Analysis Overview
SHA256
a27ff09ec8cbc4b9bad0679d8922ed1dd22fbf9bcf472ba69c1e413e6785dfa3
Threat Level: Known bad
The file RAT.zip was found to be: Known bad.
Malicious Activity Summary
Qnodeservice family
CrimsonRat
Metasploit family
Crimsonrat family
MetaSploit
QNodeService
CrimsonRAT main payload
Process spawned unexpected child process
Suspicious Office macro
Blocklisted process makes network request
Office macro that triggers on suspicious action
Checks computer location settings
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Loads dropped DLL
Executes dropped EXE
Adds Run key to start application
Drops file in Windows directory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Unsigned PE
Uses Volume Shadow Copy WMI provider
Enumerates system info in registry
Uses Task Scheduler COM API
Suspicious use of SetWindowsHookEx
Suspicious use of FindShellTrayWindow
Uses Volume Shadow Copy service COM API
Suspicious use of WriteProcessMemory
Checks processor information in registry
Suspicious behavior: AddClipboardFormatListener
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-12-06 10:43
Signatures
Office macro that triggers on suspicious action
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious Office macro
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-12-06 10:43
Reported
2024-12-06 10:48
Platform
win10ltsc2021-20241023-en
Max time kernel
295s
Max time network
301s
Command Line
Signatures
QNodeService
Qnodeservice family
Processes
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
java -jar C:\Users\Admin\AppData\Local\Temp\RAT\Adwind.jar
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | nodejs.org | udp |
| US | 104.20.23.46:443 | nodejs.org | tcp |
| US | 8.8.8.8:53 | 46.23.20.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | central.qhub.qua.one | udp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 8.8.8.8:53 | 134.130.81.91.in-addr.arpa | udp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 8.8.8.8:53 | 136.71.105.51.in-addr.arpa | udp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
| US | 162.215.226.6:443 | central.qhub.qua.one | tcp |
Files
memory/4680-2-0x00000168354D0000-0x0000016835740000-memory.dmp
memory/4680-12-0x0000016835740000-0x0000016835750000-memory.dmp
memory/4680-14-0x0000016835750000-0x0000016835760000-memory.dmp
memory/4680-17-0x0000016835760000-0x0000016835770000-memory.dmp
memory/4680-18-0x0000016835770000-0x0000016835780000-memory.dmp
memory/4680-20-0x0000016835780000-0x0000016835790000-memory.dmp
memory/4680-22-0x0000016835790000-0x00000168357A0000-memory.dmp
memory/4680-24-0x00000168357A0000-0x00000168357B0000-memory.dmp
memory/4680-26-0x00000168357B0000-0x00000168357C0000-memory.dmp
memory/4680-29-0x00000168357C0000-0x00000168357D0000-memory.dmp
memory/4680-28-0x0000016833CA0000-0x0000016833CA1000-memory.dmp
memory/4680-31-0x00000168354D0000-0x0000016835740000-memory.dmp
memory/4680-32-0x00000168357D0000-0x00000168357E0000-memory.dmp
memory/4680-35-0x00000168357E0000-0x00000168357F0000-memory.dmp
memory/4680-34-0x0000016835740000-0x0000016835750000-memory.dmp
memory/4680-38-0x00000168357F0000-0x0000016835800000-memory.dmp
memory/4680-37-0x0000016835750000-0x0000016835760000-memory.dmp
memory/4680-42-0x0000016835800000-0x0000016835810000-memory.dmp
memory/4680-41-0x0000016835770000-0x0000016835780000-memory.dmp
memory/4680-40-0x0000016835760000-0x0000016835770000-memory.dmp
memory/4680-44-0x0000016835810000-0x0000016835820000-memory.dmp
memory/4680-47-0x0000016835820000-0x0000016835830000-memory.dmp
memory/4680-46-0x0000016835780000-0x0000016835790000-memory.dmp
memory/4680-50-0x0000016835830000-0x0000016835840000-memory.dmp
memory/4680-49-0x0000016835790000-0x00000168357A0000-memory.dmp
memory/4680-53-0x0000016835840000-0x0000016835850000-memory.dmp
memory/4680-52-0x00000168357A0000-0x00000168357B0000-memory.dmp
memory/4680-57-0x0000016835850000-0x0000016835860000-memory.dmp
memory/4680-55-0x00000168357B0000-0x00000168357C0000-memory.dmp
memory/4680-59-0x0000016835860000-0x0000016835870000-memory.dmp
memory/4680-58-0x00000168357C0000-0x00000168357D0000-memory.dmp
memory/4680-62-0x0000016835870000-0x0000016835880000-memory.dmp
memory/4680-61-0x00000168357D0000-0x00000168357E0000-memory.dmp
memory/4680-65-0x0000016835880000-0x0000016835890000-memory.dmp
memory/4680-64-0x00000168357E0000-0x00000168357F0000-memory.dmp
memory/4680-67-0x00000168357F0000-0x0000016835800000-memory.dmp
memory/4680-68-0x0000016835890000-0x00000168358A0000-memory.dmp
memory/4680-78-0x0000016835810000-0x0000016835820000-memory.dmp
memory/4680-84-0x0000016835830000-0x0000016835840000-memory.dmp
memory/4680-83-0x00000168358F0000-0x0000016835900000-memory.dmp
memory/4680-82-0x00000168358E0000-0x00000168358F0000-memory.dmp
memory/4680-81-0x00000168358D0000-0x00000168358E0000-memory.dmp
memory/4680-80-0x0000016835820000-0x0000016835830000-memory.dmp
memory/4680-77-0x00000168358C0000-0x00000168358D0000-memory.dmp
memory/4680-76-0x00000168358B0000-0x00000168358C0000-memory.dmp
memory/4680-75-0x00000168358A0000-0x00000168358B0000-memory.dmp
memory/4680-74-0x0000016835800000-0x0000016835810000-memory.dmp
memory/4680-87-0x0000016835900000-0x0000016835910000-memory.dmp
memory/4680-86-0x0000016835840000-0x0000016835850000-memory.dmp
memory/4680-89-0x0000016835850000-0x0000016835860000-memory.dmp
memory/4680-90-0x0000016835910000-0x0000016835920000-memory.dmp
memory/4680-93-0x0000016835920000-0x0000016835930000-memory.dmp
memory/4680-92-0x0000016835860000-0x0000016835870000-memory.dmp
memory/4680-100-0x0000016835880000-0x0000016835890000-memory.dmp
memory/4680-99-0x0000016835940000-0x0000016835950000-memory.dmp
memory/4680-103-0x0000016835950000-0x0000016835960000-memory.dmp
memory/4680-102-0x0000016835890000-0x00000168358A0000-memory.dmp
memory/4680-98-0x0000016835930000-0x0000016835940000-memory.dmp
memory/4680-97-0x0000016835870000-0x0000016835880000-memory.dmp
memory/4680-108-0x0000016835960000-0x0000016835970000-memory.dmp
memory/4680-107-0x00000168358C0000-0x00000168358D0000-memory.dmp
memory/4680-106-0x00000168358B0000-0x00000168358C0000-memory.dmp
memory/4680-105-0x00000168358A0000-0x00000168358B0000-memory.dmp
memory/4680-113-0x0000016835970000-0x0000016835980000-memory.dmp
memory/4680-118-0x0000016835980000-0x0000016835990000-memory.dmp
memory/4680-115-0x00000168358D0000-0x00000168358E0000-memory.dmp
memory/4680-117-0x00000168358F0000-0x0000016835900000-memory.dmp
memory/4680-123-0x0000016835900000-0x0000016835910000-memory.dmp
memory/4680-122-0x00000168359A0000-0x00000168359B0000-memory.dmp
memory/4680-121-0x0000016835990000-0x00000168359A0000-memory.dmp
memory/4680-116-0x00000168358E0000-0x00000168358F0000-memory.dmp
memory/4680-125-0x0000016835910000-0x0000016835920000-memory.dmp
memory/4680-126-0x00000168359B0000-0x00000168359C0000-memory.dmp
memory/4680-133-0x0000016835940000-0x0000016835950000-memory.dmp
memory/4680-132-0x0000016835930000-0x0000016835940000-memory.dmp
memory/4680-131-0x00000168359D0000-0x00000168359E0000-memory.dmp
memory/4680-130-0x00000168359C0000-0x00000168359D0000-memory.dmp
memory/4680-129-0x0000016835920000-0x0000016835930000-memory.dmp
memory/4680-135-0x00000168359E0000-0x00000168359F0000-memory.dmp
memory/4680-138-0x00000168359F0000-0x0000016835A00000-memory.dmp
memory/4680-137-0x0000016835950000-0x0000016835960000-memory.dmp
memory/4680-141-0x0000016835A00000-0x0000016835A10000-memory.dmp
memory/4680-140-0x0000016835960000-0x0000016835970000-memory.dmp
memory/4680-142-0x0000016833CA0000-0x0000016833CA1000-memory.dmp
memory/4680-145-0x0000016835A10000-0x0000016835A20000-memory.dmp
memory/4680-144-0x0000016835970000-0x0000016835980000-memory.dmp
memory/4680-148-0x0000016835A20000-0x0000016835A30000-memory.dmp
memory/4680-147-0x0000016835980000-0x0000016835990000-memory.dmp
memory/4680-154-0x0000016835A40000-0x0000016835A50000-memory.dmp
memory/4680-153-0x0000016835A30000-0x0000016835A40000-memory.dmp
memory/4680-152-0x00000168359A0000-0x00000168359B0000-memory.dmp
memory/4680-151-0x0000016835990000-0x00000168359A0000-memory.dmp
memory/4680-157-0x0000016835A50000-0x0000016835A60000-memory.dmp
memory/4680-156-0x00000168359B0000-0x00000168359C0000-memory.dmp
memory/4680-164-0x0000016835A70000-0x0000016835A80000-memory.dmp
memory/4680-163-0x0000016835A60000-0x0000016835A70000-memory.dmp
memory/4680-162-0x00000168359D0000-0x00000168359E0000-memory.dmp
memory/4680-161-0x00000168359C0000-0x00000168359D0000-memory.dmp
memory/4680-266-0x0000016833CA0000-0x0000016833CA1000-memory.dmp
memory/4680-316-0x0000016833CA0000-0x0000016833CA1000-memory.dmp
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\docs\public\cli-commands\npm-bugs\index.html
| MD5 | d0fcb234527b62597027adfe909a58d1 |
| SHA1 | e46877bfb15bbdb029aaa7777b952b3b30b0695c |
| SHA256 | fa6dae131ec446c7a489fff6ef3d6952f8e34cf113eb3df7c8c643697492f617 |
| SHA512 | c7850e31c0a7cdd810fa778400a519d5ce34499fa8f660aac5288a88b72badefbb2e657fda3db9260ea442b7b930da1011b181b101d117410428af04fc0e78a1 |
memory/4680-465-0x0000016833CA0000-0x0000016833CA1000-memory.dmp
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\cliui\node_modules\strip-ansi\license
| MD5 | 5ad87d95c13094fa67f25442ff521efd |
| SHA1 | 01f1438a98e1b796e05a74131e6bb9d66c9e8542 |
| SHA256 | 67292c32894c8ac99db06ffa1cb8e9a5171ef988120723ebe673bf76712260ec |
| SHA512 | 7187720ccd335a10c9698f8493d6caa2d404e7b21731009de5f0da51ad5b9604645fbf4bc640aa94513b9eb372aa6a31df2467198989234bc2afbce87f76fbc3 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\crypto-random-string\license
| MD5 | 940fdc3603517c669566adb546f6b490 |
| SHA1 | df8b7ea6dff65e7dd31a4e2f852fb6f2b45b7aa3 |
| SHA256 | 6b18e4f3ea8443739a64c95ecf793b45e4a04748da67e4a1479c3f4bba520bd6 |
| SHA512 | 9e2cf5b0c3105c7ec24b8382a9c856fc3d41a6903f9817f57f87f670073884c366625bc7dee6468bb4cbd0c0f3b716f9c7c597058098141e5a325632ea736452 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\doc\wg-meetings\2015-01-30.md
| MD5 | fda6b96a1cac19d11bcdee8af70e5299 |
| SHA1 | 449cff987f8b8d79b53c9ab93a7dc18f6d6f3ca8 |
| SHA256 | b5108c42d95185b1b71e86963bf784ddfd123da4178d41cef052be08c6429cb6 |
| SHA512 | f6483ffffc8a71a583d70fe6c4bf001a95f9c8a6b4e70fa0e322f2008170144794ddb42a396fb694b8039cb4a572a655ff877dd95d3ac95b6f6aafeab390a670 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\.travis.yml
| MD5 | b112fec5b79951448994711bbc7f6866 |
| SHA1 | b7358185786bf3d89e8442ac0a334467c5c2019b |
| SHA256 | c3d79e198270443970b49c4f3e136551eb6c7c81a2300b931ae32ce17dad0967 |
| SHA512 | d46e1c11a6604e413163a2092e1a9925adc7b5df48a07fa70e87dd0216e7ef432bed3f3c75bed4f1ad4d707b7aeddce63abfca3d4bd1c6e29f215f8e258d5737 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\duplex-browser.js
| MD5 | 276ae60048c10d30d8463ac907c2fcec |
| SHA1 | be247923f7e56c9f40905f48dc03c87f0aeb4363 |
| SHA256 | bf30af3ba075b80a9eaf05ba5e4e3e331e8a9b304ccb10b7c156aa8075f92f44 |
| SHA512 | e3f8c1a038aaf84f0c6b94e2c7fc646844754cc3d951683784182bd90bacc56e0c2f0f1a4be16ea2e5218f44d0f7f6ad00dcec72eb4c0e6eeb4176535587e890 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\duplex.js
| MD5 | 1a2977043a90c2169b60a5991599fc2a |
| SHA1 | 27c20fc801b9851e37341ec9730d0fbc9c333593 |
| SHA256 | 8c1a1af19eaf01f960e9dc5fc35fbcb0e84060d748883866e002b708231b46ac |
| SHA512 | 5f233cf6dd4a82365c130daf1902f9deacf7a76999caf01ad8de9308097bb9dd6d9795836419dfbc07e50055915404c720dc1bb5aa28a463ca1117f52c81b614 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\GOVERNANCE.md
| MD5 | b5cdc063fe6b17a632d6108eefec147e |
| SHA1 | ffc13a639880de3c122d467aabb670209cc9542c |
| SHA256 | 7366d24a6cd0b904b2a34b7a4c8a8f62fc855605ed0ab4030cbee5a9304f94e7 |
| SHA512 | 7ff8dab3bb67b5685335b657fcb0b901851ffbd49f25773543e34fd31c81ae19ef62386f06a5e9881428cbfbe29d7ca041558178d73f4f1cbc31cbcc7eaac388 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\internal\streams\destroy.js
| MD5 | a4607210c0c5e058d5897a6f22ac0a6c |
| SHA1 | 11c94e733b2230731ee3cd30c2c081090ffa6835 |
| SHA256 | 713e5bac5e10b8d0940eda803835c50da6ef1373f1e7b872b063373069129377 |
| SHA512 | 86e2223c3da2eda2c4fedc2e162bb91fef0c8b6ab0e0f1136b73c8c992f736e6e5d330f2352acbf43b02b9a4d26a8a8ae06c642135ab70b82364dce3e2903871 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\internal\streams\BufferList.js
| MD5 | 99511811073f43563c50a7e7458d200b |
| SHA1 | b131b41c8aa9ae0bfce1b0004525771710bc70a4 |
| SHA256 | b404455762369e9df0542e909dbda88df308d53f6abbac0b8f8c0b727e848a74 |
| SHA512 | 79b64079ef2cc931fb7c333a3438a48b9b0f41aa61087fe2850b050a9d1537a9d410eab3a27d49f1b994ff8e949c488d0f9a8f7f9b1503c1c32b49cca81e85a5 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\internal\streams\stream-browser.js
| MD5 | 46b005ecbd876040c07864736861135f |
| SHA1 | c4229c3c10949c67a6cbc9d4c57d3cc1c848edb3 |
| SHA256 | 0406c41a3dc088c309a3efb822e145bb78856668bd60d16b66b637f4dbf2a1ba |
| SHA512 | 533d688ca138bca4610f7a03a80d79ff88d922fda4a230504d698d45ee1c6e4a609f1eeaf8cb073866e9d91963adececc8d00412e85b37706bcca3957c265803 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\internal\streams\stream.js
| MD5 | a391c874badff581abab66c04c4e2e50 |
| SHA1 | 7b868ed96844e06b284dbc84e3e9db868915203c |
| SHA256 | 783e5e798a19dde6981db840cad5a2bfbf0822dd2819fe14c54a1f4e71f0d363 |
| SHA512 | cb9ef0ef02515f0a9c6c57fed7e5ed6c9c36cfbe80ad1d4d2554a63e8a4ea106d5b04376a587fe10dca6101474e5890623517bd68558a63d33e0c3569ee62866 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\_stream_duplex.js
| MD5 | 63b92584e58004c03054b4b0652b3417 |
| SHA1 | 67efe53912c6d4cdeb00227deb161fe0f13e5bfb |
| SHA256 | 76d5dc9dcae35daa0a237fe11ef912b89dcf25c790f4d6ba1eadc2c97e8dad4c |
| SHA512 | ca5ada5a9b0070ee9eaa1b70e3690fae1880a77bafc050c24019fd28c90bb98479237e0dfd9209994e1e44617f8dd2f7aa75133a6e1a034c18ae55504f076837 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\_stream_passthrough.js
| MD5 | 41247801fc7f4b8f391bc866daf2c238 |
| SHA1 | d858473534bfbd539414b9e3353adfc255eed88b |
| SHA256 | d5e328cb2e044902c3ace9da8d277298b04bcb4046bcd5a4cd3d701e56497d6c |
| SHA512 | c9197747ddc57818474c861e4ce920a98a5d0a32589ef2d08fd37320daac2400512b23b51cbb89999fca1ca17f375daf3453ced8e2a5e9aa538a371f31f5561b |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\_stream_readable.js
| MD5 | 7bca08c5eeade583afb53df46a92c42b |
| SHA1 | ccc5caa24181f96a1dd2dd9244265c6db848d3f7 |
| SHA256 | 46ca457378727959f5d2214955c03de665a22c644ddb78c568e925f725ed7e84 |
| SHA512 | 0ef7813e335cbf06e8963cca10b24a28363284446f0f7bcee7751111e6eb098df6ff286ac6ae9b0f312d11e117e69d19b8d96f47d6566568212b7a5d6eb085b7 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\LICENSE
| MD5 | d816ace3e00e1e8e105d6b978375f83d |
| SHA1 | 31045917a8be9b631ffb5b3148884997b87bd11a |
| SHA256 | b7cd4c543903a138ba70beef889be606adceefa1359f858670d52d1865127e24 |
| SHA512 | 82c9105602008647c8381bf4996742441fb1c98f5dd91dc85fa0d166686cb1294c47ba18b93da25ee46adf5135a29ab3d0dcadd0a50c6d1e32b5d401b9ca0f9d |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\_stream_writable.js
| MD5 | 31f2f1a4a92b8e950faa990566d9410b |
| SHA1 | 3b3f157c3ae828417dd955498f9d065f5b00b538 |
| SHA256 | 7262ec523f9247b6a75f5e10c5db82e08cfe65acc49f9c96fcb67f68c5a41435 |
| SHA512 | c604bb3465ae2e2dea8c8977796a15b76657db0d791d0d67ccf727ad4dd9209efc2fd5ca4a7e15d8931c50d786273d0ae9eadd0c6c5778cac309cb6a81f10a4e |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\lib\_stream_transform.js
| MD5 | 54be917915eb32ae9b4a71c7cc1b3246 |
| SHA1 | 82a2a3af2ac3e43475ab0e09e6652f4042e12c57 |
| SHA256 | 75aabc0acf662f0cfa187ea79437b1ca4edac342b6995fe6038d171e719d3613 |
| SHA512 | 40312c18fea85f62a09e55366230847cb5c7f30535cb123b13f9fc71468278076b325958cc138c57c7958c97a3e98f5500c9da4bc4b1b3edf8aa0519d1e4b955 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\passthrough.js
| MD5 | 622c2df3803df1939b1ee25912db4454 |
| SHA1 | 83be571f59074a357bf8fe50b90c4ad21412bd43 |
| SHA256 | cfbb763646dda37e1434a5ebc4691fca75b0694b8d89505420ba3d7d489241e6 |
| SHA512 | 09a74ea5daac0d11883ae003b228784588244c1f4501e5eb41ffcc957c32587d3458e0ada1e56b47c983808fe5f9b8265dcede5a88c6642a5716a1f9a39432ee |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\readable-browser.js
| MD5 | dd3f26ae7d763c35d17344a993d5eeb5 |
| SHA1 | 020ce7510107d1cd16fd15e8abef18fd8dee9316 |
| SHA256 | d9c3473b418fbf6103aa34c716fa9d8df7ad1cf5900dac48301dc3e8ea6139ae |
| SHA512 | 65103f629bc2c7a36e804e01ad05c7fe4ae8239adad8e7965c6559be20f2c38fe30d4729de950478d4a2184c88f9f9ccba5d0b459742ac33a99f0abb37e42400 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\readable.js
| MD5 | 76a193a4bca414ffd6baed6e73a3e105 |
| SHA1 | 4dbf5e4e8a7223c0f3adf7a0ca8c28bc678292a0 |
| SHA256 | cdeb57ca548c8dcf28f9546f202763f9b03e555046476d213d571c6cb7a59a43 |
| SHA512 | f30abcb6532c81e6dc3ac10ca408a32df89e0af72cdceabbbf0efecab38bdc5dae6c65f6cf861eb2e9f0ea6c20f1abb24a64989003a0fff16778b7ad2f24fa66 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\README.md
| MD5 | f13ecdad6c52fe7ee74b98217316764a |
| SHA1 | c3d7c4bec741e70452f0da911a71307c77d91500 |
| SHA256 | 42294293978532e3523e7b09172e9da9cc1c0d1bd5d04baf4b9b984ed2088d0d |
| SHA512 | f6664185183bf970c7450e79be5707ea43119dab621583bd61f7080a8b0292845e8f7450836408371dd3ea12ce766af75413464d7082a445e0c29cffe7ff8c75 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\transform.js
| MD5 | 1c9d3713bbc3dbe2142da7921ab0cad4 |
| SHA1 | 4b1b8e22ca2572e5d5808e4b432d7599352c2282 |
| SHA256 | 62707b41fa0e51f0556a32f98c7306fa7ff2e76d65df0a614889b827c3f5eaab |
| SHA512 | e582281b62eb5ac45ae039a90f81e97c3c1e81a65caf1c09e355dd2eae05760f254058c5d83dac953271dd8b90ebdb8b1748a10388a23386a9a7e089294a4efd |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\writable-browser.js
| MD5 | 817cf252e6005ac5ab0970dd15b05174 |
| SHA1 | ac035836aeb22cb1627b8630eba14e2ea4d7f653 |
| SHA256 | 0d92b48420b6f4ead3c22d6f9db562a232e502e54ca283122fb383828f7b3842 |
| SHA512 | 8fd9b47fa3dd8c5dae9e65cb98f65f8e69da84a4b152026bd28cc50d1be48590ca9d0c9ce2a2b9b27af318a54204233df36a005442050e922e9450192409d0a7 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\readable-stream\writable.js
| MD5 | fcb52503b2a3fd35d025cde5a6782d15 |
| SHA1 | 2e47c9e030510f202245566f0fbf4e209f938bad |
| SHA256 | 0b99c6a91a40658c75ec7ad8671f02304e93b07bd412e49540b9655f2090e557 |
| SHA512 | 3b522c95217ca6517197a82d4752d14471c305becb0cb4a516746c4e985e911e07fecd02f3a6e0e9aaef306ab8689a34c05701db1794ad5769bbc760a1353c46 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\string_decoder\.travis.yml
| MD5 | f11e385dcfb8387981201298f1f67716 |
| SHA1 | 9271796a1d21e59d1a2db06447adbae7441e76cf |
| SHA256 | 8021d98e405a58cd51b76bf2669b071be7815db2c68216403c1ca02989c1ec2e |
| SHA512 | fdcae76ecedb4a3306763cca3359c9be2b6d30a88a37c5527c1c4e9f64c53abb0c1369af05dc7e420437476f9f050c999492d31117e3a1c312bd17b35740efd5 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\string_decoder\lib\string_decoder.js
| MD5 | 81fc92e6c5299a2a99c710a228d3299b |
| SHA1 | 8ef7f95a46766ff6e33d56e5091183ee3a1b1eea |
| SHA256 | 00fd7780ba199a984bbc1f35875017ae26fb8e48ef6e3e4b11fcf0954478e0fb |
| SHA512 | c2ba9ba55784e4a89cfcd644232654a32bb43c20f7a916d69ef4e65f9b88810813432531e3812a93f4686ab103676976a6deb78f39f3380350107991938b4a6a |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\string_decoder\LICENSE
| MD5 | 48ab8421424b7cacb139e3355864b2ad |
| SHA1 | 819a1444fb5d4ea6c70d025affc69f9992c971c9 |
| SHA256 | 9d364120560d6770fd7e663d23311f871c2c597327cd4c1fced97dbab25183f4 |
| SHA512 | b6029a0f811c1c8fbdd9d57cdc16ff469cc8a023468a0390643270ffe21774de02cd950908355df71ed95d2b7c27387478f88cb1fd23d84b45c47a97364edf15 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\from2\node_modules\string_decoder\README.md
| MD5 | a92ecc29f851c8431af9a2d3f0555f01 |
| SHA1 | 06591e3ff094c58b1e48d857efdadb240eafb220 |
| SHA256 | 6b8a003975a1c056caee0284b9e1930192cac1bd0ea2181f594290057d2c0687 |
| SHA512 | 347ae85c821e06ba6e239ec2230c52dee6ca68ab52ccf9f57067e7152b9be0f832d4bbc7f30ffd4784427a81c0797af8b46bce8b4ab9fc0843f6424676a64b5c |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\fs-minipass\LICENSE
| MD5 | b020de8f88eacc104c21d6e6cacc636d |
| SHA1 | 20b35e641e3a5ea25f012e13d69fab37e3d68d6b |
| SHA256 | 3f24d692d165989cd9a00fe35ca15a2bc6859e3361fa42aa20babd435f2e4706 |
| SHA512 | 4220617e29dd755ad592295bc074d6bc14d44a1feeed5101129669f3ecf0e34eaa4c7c96bbc83da7352631fa262baab45d4a370dad7dabec52b66f1720c28e38 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\gentle-fs\node_modules\iferr\.npmignore
| MD5 | 2e5243fbad9b5b60464b4e0e54e3f30b |
| SHA1 | d644bb560260a56300db7836367d90ac02b0d17c |
| SHA256 | cd429484a9e55b1df61764740f7153c476037c791b9dabac344bcce552a45080 |
| SHA512 | a540facc5bcc4eb5bb082bc3b3ce76a3275ebd284ffa1c210ab6e993d5c868c748b2248cb921a3fe449930cb2f16e18120409000e1f916d4abdfd72b77a5799f |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\is-symbol\Makefile
| MD5 | b8bbbc01d4cbf61a2a5d764e2395d7c9 |
| SHA1 | 48fa21aa52875191aa2ab21156bb5a20aed49014 |
| SHA256 | 4586074dc6c5129837eb6cde39a21fc30e251c498e9fcc8fc0c8076a3af97e86 |
| SHA512 | ac8ceb376dbc14addca0f63b787ed24989608911fca520ab7ce88a01f0c639cf24e9f3a0bb75e972886a46b1c5715342532817d0bebb6e339d21857b0f1da3d1 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\libnpmsearch\LICENSE
| MD5 | 072ac9ab0c4667f8f876becedfe10ee0 |
| SHA1 | 0227492dcdc7fb8de1d14f9d3421c333230cf8fe |
| SHA256 | 2ef361317adeda98117f14c5110182c28eae233af1f7050c83d4396961d14013 |
| SHA512 | f38fd6506bd9795bb27d31f1ce38b08c9e6f1689c34fca90e9e1d5194fa064d1f34a9c51d15941506ebbbcd6d4193055e9664892521b7e39ebcd61c3b6f25013 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\libnpmsearch\PULL_REQUEST_TEMPLATE
| MD5 | 06128b3583815726dcdcc40e31855b0d |
| SHA1 | c93f36d2cd32221f94561f1daac62be9ccfb0bc9 |
| SHA256 | 0d2e3b0d2c6a52197998a5e9345dbb7622e5a8542dcd1ed7d76a5101293d00f0 |
| SHA512 | c7babf81f0206223f0da838285871e0ea145c6335575b19d60a52eecaa13f9b6e635bd294a62c8f09d9f52236127ee721814118817775d03a656e67537ebfbec |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\libnpmteam\.travis.yml
| MD5 | f51eed7ed699afb51054b11328ea78cf |
| SHA1 | 8b68fb74f59a6288ad5c71aee221f7e86c169532 |
| SHA256 | fa37bf69fa66e3475a1d499059ff372be0e136e41923c8d6fb407f649a4cb472 |
| SHA512 | f7a4ef776fa2e53f46f0b032f0359555422e8729c855b0822cae8f464e49e7f9a453514ce08ec4e5d7a3d02909e40e6771d7bffa1f54ed6f0d2f6ebaeb59b02b |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\libnpmteam\appveyor.yml
| MD5 | c75fff3c7388fd6119578b9d76a598be |
| SHA1 | 3b4a13ed37307d560b8b4b631f4debacc7b0d19c |
| SHA256 | 8c9537e3c45610f99f3869f6b40a1bfc7c0ae82f72534e9ed0730cd9deb2a4bd |
| SHA512 | 9c7d033d70dd8cd360cc5df12bc7bc911fe4c7b626fb1353c3dd6e42d0583f7c0c7f33b3668a90e52dd0c5b4efc87c219005e91513854a98e18138119fd2b0a2 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\libnpx\LICENSE.md
| MD5 | e9dc66f98e5f7ff720bf603fff36ebc5 |
| SHA1 | f2b428eead844c4bf39ca0d0cf61f6b10aeeb93b |
| SHA256 | b49c8d25a8b57fa92b2902d09c4b8a809157ee32fc10d17b7dbb43c4a8038f79 |
| SHA512 | 8027d65e1556511c884cb80d3c1b846fc9d321f3f83002664ad3805c4dee8e6b0eaf1db81c459153977bdbde9e760b0184ba6572f68d78c37bff617646bcfc3b |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\lodash._baseuniq\LICENSE
| MD5 | a3a97c2bfdbd1edeb3e95ee9e7769d91 |
| SHA1 | 3e5fd8699e3990171456a49bba9e154125fd5da1 |
| SHA256 | 3e0f669f0550e6101efcc81d9032af5498b72eec499df58cfbf63e24a61e2f75 |
| SHA512 | 7c7d273148f0f3b2e64e16d0164140540a5a02dcb1574a7ec3a53c0ee5acd88810a68e65ea80fd26c1896abab6d65c2b3e738423d44f226cdba1b3dc784512fe |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\lodash._getnative\LICENSE
| MD5 | 26c80e27b277fdd0678be3bd6cd56931 |
| SHA1 | 148865ccd32e961df8aedd4859840eac4130364a |
| SHA256 | 34c9e87365128252851b101ae194a31e3d019724b20c25fa66fd4521a326c818 |
| SHA512 | b727fcfb6d09d74fc344f361a5f19e7e679166c5c5bc0666c66fc7599908b3c4aa24f4e4da18948a41ade67d23a908ac27b564b4261ab890a543d8aadb4fc3be |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\mkdirp\node_modules\minimist\LICENSE
| MD5 | a6df4eaa6c6a1471228755d06f2494cf |
| SHA1 | b7d2d5450231d817d31b687103065ac090e955ab |
| SHA256 | a9ecf3da3825b3e7232f29c970a2869bb1752c900bd75ba7cbabeb69b8f032b4 |
| SHA512 | 340a980d3cbe1fae476b27dce893a707b40d8db4c35a3d5cb0e8a907bb8792e06dc50f23ce4abd50a35f18fa74e20caf92e142de4100fb2c5a5e58d5152800b9 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\move-concurrently\node_modules\aproba\LICENSE
| MD5 | 9ea8c9dc7d5714c61dfdaedcc774fb69 |
| SHA1 | 5ea7b44b36946359b3200e48de240fe957ee70f1 |
| SHA256 | 1b94c9898885c681c1e0ebbf96494e49662842f88ac1e4dd8ffad0ac047108ae |
| SHA512 | 0401c416464818fcaadd6e156ce92c28448e990765ddb7d0097b0c30ea9c8a5d862a53a94fd4a0adb502db1e3abe445c08f18e6fcccbb9f70fcbab273a938e60 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\move-concurrently\node_modules\aproba\README.md
| MD5 | 675a05085e7944bc9724a063bc4ed622 |
| SHA1 | e1ec3510f824203542cac07fd2052375472a3937 |
| SHA256 | da325e3fe4425fc89c9a474ae18eea542f5787151c92bb2aba9dc99de596cfa1 |
| SHA512 | a9512b09f95cc79594f29590468197d4deb53fcfc03fd13f3a5b864ca57a5fec6c62879ce32699547ac1d2aae0bbb4d681484e7236d5a804093c788e33d67a61 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\npm-bundled\LICENSE
| MD5 | 1d7c74bcd1904d125f6aff37749dc069 |
| SHA1 | 21e6dfe0fffc2f3ec97594aa261929a3ea9cf2ab |
| SHA256 | 24b8d53712087b867030d18f2bd6d1a72c78f9fb4dee0ce025374da25e4443b9 |
| SHA512 | b5ac03addd29ba82fc05eea8d8d09e0f2fa9814d0dd619c2f7b209a67d95b538c3c2ff70408641ef3704f6a14e710e56f4bf57c2bb3f8957ba164f28ee591778 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\object.getownpropertydescriptors\.editorconfig
| MD5 | db5ae3e08230f6c6a164bc3747f9863e |
| SHA1 | c02bb3a95537ea2a0ba2f0d3a34fb19e57154399 |
| SHA256 | 2dc461c2ca14c593ed13101958988e6e5d6944144bb3f8f70631eb96365e9f1e |
| SHA512 | ffd68aaec13ad5910dd5f1c17c7a062d06fffc09db7ab31627fcfd223fa99ec7544103db98e2462b9f2b769984b1dfe1e787dec2814ab1daf465a75320c53a3c |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\object.getownpropertydescriptors\LICENSE
| MD5 | e495b6c03f6259077e712e7951ade052 |
| SHA1 | 784d6e3e026405191cc3878fa6f34cb17f040a4d |
| SHA256 | 5836b658b3a29bfc790f472bf6b5a5dfdf08789285c2a50dd43901d5733691db |
| SHA512 | 26f124b803587bd76ac1084ccb759a8a82841d2122fa7be671413434df532e4c7c43442d06a4626f134f96a091eb6d09146bcad731c4053552f4079fd5708a63 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\pump\LICENSE
| MD5 | 713e86b5fbba64b71263283717ef2b31 |
| SHA1 | a96c5d4c7e9d43da53e1a48703e761876453b76c |
| SHA256 | c222d7cd6879fb81d79a019383a6f651107d76f1f75b2632c438828b1a08c227 |
| SHA512 | 64e4d6383e531446ab4851103f49621fc787c6f506e417e55ab2c1ddb66e3abc3d69edd717f6269169211bf52b632bebe29daa6925b10d3b6fd8d07aa0f87c5f |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\run-queue\node_modules\aproba\index.js
| MD5 | d7adafc3f75d89eb31609f0c88a16e69 |
| SHA1 | 974e1ed33c1ea7b016a61b95fed7eccadcf93521 |
| SHA256 | 8059de4e00e45bad48e09ae5eec5476740b2462fbd913dcc0a055dfa73dd533a |
| SHA512 | b534aa9e922e26448a9c592b98111572074ce50768f8dedd8f1c1449652b8e20997138259ec14bafcc0cba0afaa2e4aab21c6e73c84107472ab946c3ea16d7b9 |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\slide\LICENSE
| MD5 | 7428aa9f83c500c4a434f8848ee23851 |
| SHA1 | 166b3e1c1b7d7cb7b070108876492529f546219f |
| SHA256 | 1fccd0ad2e7e0e31ddfadeaf0660d7318947b425324645aa85afd7227cab52d7 |
| SHA512 | c7f01de85f0660560206784cdf159b2bdc5f1bc87131f5a8edf384eba47a113005491520b0a25d3cc425985b5def7b189e18ff76d7d562c434dc5d8c82e90cce |
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64.tmp468116306470\node-v13.13.0-win-x64\node_modules\npm\node_modules\tunnel-agent\LICENSE
| MD5 | 781a14a7d5369a78091214c3a50d7de5 |
| SHA1 | 2dfab247089b0288ffa87c64b296bf520461cb35 |
| SHA256 | c3613146372a1d5b88c5215439f22f2ba271c1f6284133bbea37887b078fd5de |
| SHA512 | ce5173d8ebe3d455d204e7471a86c80a98c31c94e632a2c367f342e46942f554beba8729f7fe21e968a0710b4c2d00e5af6fd53306bbef12e93ee66682d709ba |
Analysis: behavioral2
Detonation Overview
Submitted
2024-12-06 10:43
Reported
2024-12-06 10:48
Platform
win10ltsc2021-20241023-en
Max time kernel
300s
Max time network
213s
Command Line
Signatures
MetaSploit
Metasploit family
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process | N/A | C:\Windows\SysWOW64\rundll32.exe | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE |
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\BIOS | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\RAT\CobaltStrike.docm" /o ""
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | roaming.officeapps.live.com | udp |
| NL | 52.109.89.19:443 | roaming.officeapps.live.com | tcp |
| US | 8.8.8.8:53 | 19.89.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| HK | 149.129.72.37:23456 | tcp | |
| US | 8.8.8.8:53 | 64.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 253.15.104.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | metadata.templates.cdn.office.net | udp |
| AT | 95.101.75.149:443 | metadata.templates.cdn.office.net | tcp |
| US | 8.8.8.8:53 | binaries.templates.cdn.office.net | udp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.21.244.160:443 | binaries.templates.cdn.office.net | tcp |
| US | 8.8.8.8:53 | 149.75.101.95.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 160.244.21.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
Files
memory/4640-2-0x00007FFE08E90000-0x00007FFE08EA0000-memory.dmp
memory/4640-1-0x00007FFE08E90000-0x00007FFE08EA0000-memory.dmp
memory/4640-4-0x00007FFE08E90000-0x00007FFE08EA0000-memory.dmp
memory/4640-7-0x00007FFE08E90000-0x00007FFE08EA0000-memory.dmp
memory/4640-6-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-5-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-3-0x00007FFE48EAD000-0x00007FFE48EAE000-memory.dmp
memory/4640-0-0x00007FFE08E90000-0x00007FFE08EA0000-memory.dmp
memory/4640-8-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-9-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-11-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-10-0x00007FFE06630000-0x00007FFE06640000-memory.dmp
memory/4640-12-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-13-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-14-0x00007FFE06630000-0x00007FFE06640000-memory.dmp
memory/4640-15-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-16-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-18-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-21-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-23-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-24-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-25-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-22-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-20-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-19-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-17-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/3708-43-0x00000000003F0000-0x00000000003F1000-memory.dmp
memory/4640-44-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/3708-45-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
| MD5 | f3b25701fe362ec84616a93a45ce9998 |
| SHA1 | d62636d8caec13f04e28442a0a6fa1afeb024bbb |
| SHA256 | b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209 |
| SHA512 | 98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84 |
memory/4640-69-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/4640-72-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
memory/3708-73-0x00007FFE48E10000-0x00007FFE49008000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\TCDF161.tmp\iso690.xsl
| MD5 | ff0e07eff1333cdf9fc2523d323dd654 |
| SHA1 | 77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4 |
| SHA256 | 3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5 |
| SHA512 | b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d |
Analysis: behavioral3
Detonation Overview
Submitted
2024-12-06 10:43
Reported
2024-12-06 10:48
Platform
win10ltsc2021-20241023-en
Max time kernel
295s
Max time network
302s
Command Line
Signatures
CrimsonRAT main payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
CrimsonRat
Crimsonrat family
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\RAT\CrimsonRAT.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\Hdlharas\dlrarhsiva.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 412 wrote to memory of 2520 | N/A | C:\Users\Admin\AppData\Local\Temp\RAT\CrimsonRAT.exe | C:\ProgramData\Hdlharas\dlrarhsiva.exe |
| PID 412 wrote to memory of 2520 | N/A | C:\Users\Admin\AppData\Local\Temp\RAT\CrimsonRAT.exe | C:\ProgramData\Hdlharas\dlrarhsiva.exe |
Uses Task Scheduler COM API
Uses Volume Shadow Copy WMI provider
Uses Volume Shadow Copy service COM API
Processes
C:\Users\Admin\AppData\Local\Temp\RAT\CrimsonRAT.exe
"C:\Users\Admin\AppData\Local\Temp\RAT\CrimsonRAT.exe"
C:\ProgramData\Hdlharas\dlrarhsiva.exe
"C:\ProgramData\Hdlharas\dlrarhsiva.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| FR | 185.136.161.124:6128 | tcp | |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| FR | 185.136.161.124:8761 | tcp | |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
| FR | 185.136.161.124:11614 | tcp | |
| FR | 185.136.161.124:15822 | tcp | |
| US | 8.8.8.8:53 | 11.179.89.13.in-addr.arpa | udp |
| FR | 185.136.161.124:17443 | tcp | |
| FR | 185.136.161.124:8761 | tcp | |
| FR | 185.136.161.124:11614 | tcp | |
| FR | 185.136.161.124:15822 | tcp |
Files
memory/412-0-0x00007FF933B23000-0x00007FF933B25000-memory.dmp
memory/412-1-0x0000020138E80000-0x0000020138E9E000-memory.dmp
memory/412-2-0x00007FF933B20000-0x00007FF9345E2000-memory.dmp
C:\ProgramData\Hdlharas\mdkhm.zip
| MD5 | b635f6f767e485c7e17833411d567712 |
| SHA1 | 5a9cbdca7794aae308c44edfa7a1ff5b155e4aa8 |
| SHA256 | 6838286fb88e9e4e68882601a13fa770f1b510a0a86389b6a29070a129bf2e5e |
| SHA512 | 551ba05bd44e66685f359802b35a8c9775792a12844906b4b53e1a000d56624c6db323754331c9f399072790991c1b256d9114a50fb78111652a1c973d2880af |
C:\ProgramData\Hdlharas\dlrarhsiva.exe
| MD5 | 64261d5f3b07671f15b7f10f2f78da3f |
| SHA1 | d4f978177394024bb4d0e5b6b972a5f72f830181 |
| SHA256 | 87f51b4632c5fbc351a59a234dfefef506d807f2c173aac23162b85d0d73c2ad |
| SHA512 | 3a9ff39e6bc7585b0b03f7327652e4c3b766563e8b183c25b6497e30956945add5684f1579862117e44c6bac2802601fc7c4d2a0daa1824f16c4da1fd6c9c91a |
memory/2520-44-0x0000018070C00000-0x0000018071514000-memory.dmp
memory/2520-43-0x00007FF933B20000-0x00007FF9345E2000-memory.dmp
memory/2520-45-0x00007FF933B20000-0x00007FF9345E2000-memory.dmp
memory/412-47-0x00007FF933B20000-0x00007FF9345E2000-memory.dmp
memory/2520-48-0x00007FF933B20000-0x00007FF9345E2000-memory.dmp
Analysis: behavioral4
Detonation Overview
Submitted
2024-12-06 10:43
Reported
2024-12-06 10:48
Platform
win10ltsc2021-20241023-en
Max time kernel
300s
Max time network
208s
Command Line
Signatures
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process | N/A | C:\Windows\SYSTEM32\runonce.exe | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\_CutButterball | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| File opened for modification | C:\Windows\BreakTart | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\BIOS | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 444 wrote to memory of 12840 | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | C:\Windows\SYSTEM32\runonce.exe |
| PID 444 wrote to memory of 12840 | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | C:\Windows\SYSTEM32\runonce.exe |
Processes
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\RAT\NetWire.doc" /o ""
C:\Windows\SYSTEM32\runonce.exe
runonce.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | roaming.officeapps.live.com | udp |
| FR | 52.109.68.129:443 | roaming.officeapps.live.com | tcp |
| US | 8.8.8.8:53 | 18.89.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 129.68.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.173.189.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
Files
memory/444-3-0x00007FFBC676D000-0x00007FFBC676E000-memory.dmp
memory/444-2-0x00007FFB86750000-0x00007FFB86760000-memory.dmp
memory/444-1-0x00007FFB86750000-0x00007FFB86760000-memory.dmp
memory/444-0-0x00007FFB86750000-0x00007FFB86760000-memory.dmp
memory/444-4-0x00007FFB86750000-0x00007FFB86760000-memory.dmp
memory/444-5-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-6-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-7-0x00007FFB86750000-0x00007FFB86760000-memory.dmp
memory/444-10-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-12-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-11-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-13-0x00007FFB841F0000-0x00007FFB84200000-memory.dmp
memory/444-9-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-8-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-14-0x00007FFB841F0000-0x00007FFB84200000-memory.dmp
memory/444-41-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-46-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-45-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-44-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-43-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-42-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-40-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-54-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-56-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-60-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-59-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-58-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-57-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-55-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-53-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-52-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-51-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-50-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-49-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-48-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
memory/444-47-0x00007FFBC66D0000-0x00007FFBC68C8000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
| MD5 | 221ec4b33e567f00e783379edd23c417 |
| SHA1 | 4ab26b2bc6d76bf29608121f94decfca716ebd02 |
| SHA256 | fde521e34daf7eddd77571f12b7fa84ab7b233d8d529d921791e2a22fb990353 |
| SHA512 | 99cbd37b87efe6b8b55eff61fd68b6e8a927ac6820c10e04a5009b0e745aa487ac02d7817224908632054cc335b54f8bbd0b449ebf6a2d617a0dd33b64f387bc |
C:\Users\Admin\AppData\Local\Temp\ands.dll
| MD5 | d4a7e2883571bd5aadc8c42e7dde6288 |
| SHA1 | 90d06ccbcfa36ed581a9a9af5f3581dc36387746 |
| SHA256 | 787b25dc26dc474d9a6a8afe13c20ec3db2d204b390c399029c92da3dbbbdd40 |
| SHA512 | a204f3be5a0a95c3b6126473b6079965386c4a66d59bc0bbb40772141b65775d7db60b01caced38796c66d2bf7a6d23e8dd4970d7a9a5d40901ac19477d25714 |
C:\Windows\_CutButterball
| MD5 | d75565b620cb728574c3308d50bbb827 |
| SHA1 | b182ca95fc4ded27fb1000025f5b48e1c85ac1f3 |
| SHA256 | 320d11637b034a5e2ba1e0308201320278ff8c1efe024dc8225ce741f800af65 |
| SHA512 | 9458450cdfc42066a22bb773290325e9d6f91c100bf16912644a9cc1580191e35309bd9c21d6f9e3fc934ab1ca5ed3097e1e5c77e2ff73cd8de558270ab4a31d |
C:\Windows\BreakTart
| MD5 | 081c6d16a42da543e053d56b41e011a4 |
| SHA1 | 7c3b4b079e17988aef2deb73150dda9f8b393fdc |
| SHA256 | 7a4a7fc464c0e33f4959bbfad178f2437be9759ec80078a1b5b2f44656830396 |
| SHA512 | 5a65a2b81c0d001be174a100363adae86bdc9af02360fbd2c87ebdb45d62833104e4cca90473f1156792473af5922e947677585c55052a99868e6a395aa457ff |
C:\Windows\_CutButterball
| MD5 | 3d7d7cd0025da467f173323b59e4b117 |
| SHA1 | 74a792af2a11c7a0ee84898167ed71939b9c2cbb |
| SHA256 | 9ebceae390112b96ceadc132cf70c065bae365705de0e11bd61f481224330b03 |
| SHA512 | f06c0244c049f7837f636e8649d524e94d065ac5c23a7d5df74065e874fcbb79a3e20c2febedaf5637f3531a4c8e69c0f233974e3a2e94f22afa7f04fce247b7 |
C:\Windows\_CutButterball
| MD5 | b9aa021d1561596023332b88ac16808c |
| SHA1 | d3a7074f682f529aa3986778ecd9457c399d31a3 |
| SHA256 | 08843168fb1db0d9c391faebabe8942fb31f858d459f922fbc7018a62b370a62 |
| SHA512 | 31461f1469b0a3740175316e9d5f4ee474ff536c010c9c909fd8c0c65f52890b5a43c2b212404bd9099cf4d0fc1d39381a52bb17b490e2a582312f6d35ef5e48 |
C:\Windows\_CutButterball
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
Analysis: behavioral5
Detonation Overview
Submitted
2024-12-06 10:43
Reported
2024-12-06 10:48
Platform
win10ltsc2021-20241023-en
Max time kernel
298s
Max time network
298s
Command Line
Signatures
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\RAT\VanToM-Rat.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe | N/A |
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RAT\\VanToM-Rat.exe" | C:\Users\Admin\AppData\Local\Temp\RAT\VanToM-Rat.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Roaming\\VanToM Folder\\Server.exe" | C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe | N/A |
Enumerates physical storage devices
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\RAT\VanToM-Rat.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\RAT\VanToM-Rat.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2792 wrote to memory of 1912 | N/A | C:\Users\Admin\AppData\Local\Temp\RAT\VanToM-Rat.exe | C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe |
| PID 2792 wrote to memory of 1912 | N/A | C:\Users\Admin\AppData\Local\Temp\RAT\VanToM-Rat.exe | C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\RAT\VanToM-Rat.exe
"C:\Users\Admin\AppData\Local\Temp\RAT\VanToM-Rat.exe"
C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe
"C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 120.250.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| DE | 193.161.193.99:22603 | tcp | |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| US | 8.8.8.8:53 | 217.72.21.2.in-addr.arpa | udp |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp | |
| DE | 193.161.193.99:22603 | tcp |
Files
memory/2792-0-0x00007FFC3E245000-0x00007FFC3E246000-memory.dmp
memory/2792-1-0x000000001BA50000-0x000000001BAF6000-memory.dmp
memory/2792-2-0x00007FFC3DF90000-0x00007FFC3E931000-memory.dmp
memory/2792-3-0x000000001C050000-0x000000001C51E000-memory.dmp
memory/2792-4-0x00007FFC3DF90000-0x00007FFC3E931000-memory.dmp
memory/2792-5-0x000000001C5F0000-0x000000001C68C000-memory.dmp
memory/2792-6-0x0000000001490000-0x0000000001498000-memory.dmp
memory/2792-7-0x000000001C750000-0x000000001C79C000-memory.dmp
memory/2792-8-0x000000001F3A0000-0x000000001F6B0000-memory.dmp
memory/2792-9-0x00007FFC3DF90000-0x00007FFC3E931000-memory.dmp
C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe
| MD5 | 3d4e3f149f3d0cdfe76bf8b235742c97 |
| SHA1 | 0e0e34b5fd8c15547ca98027e49b1dcf37146d95 |
| SHA256 | b15c7cf9097195fb5426d4028fd2f6352325400beb1e32431395393910e0b10a |
| SHA512 | 8c9d2a506135431adcfd35446b69b20fe12f39c0694f1464c534a6bf01ebc5f815c948783508e06b14ff4cc33f44e220122bf2a42d2e97afa646b714a88addff |
memory/2792-14-0x00007FFC3DF90000-0x00007FFC3E931000-memory.dmp
memory/1912-15-0x00007FFC3DF90000-0x00007FFC3E931000-memory.dmp
memory/1912-13-0x00007FFC3DF90000-0x00007FFC3E931000-memory.dmp
memory/1912-16-0x00007FFC3DF90000-0x00007FFC3E931000-memory.dmp
memory/1912-17-0x00007FFC3DF90000-0x00007FFC3E931000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\melt.txt
| MD5 | 043789b31546b4b9db024572fdb74719 |
| SHA1 | fa162860d98b440196bdf127d2bfdb2457f3c86a |
| SHA256 | 88695e1d3afa0037384d29fb7bd96e7e63360b3f18e2bdfde9976c95e59a6717 |
| SHA512 | 0a50fb469f41a82185a902b1e4104ae2d4f73e656b391a6ea25bdd3268e797e147747970fe561fdff7adff4ffd9e2666907bba20ba1d7be70cff28c5250a2b5e |
memory/1912-19-0x00007FFC3DF90000-0x00007FFC3E931000-memory.dmp
memory/1912-20-0x00007FFC3DF90000-0x00007FFC3E931000-memory.dmp