Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2025 15:54
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe
Resource
win10v2004-20250211-en
General
-
Target
2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe
-
Size
9.8MB
-
MD5
488305a7b3190c2c0fc6166a532b98d5
-
SHA1
5675580b0f37a5428acd9570457dc561068bffdb
-
SHA256
9ddd4c82e71888f24d83cae5b83c8ca78e4c6f95badd4cecf854a0065204c74d
-
SHA512
1f14d8b7ac8b0117987ce8e4b8e33ecf6936fbff3d5e169f4109717836a473218194c9e09181c47cd43faded5e41033c51d5ccfbb01c65a57c92e2796af71ecf
-
SSDEEP
196608:1zS1+mVNJzKCoBNdUMKnHlawrBaAQeNzeNGdzcW/NM9r+qRP:1zSLVHu77uMCFawVaATaNGdoW1qRP
Malware Config
Signatures
-
Ardamax family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 46 2644 Process not Found -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Control Panel\International\Geo\Nation 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Key value queried \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Control Panel\International\Geo\Nation MSI1D8B.tmp Key value queried \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Control Panel\International\Geo\Nation SRO_R.exe -
Executes dropped EXE 3 IoCs
pid Process 4808 MSI1D8B.tmp 2728 SRO_R.exe 4444 TEV.exe -
Loads dropped DLL 14 IoCs
pid Process 1928 MsiExec.exe 1928 MsiExec.exe 1928 MsiExec.exe 1928 MsiExec.exe 2836 MsiExec.exe 2836 MsiExec.exe 2836 MsiExec.exe 2836 MsiExec.exe 4444 TEV.exe 4444 TEV.exe 4604 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe 4604 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TEV Start = "C:\\ProgramData\\CFQPBU\\TEV.exe" TEV.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\V: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\Q: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\H: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\I: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\P: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\B: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\K: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\R: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\O: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\U: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\O: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\V: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\Z: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\N: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\Q: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\B: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\Z: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\H: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\M: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\M: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\A: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\J: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\S: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\I: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\X: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\W: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\N: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\R: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\G: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\S: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\T: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\Y: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\X: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\Net2e\Silkroad 3Job\32-bit\sro_client.exe msiexec.exe File created C:\Program Files\Net2e\Silkroad 3Job\32-bit\SRO_R.exe msiexec.exe File created C:\Program Files\Net2e\Silkroad 3Job\silkroad.exe msiexec.exe File created C:\Program Files\Net2e\Silkroad 3Job\sro_client.exe msiexec.exe File created C:\Program Files\Net2e\Silkroad 3Job\SRO_R.exe msiexec.exe File created C:\Program Files\Net2e\Silkroad 3Job\32-bit\silkroad.exe msiexec.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI1539.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1605.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI1673.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI181A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1A5D.tmp msiexec.exe File opened for modification C:\Windows\Installer\e5814db.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\e5814dd.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI1D8B.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{D288FDB9-1F34-4684-9051-80ECB18B0C23} msiexec.exe File created C:\Windows\Installer\e5814db.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSI1D8B.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SRO_R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TEV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2700 MicrosoftEdgeUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124 = "Document Encryption" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe -
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\F2E088BC626908443843D0FA79E51C27\9BDF882D43F14864091508CE1BB8C032 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\SourceList\PackageName = "ChayNhieuAcc_Sro3job_Net2e.x64.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9BDF882D43F14864091508CE1BB8C032 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\ProductName = "Silkroad 3Job" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\F2E088BC626908443843D0FA79E51C27 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MSI1D8B.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\Version = "16777216" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\SourceList\Media\1 = "Disk1;Disk1" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\PackageCode = "E6FE750F0975D104F9C7C4D8D26FBC9F" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\Language = "1066" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Roaming\\Net2e\\Silkroad 3Job 1.0.0\\install\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9BDF882D43F14864091508CE1BB8C032\MainFeature msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Roaming\\Net2e\\Silkroad 3Job 1.0.0\\install\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9BDF882D43F14864091508CE1BB8C032\SourceList\Media msiexec.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2072 msiexec.exe 2072 msiexec.exe 4444 TEV.exe 4444 TEV.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4444 TEV.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 2072 msiexec.exe Token: SeCreateTokenPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeAssignPrimaryTokenPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeLockMemoryPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeIncreaseQuotaPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeMachineAccountPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeTcbPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeSecurityPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeTakeOwnershipPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeLoadDriverPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeSystemProfilePrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeSystemtimePrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeProfSingleProcessPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeIncBasePriorityPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeCreatePagefilePrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeCreatePermanentPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeBackupPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeRestorePrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeShutdownPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeDebugPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeAuditPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeSystemEnvironmentPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeChangeNotifyPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeRemoteShutdownPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeUndockPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeSyncAgentPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeEnableDelegationPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeManageVolumePrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeImpersonatePrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeCreateGlobalPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeCreateTokenPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeAssignPrimaryTokenPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeLockMemoryPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeIncreaseQuotaPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeMachineAccountPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeTcbPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeSecurityPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeTakeOwnershipPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeLoadDriverPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeSystemProfilePrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeSystemtimePrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeProfSingleProcessPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeIncBasePriorityPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeCreatePagefilePrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeCreatePermanentPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeBackupPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeRestorePrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeShutdownPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeDebugPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeAuditPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeSystemEnvironmentPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeChangeNotifyPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeRemoteShutdownPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeUndockPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeSyncAgentPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeEnableDelegationPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeManageVolumePrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeImpersonatePrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeCreateGlobalPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeCreateTokenPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeAssignPrimaryTokenPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeLockMemoryPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeIncreaseQuotaPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe Token: SeMachineAccountPrivilege 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4444 TEV.exe 4444 TEV.exe 4444 TEV.exe 4444 TEV.exe 4444 TEV.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1928 2072 msiexec.exe 90 PID 2072 wrote to memory of 1928 2072 msiexec.exe 90 PID 2072 wrote to memory of 1928 2072 msiexec.exe 90 PID 868 wrote to memory of 4604 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe 91 PID 868 wrote to memory of 4604 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe 91 PID 868 wrote to memory of 4604 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe 91 PID 2072 wrote to memory of 1616 2072 msiexec.exe 97 PID 2072 wrote to memory of 1616 2072 msiexec.exe 97 PID 2072 wrote to memory of 2836 2072 msiexec.exe 99 PID 2072 wrote to memory of 2836 2072 msiexec.exe 99 PID 2072 wrote to memory of 2836 2072 msiexec.exe 99 PID 2072 wrote to memory of 4808 2072 msiexec.exe 101 PID 2072 wrote to memory of 4808 2072 msiexec.exe 101 PID 2072 wrote to memory of 4808 2072 msiexec.exe 101 PID 4808 wrote to memory of 2728 4808 MSI1D8B.tmp 102 PID 4808 wrote to memory of 2728 4808 MSI1D8B.tmp 102 PID 4808 wrote to memory of 2728 4808 MSI1D8B.tmp 102 PID 2728 wrote to memory of 4444 2728 SRO_R.exe 103 PID 2728 wrote to memory of 4444 2728 SRO_R.exe 103 PID 2728 wrote to memory of 4444 2728 SRO_R.exe 103 PID 868 wrote to memory of 1564 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe 104 PID 868 wrote to memory of 1564 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe 104 PID 868 wrote to memory of 1564 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe 104 PID 868 wrote to memory of 3264 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe 106 PID 868 wrote to memory of 3264 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe 106 PID 868 wrote to memory of 3264 868 2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe 106 PID 1564 wrote to memory of 1460 1564 cmd.exe 108 PID 1564 wrote to memory of 1460 1564 cmd.exe 108 PID 1564 wrote to memory of 1460 1564 cmd.exe 108 PID 3264 wrote to memory of 3436 3264 cmd.exe 109 PID 3264 wrote to memory of 3436 3264 cmd.exe 109 PID 3264 wrote to memory of 3436 3264 cmd.exe 109 PID 1564 wrote to memory of 3240 1564 cmd.exe 110 PID 1564 wrote to memory of 3240 1564 cmd.exe 110 PID 1564 wrote to memory of 3240 1564 cmd.exe 110 PID 1564 wrote to memory of 3760 1564 cmd.exe 111 PID 1564 wrote to memory of 3760 1564 cmd.exe 111 PID 1564 wrote to memory of 3760 1564 cmd.exe 111 PID 1564 wrote to memory of 3764 1564 cmd.exe 112 PID 1564 wrote to memory of 3764 1564 cmd.exe 112 PID 1564 wrote to memory of 3764 1564 cmd.exe 112 PID 3264 wrote to memory of 5112 3264 cmd.exe 113 PID 3264 wrote to memory of 5112 3264 cmd.exe 113 PID 3264 wrote to memory of 5112 3264 cmd.exe 113 PID 3264 wrote to memory of 3224 3264 cmd.exe 114 PID 3264 wrote to memory of 3224 3264 cmd.exe 114 PID 3264 wrote to memory of 3224 3264 cmd.exe 114 PID 3264 wrote to memory of 2756 3264 cmd.exe 115 PID 3264 wrote to memory of 2756 3264 cmd.exe 115 PID 3264 wrote to memory of 2756 3264 cmd.exe 115 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 1460 attrib.exe 3436 attrib.exe 3240 attrib.exe 5112 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe" /i "C:\Users\Admin\AppData\Roaming\Net2e\Silkroad 3Job 1.0.0\install\ChayNhieuAcc_Sro3job_Net2e.x64.msi" CLIENTPROCESSID="868" ADDLOCAL="MainFeature" SECONDSEQUENCE="1" CHAINERUIPROCESSID="868Chainer" ACTION="INSTALL" EXECUTEACTION="INSTALL" CLIENTUILEVEL="0" PRIMARYFOLDER="APPDIR" ROOTDRIVE="C:\" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\2025-02-13_488305a7b3190c2c0fc6166a532b98d5_mafia.exe" EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs " TARGETDIR="C:\" APPDIR="C:\Program Files\Net2e\Silkroad 3Job\" SHORTCUTDIR="C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Silkroad 3Job"2⤵
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:4604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXE29FE.tmp.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\attrib.exeATTRIB -r "\\?\C:\Users\Admin\AppData\Roaming\Net2e\SILKRO~1.0\install\CHAYNH~2.MSI"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1460
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB -r "C:\Users\Admin\AppData\Local\Temp\EXE29FE.tmp.bat"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXE29FE.tmp.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" cls"3⤵
- System Location Discovery: System Language Discovery
PID:3764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXE2A4D.tmp.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\attrib.exeATTRIB -r "\\?\C:\Users\Admin\AppData\Roaming\Net2e\SILKRO~1.0\install\CHAYNH~2.MSI"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3436
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB -r "C:\Users\Admin\AppData\Local\Temp\EXE2A4D.tmp.bat"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXE2A4D.tmp.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" cls"3⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9C49FB9DE3F5249A1944A0C74FD28396 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1928
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:1616
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2996AFF2956827ABC445E4EA23F36BC22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\Installer\MSI1D8B.tmp"C:\Windows\Installer\MSI1D8B.tmp" "C:\Program Files\Net2e\Silkroad 3Job\SRO_R.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files\Net2e\Silkroad 3Job\SRO_R.exe"C:\Program Files\Net2e\Silkroad 3Job\SRO_R.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\ProgramData\CFQPBU\TEV.exe"C:\ProgramData\CFQPBU\TEV.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4444
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:408
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMzNzEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDE5Mjc1MzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjQzNjc5MjE0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies data under HKEY_USERS
PID:2700
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD521613eb420237874cea0912377cf4bcd
SHA14371694b9f3baeff701b208883a80f25fa56cd60
SHA2565951ce2984b32d907877c07caa7d2b8d7ce978ccc5f479fba14024fca75e99df
SHA5123e8904b89c512faf64c64baed39a1271e145febad8eb8b8b18ee618fe4cc3bf1fff1613c70a9a1c09a03688a72da30542247bb4d3b2034e666dd505d76139db3
-
Filesize
2.3MB
MD538bbc879ab82720283d9a27b3ca72490
SHA128ed426f5462b1eaf3dec3c50000dc47d03b5549
SHA256546360798477f6e8ec31bf1e230a69bb78f882e71908c504b80604b00e0475cc
SHA5121a8aa20936fafd8abac638e19fc7297df710301b2e0b7c66ebbd3b47b5606bfd83718b97c29edcc29efa3bde235d3eb59904ebafa8160c48cf3a086f4442e27b
-
Filesize
760KB
MD589b479f1a3b42728542c322cc4891753
SHA17e4e99bf85be7f0700935239484267ddbd68c8d5
SHA25633bd217912cfe5cdf585a785b0b93f83b51419f5ddc954cb95b0a40e6dcaae73
SHA5122e4c141a45b4a1cc490b22e5f1415a7bda1dabda5843dce5a0b7e2d3b91877d300f4f86f265d6f77103be6bec12dc4ee6ba4ac8905e55c382ec474f43ffb4b83
-
Filesize
2KB
MD5869c7988a9fae9365caeeabcda0e7f1a
SHA113bd3b73b6368ce425a8fb5673aaabe7d23325c1
SHA2565d30f82285ce74ce9a3c2550df03e0c003fc5c9225ce256cdb0d023d39985a2c
SHA5128fe063b771c85aeb25bfb4bb42bac4116d9857d2a987f5640042a3ac1ed167668d911eebe70a07c5fad2f7978d756d90d9fbb996d68b0438ee10664e025b6737
-
Filesize
79KB
MD5582bfe4bf9de1077982664ad8ce0754a
SHA1465eb7f460f9eb9a34572df6f17cf2cb2d8c3688
SHA256ce4597c260250342bec2baec880a040a62b70137c3aea062ea78e80159101184
SHA51240ca7584c33eb8a4df9b7566ee4b2cc55061e627160a99535e43b3189ff1093d3b8d55cf56156f20bec8562de9fb80f3ddfd07b878002111d22b991c05b46207
-
Filesize
2.6MB
MD5bbf69aeaed386c67d946b1cb197abcac
SHA1c291c37b677c0784ead38e57ee22d704b2196730
SHA2568bd424a581e6307dce2231a459d686486937d491677827b2f3eee8110741ba2a
SHA5124e7df27a352a207f7d9c2a20835e6b3d036ce30f69b3cce74687e165f1138f15de62a6aa8ee81c777d168e5ee7202077e7e9e1c5a67e39d07b5064c7e96c3a85
-
Filesize
935B
MD5919dd1ee8f7a107b9f3c89c670730b82
SHA172109932e2ecb555f6904fad2c82094633dd22b3
SHA2562812279d6a5aead04c5767461208f80e8a4dd3145cb9d1c1d44b82f7b456a445
SHA512532b72b7b518d6a00cfd2df66b6e6ba57f8bb1b6c341585eca925b64a7a7a865f493fc302276f02ba0e6c76300da86254c85668dfb948ffdbefc420f78123d01
-
Filesize
207KB
MD5019a43c583d1b218b1d21a2b3cdfc5e3
SHA1630c669316b7d3f926270dbe88649e36df879d81
SHA2568c1e8e951b986cb33ba7e0653610599e9cde64b5a006e02bc76274b188bb1406
SHA512276de722cfad59252dc096ba51d46b5f7edd4407a73cf9bd7978cc95d2ed08b71c5f7517ef65b3bb0a5dae984c470567a64149149b47d0036a4821bbad4b9b4a
-
Filesize
1KB
MD59a740549bd117bc16f6acb8d884604d2
SHA1da20e48acde3a7097f8335541de40fe94c600e0a
SHA2560daed44a8e14750614afda54781621d400fed0d2ecee9a4a402f5964d3cd3f5a
SHA5123da47437f97e28b4f7fbb0abff44a4811b96d8511ac736dabd24b598a98b274a2e8fb9c9475a08de3478cd41683ba60db771ce409e2aba2799f866ec813a3e1e
-
Filesize
1KB
MD502f6bbe060f32e49e3caf2de8e60ec7f
SHA14674875a4f264a947da6bf6f626b9bd50325d034
SHA25620072ae2e122a6407dac4771544158d7bcecebf98404c22001b0e69f79c8580d
SHA512daaadbf113af1af0315333089e8b6ff4891d1fe0fa95e5ecaeaf763da593bcb4a8e1a1a940f44a3a5b6e22a9296cab1fa56e4d533cd938f434b565d6323fb588
-
Filesize
1KB
MD5a98e2f7d5dc055ad4b4b6d92126d9190
SHA1c2db85dcf7bf991e8bba0d39f952748dc98d41d6
SHA25665751616edb29437b01cd352b8651835ca585942a78adaac589f9f8c16039470
SHA512c10aa6fe00361ab2fd6d78496fd20cb2361f235563156d4c41ec6e2e86207c964cdc3b303b927fc64a3fe86d4f5930c0c775e8d0e213f0d63a79f22133128fea
-
Filesize
1KB
MD5d20270537ae700b03b988fc7471c820e
SHA13b68b1be0a7d30df6ed8952c34794e90102b77df
SHA256a8c29d7365a7ed4191b20d08be6274215f5f12be420e826852205c4f3755dbb4
SHA512f8245bff51757d1d44f4da5dece49f6b96d704e72a2b6d2edfa517029a69eb410cdea3945a2c3c29a32e6e9e0cb1a0b0938c4f7d3711446ec963913b4e6a3780
-
Filesize
406B
MD5e46e953fdb752a4cb76385f81247249c
SHA12d55410280e58d5435e6de6b6505bbf0ce4265e3
SHA25618cb5209c2e346795a4e20ba70a2f0ff39f6a1c5ec474bce75180ac2cd72856b
SHA512dfbc0aadf3a08fd75ad71c7d525d523dbfd77f3a9a1103a68fa7b72dc437eaeb00c8b255ad085f84391510b033b96ef7c27891174bf024fcc18a66cb366136cf
-
Filesize
406B
MD526547fbd9dcba54a3750f24616de5052
SHA1be0772602f1680737c3ac20b51f73b079a5f7d97
SHA2564741209ab64f2759ee8f34686ef9258935f6a2c6b103f8618569f03fd761fbd9
SHA512f7ebe4d2f649146c176732a711620d76259ee68574536b60acb19fb071a7195509a29c435218649e78de1d2b2530928969af880afc278b38081bdc63b087140a
-
Filesize
91KB
MD5f16f35078bfb36d801f8c500ba5c1a40
SHA13b97e9a8daf7e2d6a9e656edede87314ee142a89
SHA256583bf08b032b830d33cb34fd0a1d51361311592528d27881266e87a074b416ff
SHA51284e3207d6399a314f533ea597e23759c618a16fc57493e8fdf2ee86a1daf776d4315612fd6ba23046d46e46a92b1b0b29a2d40bdd27baa9dc51feadb4af89230
-
Filesize
960KB
MD5df279f36eded4286c34e3d410eedd815
SHA1989a353712a825bd8e13fe6302b2ea14eada4dc0
SHA256caea3de29051cb924d5476f29d151f62604b5018b0c40d659ceb1590408773e2
SHA512d613af381d939b92bcde51bf99e7401708a65092f5e2f890d3da0da9051b5ccedcb3a892f49643f7b1de01a642edfc512c0dda492a8efd80b62e33d4f40e60d3
-
Filesize
6.3MB
MD5b37a918c25e558e722330f4d0d9f92fc
SHA11d82ccb28eee6591b2ba8e7cddc433dd365559cb
SHA2569c661cfb943835dfd741a22a4178bd612759f3829be954eabcb254442b1ead54
SHA5128f2d516ed64781484d1c8fc795fc7c905800dbd10cbe92adf7c4867c049c0c139027e5fc8dcd3fd386f46e7b9d33d6459fe941aa47c0b8404def4b8d9cdf882b
-
Filesize
300KB
MD53953318d1e6d124b10805cc5919fe47e
SHA176dfb3240d7fd6b860d23a6d210d85adb17b7803
SHA2560670c12c9d190d80f0e4b907041dd94ac25c93b71b121b75372e3560e7818e1b
SHA5128937bc63d5cb685216e4fef6eef45cbdea96787d762467bfc7f8ce87b28985f4834cf67ba13e3f2194e472af1ce3ab39eb239ae2140ecab4eaf411cc95c207aa
-
Filesize
14KB
MD5aa154d2b96be7ab9f8f2588c07ba7669
SHA1972e5f88b4408b13c88f4126106db6a495806b7f
SHA2560ca2db61f95832d643559b51acf71a01b3caa22a975988a1669898716f657c46
SHA5124cfe97af406075a09cea81c84340fdc141ae95ae26cc6e1a465b7cf00fafccde48e55ac01cfee18dba5e7d368dc7cb3efd1dcc819f87b770691e4205882f7e3e
-
Filesize
24.1MB
MD57cc4d3c7524642889ab891b6abba84f8
SHA10db68755de49d18a88a6d7c9883c9d3a4ee7f652
SHA2560c6a171fcba0f8e90116092046725bc0c68dfe07cc82473eff22d289059d0da7
SHA5122b95c92c2941e937576abd0b3024ae9697843169a22a585f7684a779d9063e5bfff80d434094db9e0388a2b1e2b7657fefb644a691778a12fd7e5e98cc5989bd
-
\??\Volume{3db265df-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{667965dd-333b-4efd-a9fc-bb510b2a59df}_OnDiskSnapshotProp
Filesize6KB
MD57d69bf3cdddbf58cf2098383947a2437
SHA19403a91b9f5b03d30832faf3b813a2168a22cbf1
SHA256bc5d4cbfee92b40c4f4ef90f0288493641675f4291cc72357011a4eb08e6213e
SHA512fb7400344c1072a6e5e91c3aebf226c90cc3fede7fb37f9e3e11a2c47a38ab94c576b3af4d3038e195d54e55c7e66e18d7f59fce41e73ee2bf3564fa9cc01ad8