id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
3,827 | Set QWORD Value {Variable}.registry.write Write/Add Registry {Variable}.registry.provider Create Registry Handle {Variable}.registry.destroy Deletes Registry Key {Variable}.registry.read Get/Read Registry Entries {Variable}.WMI WMI-related functions { | [] | [] | [] |
224 | Figure 8 shows that the number of Ukraine-related phishing/scam sites is currently continuing to rise about a month after the “Ukraine aid” search term started trending in Google search. | [
{
"id": 747,
"label": "attack-pattern",
"start_offset": 50,
"end_offset": 58
},
{
"id": 45924,
"label": "attack-pattern",
"start_offset": 59,
"end_offset": 69
},
{
"id": 45926,
"label": "location",
"start_offset": 34,
"end_offset": 41
},
{
"id": 45927,
"label": "SOFTWARE",
"start_offset": 172,
"end_offset": 178
}
] | [] | [] |
5,032 | If the user clicked continue, they would be redirected to an attacker controlled site that collected the users credentials. | [] | [] | [] |
322 | Please mark, I'm not a robot! | [] | [] | [] |
5,546 | Unfortunately, there’s nothing obvious that differentiates a website infected with Magecart from any other site. | [
{
"id": 51539,
"label": "malware",
"start_offset": 83,
"end_offset": 91
}
] | [] | [] |
743 | This year Microsoft has already patched 126 IE vulnerabilities to date. | [
{
"id": 46335,
"label": "identity",
"start_offset": 10,
"end_offset": 19
}
] | [] | [] |
201 | These attacks impacted Ukrainian government organizations including the Ministry of Defense, Ministry of Foreign Affairs, Armed Forces of Ukraine and the publicly funded broadcaster Ukrainian Radio. | [
{
"id": 44616,
"label": "identity",
"start_offset": 23,
"end_offset": 43
},
{
"id": 44617,
"label": "identity",
"start_offset": 72,
"end_offset": 91
},
{
"id": 44618,
"label": "identity",
"start_offset": 93,
"end_offset": 120
},
{
"id": 44619,
"label": "identity",
"start_offset": 122,
"end_offset": 145
},
{
"id": 44620,
"label": "identity",
"start_offset": 182,
"end_offset": 197
}
] | [] | [] |
2,597 | This initial focus has led to speculation that Lapsus$ Group may be Brazilian, although we understand the choice of targets to have been influenced by extended team members rather than the team leadership. | [
{
"id": 47788,
"label": "threat-actor",
"start_offset": 47,
"end_offset": 54
},
{
"id": 47789,
"label": "location",
"start_offset": 68,
"end_offset": 77
}
] | [
{
"id": 356,
"from_id": 47788,
"to_id": 47789,
"type": "located-at"
}
] | [] |
14,226 | How is GitHub abused? | [
{
"id": 48412,
"label": "SOFTWARE",
"start_offset": 7,
"end_offset": 14
}
] | [] | [] |
813 | Ignite '17 Security Conference: Vancouver, BC June 12–15, 2017 Ignite '17 Security Conference is a live, four-day conference designed for today’s security professionals. | [
{
"id": 46365,
"label": "TIME",
"start_offset": 47,
"end_offset": 63
},
{
"id": 46366,
"label": "location",
"start_offset": 33,
"end_offset": 46
}
] | [] | [] |
13,995 | Recently, we uncovered the Operation Earth Kitsune campaign and published a detailed analysis of its tactics, techniques, and procedures (TTPs). | [
{
"id": 48780,
"label": "campaign",
"start_offset": 27,
"end_offset": 50
}
] | [] | [] |
13,852 | Updated May 17, 2021, 3:25 a.m. Eastern Time: | [
{
"id": 42957,
"label": "TIME",
"start_offset": 22,
"end_offset": 44
}
] | [] | [] |
7,247 | The DLL is custom malware that would immediately begin communicating with actor-controlled C2 domains. | [] | [] | [] |
6,164 | Appending their malicious script to the victim’s email signature to propagate the infection to their contacts. | [] | [] | [] |
7,375 | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}' | [] | [] | [] |
12,637 | .pptx .pst .rar .sh .sql .txt .xls .xlsx .xml .zip | [] | [] | [] |
5,587 | Figure 5. Infected Linux device connected to a C&C server | [] | [] | [] |
477 | New anti-DGA technologies that leverage machine learning and big data are capable of countering DGA’s automation with automated prediction of their own that can anticipate, block, assist with malicious site takedowns or even, in some cases, prevent those malicious sites from being used in the first place. | [] | [] | [] |
13,267 | TClient is injected into dllhost.exe Malware Analysis wab32res.dll (FakeRun loader) loads TClient. | [
{
"id": 41339,
"label": "malware",
"start_offset": 0,
"end_offset": 7
},
{
"id": 41340,
"label": "malware",
"start_offset": 91,
"end_offset": 98
}
] | [] | [] |
149 | The most common way ransomware operators levy attacks is through email or by web browsing to malicious or compromised sites. | [
{
"id": 45848,
"label": "attack-pattern",
"start_offset": 65,
"end_offset": 123
}
] | [] | [] |
6,807 | Network destination for template injection: 176[.]119[.]147[.]225 Network destination for VBS: 176[.]57[.]215[.]115 These IP addresses are from Russian hosting companies. | [
{
"id": 21172,
"label": "IPV4",
"start_offset": 45,
"end_offset": 66
},
{
"id": 21173,
"label": "IPV4",
"start_offset": 96,
"end_offset": 116
},
{
"id": 21174,
"label": "location",
"start_offset": 137,
"end_offset": 140
}
] | [] | [] |
11,099 | As part of our wider tracking of APT31 activity, we've also seen them deploy targeted malware campaigns. | [
{
"id": 33895,
"label": "location",
"start_offset": 65,
"end_offset": 69
},
{
"id": 33896,
"label": "attack-pattern",
"start_offset": 77,
"end_offset": 93
}
] | [] | [] |
523 | Web hosting ransomware can also be downloaded and successfully installed through a multi-layered infection chain among different file types. | [
{
"id": 46150,
"label": "attack-pattern",
"start_offset": 0,
"end_offset": 22
}
] | [] | [] |
3,658 | Among these cybercriminals are financially motivated threat groups Carbanak and FIN7. | [
{
"id": 49428,
"label": "threat-actor",
"start_offset": 80,
"end_offset": 84
},
{
"id": 49427,
"label": "threat-actor",
"start_offset": 67,
"end_offset": 75
}
] | [] | [] |
13,292 | Figure 13. | [] | [] | [] |
1,119 | This results in a few hundred thousand individual mutexes available for further analysis. | [] | [] | [] |
4,756 | Across all Google products, we incorporate industry-leading security features and protections to keep our users safe. | [
{
"id": 50661,
"label": "identity",
"start_offset": 11,
"end_offset": 17
}
] | [] | [] |
8,348 | x.TextContent.StartsWith("Access for less secure apps has been turned on") select x).ToList | [] | [] | [] |
3,637 | Once Charlie has access to Alice’s email account, he then finds email conversations between Alice and Bob, his ultimate target. | [] | [] | [] |
4,571 | They continue to use the 'Browser in the Browser' phishing technique that TAG first observed and described in March. | [
{
"id": 50413,
"label": "TIME",
"start_offset": 110,
"end_offset": 115
},
{
"id": 50411,
"label": "attack-pattern",
"start_offset": 26,
"end_offset": 68
},
{
"id": 50412,
"label": "identity",
"start_offset": 74,
"end_offset": 77
}
] | [] | [] |
1,967 | Before starting analysis, we needed to set up a test environment. | [] | [] | [] |
5,342 | Core component code that receives and decrypts data from the C&C server If something is received, it is decrypted and written to the main pipe. | [] | [] | [] |
3,262 | 1. The “notice” handler is used for checking the connection with the C&C server. | [] | [] | [] |
8,691 | No longer do groups need to have the technical expertise, now they just need resources. | [
{
"id": 26836,
"label": "identity",
"start_offset": 67,
"end_offset": 71
}
] | [] | [] |
9,674 | For the initial information packet, the backdoor also collects the following: Figure 15. | [] | [] | [] |
5,109 | And the reason why I want to tackle this today is because I've had some conversations in the last few days that have really kind of hit that idea bulb that people don't truly understand how cybercriminals get away with their crimes in the organization. | [] | [] | [] |
10,404 | A partial code snippet of AutoHotkeyu32.ahk Figure 5. | [] | [] | [] |
2,282 | Furthermore, 3.5M users were warned before downloading a malicious file through Google Safe Browsing warnings. | [
{
"id": 47354,
"label": "SOFTWARE",
"start_offset": 80,
"end_offset": 100
}
] | [] | [] |
985 | Conclusion Even popular third party monetization platforms are not always trustworthy. | [] | [] | [] |
8,193 | Figure 5. | [] | [] | [] |
13,959 | A successful attack on a company providing critical services will have rippling effects that will harm multiple sectors of society, which is why protecting these services should be a top priority. | [] | [] | [] |
14,257 | Abusing popular platforms like GitHub enables threat actors like Winnti to maintain network persistence between compromised computers and their servers, while staying under the radar. | [
{
"id": 48451,
"label": "threat-actor",
"start_offset": 65,
"end_offset": 72
}
] | [] | [] |
1,943 | The header for a sample document can be seen below. | [] | [] | [] |
4,585 | In March 2021, Microsoft kicked off the patch cycle early after releasing an advisory regarding the mass exploitation of four zero-days vulnerabilities by a Chinese Hacking group, HAFNIUM, on the on-premises versions of the Microsoft Exchange Server. | [
{
"id": 50436,
"label": "TIME",
"start_offset": 3,
"end_offset": 13
},
{
"id": 50437,
"label": "identity",
"start_offset": 15,
"end_offset": 24
},
{
"id": 50438,
"label": "vulnerability",
"start_offset": 126,
"end_offset": 151
},
{
"id": 50439,
"label": "threat-actor",
"start_offset": 180,
"end_offset": 187
},
{
"id": 50440,
"label": "location",
"start_offset": 157,
"end_offset": 164
},
{
"id": 50441,
"label": "SOFTWARE",
"start_offset": 196,
"end_offset": 249
}
] | [
{
"id": 971,
"from_id": 50439,
"to_id": 50440,
"type": "located-at"
},
{
"id": 972,
"from_id": 50439,
"to_id": 50438,
"type": "exploits"
},
{
"id": 973,
"from_id": 50441,
"to_id": 50438,
"type": "has"
}
] | [] |
3,425 | fb770a3815c9ebcf1ba46b75b8f3686acc1af903de30c43bab8b86e5b46de851 | [
{
"id": 10318,
"label": "SHA2",
"start_offset": 1,
"end_offset": 65
}
] | [] | [] |
1,712 | In this case a legitimate service (Tor) was being abused by CryptoWall so it could avoid having its C2 servers shut down. | [
{
"id": 5086,
"label": "malware",
"start_offset": 60,
"end_offset": 70
},
{
"id": 5085,
"label": "tools",
"start_offset": 35,
"end_offset": 38
}
] | [
{
"id": 249,
"from_id": 5086,
"to_id": 5085,
"type": "uses"
}
] | [] |
522 | For example, the URL links can be posted on forums or chat group software, sent by IM applications, offered via fake freeware for download or attached in emails. | [
{
"id": 45793,
"label": "attack-pattern",
"start_offset": 112,
"end_offset": 125
},
{
"id": 46149,
"label": "attack-pattern",
"start_offset": 142,
"end_offset": 160
}
] | [] | [] |
4,799 | Google’s Threat Analysis Group (TAG) continues to closely monitor the cybersecurity environment in Eastern Europe with regard to the war in Ukraine. | [
{
"id": 50699,
"label": "location",
"start_offset": 140,
"end_offset": 147
},
{
"id": 50697,
"label": "identity",
"start_offset": 0,
"end_offset": 36
},
{
"id": 50698,
"label": "identity",
"start_offset": 99,
"end_offset": 113
}
] | [] | [] |
11,942 | We terminated 9 YouTube channels as part of our investigation into coordinated influence operations linked to China. | [] | [] | [] |
4,010 | To mitigate such risk, organizations must think globally and exert efforts to follow codes of local culture. | [] | [] | [] |
9,630 | This is shown in the figure below. | [] | [] | [] |
5,277 | Mobile | [] | [] | [] |
3,310 | The command that we received showed that the targeted browsers include Google Chrome, Microsoft Edge Beta, 360 Chrome, QQ Browser, 2345 Explorer, Sogou Explorer, and 360 Safe Browser. | [
{
"id": 48390,
"label": "SOFTWARE",
"start_offset": 71,
"end_offset": 84
},
{
"id": 48394,
"label": "SOFTWARE",
"start_offset": 131,
"end_offset": 144
},
{
"id": 48395,
"label": "SOFTWARE",
"start_offset": 146,
"end_offset": 160
},
{
"id": 48396,
"label": "SOFTWARE",
"start_offset": 166,
"end_offset": 182
},
{
"id": 48391,
"label": "SOFTWARE",
"start_offset": 86,
"end_offset": 105
},
{
"id": 48392,
"label": "SOFTWARE",
"start_offset": 107,
"end_offset": 117
},
{
"id": 48393,
"label": "SOFTWARE",
"start_offset": 119,
"end_offset": 129
}
] | [] | [] |
6,099 | Recently, FireEye published a blog titled “Operation Poisoned Hurricane” which detailed the use of PlugX malware variants signed with legitimate certificates that used Google Code project pages for command and control (C2). | [
{
"id": 18858,
"label": "location",
"start_offset": 62,
"end_offset": 71
},
{
"id": 18859,
"label": "malware",
"start_offset": 99,
"end_offset": 104
},
{
"id": 18860,
"label": "location",
"start_offset": 206,
"end_offset": 209
}
] | [] | [] |
4,331 | Stage 4 is the final payload (analyzed in the next section). | [] | [] | [] |
12,646 | Secret key generation | [] | [] | [] |
411 | As that trend shows no sign of slowing down anytime soon, we can expect this to remain a very lucrative avenue for attackers. | [] | [] | [] |
5,474 | Its latest version can mute the device (i.e., take out the ringtone and vibration features) and sync call logs and SMSs. | [] | [] | [] |
11,187 | We have seen it deployed against fewer than two dozen accounts located in Iran. | [] | [] | [] |
10,118 | Backdoor. | [] | [] | [] |
65 | A normal PC used to mine Monero can earn around US$0.25 per day at the current prices. | [
{
"id": 45824,
"label": "SOFTWARE",
"start_offset": 25,
"end_offset": 31
}
] | [] | [] |
10,153 | We were able to collect evidence that credential phishing emails were sent to chmail.ir users on May 18, 2017, just one day before the presidential elections in Iran. | [
{
"id": 30973,
"label": "attack-pattern",
"start_offset": 49,
"end_offset": 57
}
] | [] | [] |
7,724 | The .NET downloads jm1 — an .MSI installer — that installs another NSIS installer, leading to a ServHelper infection in the system. | [
{
"id": 23993,
"label": "malware",
"start_offset": 67,
"end_offset": 71
},
{
"id": 23994,
"label": "malware",
"start_offset": 96,
"end_offset": 106
}
] | [] | [] |
1,128 | With the appropriate tools it’s possible to enable a single researcher to continually review and categorize new mutexes. | [] | [] | [] |
10,235 | Recap of recent Pawn Storm activities Compromising accounts of users from the Middle East Trend Micro has been closely and consistently monitoring the activities of Pawn Storm, and in March 2020, we released our latest research on the group. | [
{
"id": 31264,
"label": "location",
"start_offset": 120,
"end_offset": 123
},
{
"id": 31265,
"label": "threat-actor",
"start_offset": 166,
"end_offset": 176
},
{
"id": 31266,
"label": "location",
"start_offset": 178,
"end_offset": 181
}
] | [] | [] |
7,857 | As of July 7, this includes 85.8% of active Android devices. | [] | [] | [] |
8,199 | Table 1. Domains registered using the email address | [] | [] | [] |
913 | By comparison, the latest version of the CryptoWall malware family takes roughly 1-3 minutes to complete its encryption routine. | [
{
"id": 2888,
"label": "malware",
"start_offset": 41,
"end_offset": 51
},
{
"id": 2889,
"label": "TIME",
"start_offset": 73,
"end_offset": 92
}
] | [] | [] |
583 | Cortex XDR endpoint protection stops malware, exploits and ransomware before they can compromise endpoints. | [
{
"id": 46179,
"label": "SOFTWARE",
"start_offset": 0,
"end_offset": 10
}
] | [] | [] |
2,972 | Preferably, find a password manager that requires two-factor authentication. 2. Protect Your Home Routers and Wi-Fi: | [] | [] | [] |
1,161 | If this functionality were available in some more open source setting, and was of even moderate quality, we would expect to see it used in other malware families as well. | [] | [] | [] |
6,008 | Recently observed IPs used in Curious Gorge campaigns: COLDRIVER, a Russian-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns, targeting several US based NGOs and think tanks, the military of a Balkans country, and a Ukraine based defense contractor. | [
{
"id": 18535,
"label": "attack-pattern",
"start_offset": 153,
"end_offset": 161
},
{
"id": 18537,
"label": "location",
"start_offset": 205,
"end_offset": 208
},
{
"id": 18539,
"label": "location",
"start_offset": 257,
"end_offset": 260
}
] | [] | [] |
230 | Figure 9. hxxps://startrackzm[.]com/wap-admin/ONE-DRIVE/one%20d%20%20no%[email protected]. | [
{
"id": 45930,
"label": "URL",
"start_offset": 11,
"end_offset": 114
}
] | [] | [] |
4,462 | We remediated the compromises for these users and implemented controls to protect all Android users. | [
{
"id": 50246,
"label": "SOFTWARE",
"start_offset": 86,
"end_offset": 93
}
] | [] | [] |
9,650 | Figure 6. | [] | [] | [] |
1,874 | The below example shows that the blocking works (output from the "sc start" command): | [] | [] | [] |
2,140 | With this addition protection available, our customers can and should include that as part of their decisions around security and deployment of the security updates and their risk assessment of the vulnerability and threat environment. | [] | [] | [] |
12,680 | As announced today, Google has taken action to disrupt the operations of Glupteba, a multi-component botnet targeting Windows computers. | [
{
"id": 39345,
"label": "location",
"start_offset": 37,
"end_offset": 43
},
{
"id": 39346,
"label": "malware",
"start_offset": 73,
"end_offset": 81
}
] | [] | [] |
1,899 | Upon writing this entry, we’ve coordinated with Google to ensure that the malicious applications these C&C sites advertise are no longer available for download on the Google Play Store. | [
{
"id": 45172,
"label": "identity",
"start_offset": 48,
"end_offset": 54
},
{
"id": 45173,
"label": "SOFTWARE",
"start_offset": 167,
"end_offset": 184
}
] | [] | [] |
2,347 | We updated our operating system with the latest patch at the time (2021-004) and tried the exploit again. | [
{
"id": 47401,
"label": "TIME",
"start_offset": 67,
"end_offset": 75
}
] | [] | [] |
13,080 | What are your thoughts on the ransomware attacks on retailers as we approach the busiest times of the year for retailers, including Black Friday, Cyber Monday and the holiday season? | [] | [] | [] |
6,483 | LIGOLO execution example | [] | [] | [] |
2,421 | This means that web users can get a class object remotely by simply submitting a URL as shown in Figure 4. | [] | [] | [] |
4,044 | Fortunately, we were still able to collect the decryption key in some cases and we decrypted the payload successfully. | [] | [] | [] |
6,765 | In 2018, CERT-UA published an advisory against the malware Pterodo, which the group allegedly used. | [] | [] | [] |
9,911 | The APT33 actors then issue commands to the bots and collect data from the bots using these VPN connections. | [
{
"id": 30245,
"label": "threat-actor",
"start_offset": 4,
"end_offset": 9
},
{
"id": 30246,
"label": "location",
"start_offset": 22,
"end_offset": 27
},
{
"id": 30247,
"label": "location",
"start_offset": 49,
"end_offset": 52
}
] | [] | [] |
10,621 | Although much of Sandworm’s activity targeting Ukraine and their attacks against the 2018 Winter Olympics have been covered publicly, some campaigns have not been reported. | [
{
"id": 32401,
"label": "location",
"start_offset": 9,
"end_offset": 13
},
{
"id": 32402,
"label": "threat-actor",
"start_offset": 17,
"end_offset": 25
},
{
"id": 32404,
"label": "location",
"start_offset": 55,
"end_offset": 58
}
] | [] | [] |
5,060 | Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns. | [
{
"id": 51165,
"label": "location",
"start_offset": 72,
"end_offset": 82
},
{
"id": 51166,
"label": "campaign",
"start_offset": 145,
"end_offset": 174
},
{
"id": 15621,
"label": "threat-actor",
"start_offset": 18,
"end_offset": 27
},
{
"id": 15623,
"label": "threat-actor",
"start_offset": 57,
"end_offset": 68
}
] | [
{
"id": 1064,
"from_id": 15623,
"to_id": 51165,
"type": "located-at"
},
{
"id": 1065,
"from_id": 15623,
"to_id": 51166,
"type": "uses"
}
] | [] |
11,485 | The app is distributed under the guise of performing Denial of Service (DoS) attacks against a set of Russian websites. | [] | [] | [] |
9,990 | View active directory objects dsquery.exe DsQuery | [
{
"id": 30504,
"label": "location",
"start_offset": 0,
"end_offset": 4
},
{
"id": 30505,
"label": "malware",
"start_offset": 30,
"end_offset": 41
},
{
"id": 30506,
"label": "malware",
"start_offset": 42,
"end_offset": 49
}
] | [] | [] |
4,730 | Among other targets, this spyware was used to compromise journalists and opposition politicians. | [] | [] | [] |
2,125 | The following two conditions must both be met for a system to be vulnerable to attack: If your Struts application does not meet both of these conditions, your application may still be vulnerable but not (currently) exploitable via CVE-2018-11776. | [
{
"id": 47262,
"label": "vulnerability",
"start_offset": 232,
"end_offset": 246
},
{
"id": 47263,
"label": "SOFTWARE",
"start_offset": 96,
"end_offset": 102
}
] | [] | [] |
8,258 | The obfuscation used was not particularly sophisticated. | [] | [] | [] |
183 | This post is also available in: 日本語 (Japanese) | [] | [] | [] |
1,857 | Figure 24. Running more system network configuration discovery scans | [
{
"id": 5442,
"label": "attack-pattern",
"start_offset": 29,
"end_offset": 67
}
] | [] | [] |
13,617 | This oplib.dll library is then sideloaded. | [
{
"id": 51707,
"label": "FILEPATH",
"start_offset": 5,
"end_offset": 14
}
] | [] | [] |
6,519 | MITRE ATT&CK Techniques Mapping Tactic Technique Resource Development Acquire Infrastructure: Web Services – T1583.006 Initial Access Phishing: Spearphishing Attachment – T1566.001 Phishing: Spearphishing Link – T1566.002 Execution Command and Scripting Interpreter: PowerShell – T1059.001 | [
{
"id": 20197,
"label": "attack-pattern",
"start_offset": 142,
"end_offset": 150
},
{
"id": 20198,
"label": "attack-pattern",
"start_offset": 152,
"end_offset": 176
},
{
"id": 20199,
"label": "attack-pattern",
"start_offset": 189,
"end_offset": 197
},
{
"id": 20200,
"label": "attack-pattern",
"start_offset": 199,
"end_offset": 217
},
{
"id": 20201,
"label": "location",
"start_offset": 250,
"end_offset": 253
},
{
"id": 20202,
"label": "attack-pattern",
"start_offset": 254,
"end_offset": 263
},
{
"id": 20203,
"label": "attack-pattern",
"start_offset": 277,
"end_offset": 287
}
] | [] | [] |
2,317 | It was interesting to see the use of Capstone.js, a port of the Capstone disassembly framework, in an exploit chain as Capstone is typically used for binary analysis. | [
{
"id": 47388,
"label": "SOFTWARE",
"start_offset": 37,
"end_offset": 48
},
{
"id": 47391,
"label": "SOFTWARE",
"start_offset": 119,
"end_offset": 127
},
{
"id": 47390,
"label": "SOFTWARE",
"start_offset": 64,
"end_offset": 94
}
] | [] | [] |
3,494 | b64_data = str[len("magnet:?xt=urn:bhih:"): tail] b64_decode = base64.b64decode(b64_data) key = ord(b64_decode[2]) data = b64_decode[4:] output_file = open("C2_info", "wb") for single_byte in data: output_file.write(chr(ord(single_byte) ^ key)) output_file.close() | [] | [] | [] |
4,652 | A new form is displayed if the information is not provided via command prompt. | [] | [] | [] |