a2040c256718f912c08228060ba9ddc3d341f3dcd9fb1d79e88f030944afc0583b7f0feaa85782c7497badbf96075ef0ded4dfeecd70add2
-
Filesize
43KB
MD5d33d83efebabef0a02fc4b60bffe8d05
SHA133cc8a8a435e7f14182c1448fc33ede33ab1591f
SHA2565823437043ed0c6ed61f5946ea82b4a96ba2e8110a8a1f1b7e2e2d1a17e77ba8
SHA51219135a4b05006f6119b723c53bf99e616408bb2d84d08d0aa8fb37ef89e728b7fda82d970281a1d278caa0e6bec762468f358ac7203a31b1d37108465425f415
-
Filesize
46KB
MD5dda9ba57c266f598079ba349c4e8a7bb
SHA147848f7ea60abd1d1a1a74d1609e3dd449721677
SHA2566e203d9389f8bd36ecf4ae75d4794b92310e44dd73f62d6c69f5459a5889ba49
SHA5124599dbee5f26600430fe419306cb1a5a64f11ececd86e50325badf30ede3b33c8dbc5167051476f0809568d8af0bab3dd8ef6216d992d2fc4d2418b6210d3e3c
-
Filesize
44KB
MD558c2651976ceae81141f379b61bc29fa
SHA1d1ef381ac11522f819dba9a9cb0278d3bc94022f
SHA256645dacff8bfbebad949e0f3156cda5d6a3f32b6feb3670224abeefb9e003a17b
SHA512d02c1d2e0bc99dcb7afe627f0667dabc500e1921f68f06e767e18176c3b6d567c42258a04003ecd8717fc8d4aa7ed964d676da5029a7d81125dae186b9c43f94
-
Filesize
37KB
MD5ca52cc49599bb6bda28c38aea1f9ec4e
SHA1494f166b530444f39bca27e2b9e10f27e34fc98a
SHA256f9f144aa2dc0de21b24c93f498a9b4a946b7da42819a776b3283a0bcae18544b
SHA51205e2d5711eef8f57737b2512de2e73744f17e0a34de0bfd2a06c9cc60a08ebadbafe38e30b66a2ede7fa61d5b9571adddcfbd7e1cafcee1ab2168a563d2d3f0d
-
Filesize
4.7MB
MD5b42b8ac29ee0a9c3401ac4e7e186282d
SHA169dfb1dd33cf845a1358d862eebc4affe7b51223
SHA25619545e8376807bce8a430c37cab9731e85052103f769dd60a5da3d93ca68c6ec
SHA512b5269e7392e77a0fa850049ff61e271c5aab90d546945b17a65cc2ea6420432ae56321e1e39cfd97ccdb3dfc37ddbd6ff77907f5685cc2323b8635c8cdb4a84f
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
38B
MD53433ccf3e03fc35b634cd0627833b0ad
SHA1789a43382e88905d6eb739ada3a8ba8c479ede02
SHA256f7d5893372edaa08377cb270a99842a9c758b447b7b57c52a7b1158c0c202e6d
SHA51221a29f0ef89fec310701dcad191ea4ab670edc0fc161496f7542f707b5b9ce619eb8b709a52073052b0f705d657e03a45be7560c80909e92ae7d5939ce688e9c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
587KB
MD5c7fbd5ee98e32a77edf1156db3fca622
SHA13e534fc55882e9fb940c9ae81e6f8a92a07125a0
SHA256e140990b509dd6884a5742bde64f2cdaa10012d472b0b32de43ebecbc83242b6
SHA5128691ac8b214cc1e4f34a3ab2bbc0c2391f7f11ebbe5db0dc82825195b5fe5a05310ed1e14d253a9b74a64050d2f2a6623dd2fcd912f80fef51e51845ef1e3a1a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
7KB
MD5675c4948e1efc929edcabfe67148eddd
SHA1f5bdd2c4329ed2732ecfe3423c3cc482606eb28e
SHA2561076ca39c449ed1a968021b76ef31f22a5692dfafeea29460e8d970a63c59906
SHA51261737021f86f54279d0a4e35db0d0808e9a55d89784a31d597f2e4b65b7bbeec99aa6c79d65258259130eeda2e5b2820f4f1247777a3010f2dc53e30c612a683
-
Filesize
724B
MD563067f43a8ee5abca1624fc40109b07e
SHA1096e24719b4f0649361eca5bf1b4a1abfefa6905
SHA25687ecccfbaf547e5b40d630cc198d298df5769e04f7953be1b6c4462aec7b765c
SHA512b6ebd3bea08103356f912da7d003cd750e4f48bd4cd092a2f838ef01a11ea20c41aac1c8419042561c0a56006053e1e7d6330351f7a2f741192279df226e9dff
-
Filesize
15KB
MD559cee43dd09b70d89d2809e42ba251df
SHA1866825575e8a5173848de344d79475c404f699a2
SHA2565ae2478012e78281f9f4efb965a9e5b389e201c2f94f4aa4aa9a401cf093f360
SHA51269d32d1bd610beea7db3f677f5d151ce0b84ba37406cd65bd3c55ad89fc96935d780798669a7d015fbabcb2da5b87ea8a03ed9edf0128e67de02a07a064e2d19
-
Filesize
158KB
MD5cdf152e23a8cbf68dbe3f419701244fc
SHA1cb850d3675da418131d90ab01320e4e8842228d7
SHA25684eaf43f33d95da9ab310fc36dc3cfe53823d2220946f021f18cf3f729b8d64e
SHA512863e1da5bc779fa02cf08587c4de5f04c56e02902c5c4f92a06f2e631380ecabcc98e35d52609f764727e41b965c0786d24ea23fc4b9776d24d9f13e0d8ae0c2