Analysis
-
max time kernel
121s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
19-10-2023 21:06
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230915-en
General
-
Target
tmp.exe
-
Size
4.0MB
-
MD5
7ed069479280add451568981ee74e4fb
-
SHA1
c41d0182dff37b0127cec82478ac0089b4648d9b
-
SHA256
e7268d8c171e77fc209d921f92957eafebfe49d96a697104ce4698ed5a53e213
-
SHA512
cd364f3e8d9048d083567b65747a2a82c9ebffe75fac3bb348bca3a39c167970d1692e26ab5cc59a955655b0994f20092407639871852663cd90cb7d03553d84
-
SSDEEP
49152:DePIG3Ur7H2s6PTRhiQzF2ekzNztt0CBVzTt+N/5Njc0hhnVTJfbyNvRAn1Iixus:+ArzWC7Ws0gwWy
Malware Config
Extracted
amadey
3.89
http://193.42.32.29/9bDc8sQ/index.php
-
install_dir
1ff8bec27e
-
install_file
nhdues.exe
-
strings_key
2efe1b48925e9abf268903d42284c46b
Extracted
smokeloader
pub1
Extracted
vidar
6.1
55d1d90f582be35927dbf245a6a59f6e
https://steamcommunity.com/profiles/76561199563297648
https://t.me/twowheelfun
-
profile_id_v2
55d1d90f582be35927dbf245a6a59f6e
-
user_agent
Mozilla/5.0 (iPad; CPU OS 17_0_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.5 Mobile/15E148 Safari/605.1.15
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
DcRat 18 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\SystemCertificates\My InstallUtil.exe 2652 schtasks.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EtRLAQas41PrrBGTxpNWmIMf.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uQngBrysKH3d1kCDzq5fd5L1.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eJ8F4VzimN5x47nstA0dfs7O.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ra0hSjvTKx82yeNUg3GNehx7.bat InstallUtil.exe 328 schtasks.exe 1284 schtasks.exe 2044 schtasks.exe 1880 schtasks.exe 1376 schtasks.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xAvY5DTR35i8gV42OWPsHOXh.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RjzAzCO2OG383SzU2kQ87H1o.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\23YijiWwUmJAF8E3IaF2oPNN.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\p4ao1qZwLusI5B7ZUL0pFIfm.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\06D1Iq90Mmsp4Us6RwZDIVC6.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rw1KuZqBGRgtlvcqruezqD2z.bat InstallUtil.exe 1084 schtasks.exe -
Glupteba payload 19 IoCs
resource yara_rule behavioral1/memory/2844-236-0x0000000002E30000-0x000000000371B000-memory.dmp family_glupteba behavioral1/memory/3056-253-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3056-276-0x00000000029F0000-0x00000000032DB000-memory.dmp family_glupteba behavioral1/memory/2844-274-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2844-391-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3056-396-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3056-427-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2844-430-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2844-450-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3056-457-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2844-464-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1916-479-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/672-482-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1916-530-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/672-539-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1224-543-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/672-557-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1224-558-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1224-577-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
description pid Process procid_target PID 2760 created 1260 2760 JpWVil0nzxTzhe9NMKCKAbfP.exe 10 PID 2760 created 1260 2760 JpWVil0nzxTzhe9NMKCKAbfP.exe 10 PID 2760 created 1260 2760 JpWVil0nzxTzhe9NMKCKAbfP.exe 10 PID 2760 created 1260 2760 JpWVil0nzxTzhe9NMKCKAbfP.exe 10 PID 2760 created 1260 2760 JpWVil0nzxTzhe9NMKCKAbfP.exe 10 PID 2760 created 1260 2760 JpWVil0nzxTzhe9NMKCKAbfP.exe 10 PID 1552 created 1260 1552 updater.exe 10 PID 1552 created 1260 1552 updater.exe 10 PID 1552 created 1260 1552 updater.exe 10 PID 1552 created 1260 1552 updater.exe 10 PID 1552 created 1260 1552 updater.exe 10 PID 1552 created 1260 1552 updater.exe 10 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\XwaylN3u7O1eMGnvMRjrDLiU.exe = "0" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\HUdcNZkpURZFPjkIzwHhNRH0.exe = "0" HUdcNZkpURZFPjkIzwHhNRH0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" XwaylN3u7O1eMGnvMRjrDLiU.exe -
Modifies boot configuration data using bcdedit 14 IoCs
pid Process 560 bcdedit.exe 1904 bcdedit.exe 3052 bcdedit.exe 1620 bcdedit.exe 2796 bcdedit.exe 1828 bcdedit.exe 2908 bcdedit.exe 1340 bcdedit.exe 1496 bcdedit.exe 1064 bcdedit.exe 436 bcdedit.exe 1888 bcdedit.exe 1648 bcdedit.exe 3008 bcdedit.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts JpWVil0nzxTzhe9NMKCKAbfP.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 2288 netsh.exe 2908 netsh.exe -
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Drops startup file 10 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uQngBrysKH3d1kCDzq5fd5L1.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eJ8F4VzimN5x47nstA0dfs7O.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ra0hSjvTKx82yeNUg3GNehx7.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rw1KuZqBGRgtlvcqruezqD2z.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\23YijiWwUmJAF8E3IaF2oPNN.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\06D1Iq90Mmsp4Us6RwZDIVC6.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EtRLAQas41PrrBGTxpNWmIMf.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xAvY5DTR35i8gV42OWPsHOXh.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\p4ao1qZwLusI5B7ZUL0pFIfm.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RjzAzCO2OG383SzU2kQ87H1o.bat InstallUtil.exe -
Executes dropped EXE 22 IoCs
pid Process 1100 cIJVoLMiHC0M599dRSmJorK4.exe 304 XFRNIQKLNGIqwO3RzFScYe0K.exe 2844 HUdcNZkpURZFPjkIzwHhNRH0.exe 1324 bX31kBREhQlwENsXjZhSSpCR.exe 3056 XwaylN3u7O1eMGnvMRjrDLiU.exe 296 NLfulURw46ZAUIe9MkCcK3Br.exe 1304 bX31kBREhQlwENsXjZhSSpCR.exe 2124 ritGhqxy7gfTIbmLNS44b9n1.exe 3016 WJHOJDwDGWeHt1MUVUwXQVD0.exe 2208 nhdues.exe 2760 JpWVil0nzxTzhe9NMKCKAbfP.exe 1916 XwaylN3u7O1eMGnvMRjrDLiU.exe 672 HUdcNZkpURZFPjkIzwHhNRH0.exe 864 nhdues.exe 1360 HakVdTwI4lr8VhyzUFiHbdvS.exe 1224 csrss.exe 1804 Install.exe 1552 updater.exe 548 Install.exe 2780 patch.exe 2556 injector.exe 2868 nhdues.exe -
Loads dropped DLL 43 IoCs
pid Process 3060 InstallUtil.exe 3060 InstallUtil.exe 3060 InstallUtil.exe 3060 InstallUtil.exe 3060 InstallUtil.exe 3060 InstallUtil.exe 3060 InstallUtil.exe 3060 InstallUtil.exe 3060 InstallUtil.exe 3060 InstallUtil.exe 3060 InstallUtil.exe 3060 InstallUtil.exe 304 XFRNIQKLNGIqwO3RzFScYe0K.exe 3016 WJHOJDwDGWeHt1MUVUwXQVD0.exe 3060 InstallUtil.exe 3016 WJHOJDwDGWeHt1MUVUwXQVD0.exe 2124 ritGhqxy7gfTIbmLNS44b9n1.exe 2124 ritGhqxy7gfTIbmLNS44b9n1.exe 3060 InstallUtil.exe 1360 HakVdTwI4lr8VhyzUFiHbdvS.exe 1360 HakVdTwI4lr8VhyzUFiHbdvS.exe 1360 HakVdTwI4lr8VhyzUFiHbdvS.exe 1360 HakVdTwI4lr8VhyzUFiHbdvS.exe 1916 XwaylN3u7O1eMGnvMRjrDLiU.exe 1916 XwaylN3u7O1eMGnvMRjrDLiU.exe 1804 Install.exe 1804 Install.exe 1804 Install.exe 464 Process not Found 1804 Install.exe 548 Install.exe 548 Install.exe 548 Install.exe 852 Process not Found 2780 patch.exe 2780 patch.exe 1224 csrss.exe 2780 patch.exe 2780 patch.exe 2780 patch.exe 2780 patch.exe 2780 patch.exe 2780 patch.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000600000001644f-270.dat upx behavioral1/files/0x000600000001644f-264.dat upx behavioral1/memory/3016-285-0x0000000000A10000-0x0000000000F5D000-memory.dmp upx behavioral1/files/0x000600000001644f-257.dat upx behavioral1/memory/3016-424-0x0000000000A10000-0x0000000000F5D000-memory.dmp upx behavioral1/files/0x000600000001644f-462.dat upx behavioral1/memory/3016-477-0x0000000000A10000-0x0000000000F5D000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\XwaylN3u7O1eMGnvMRjrDLiU.exe = "0" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\HUdcNZkpURZFPjkIzwHhNRH0.exe = "0" HUdcNZkpURZFPjkIzwHhNRH0.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cIJVoLMiHC0M599dRSmJorK4.exe Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" HUdcNZkpURZFPjkIzwHhNRH0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3036 set thread context of 3060 3036 tmp.exe 27 PID 1324 set thread context of 1304 1324 bX31kBREhQlwENsXjZhSSpCR.exe 33 PID 1552 set thread context of 268 1552 updater.exe 138 PID 1552 set thread context of 1492 1552 updater.exe 139 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN XwaylN3u7O1eMGnvMRjrDLiU.exe File opened (read-only) \??\VBoxMiniRdrDN HUdcNZkpURZFPjkIzwHhNRH0.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe JpWVil0nzxTzhe9NMKCKAbfP.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\rss HUdcNZkpURZFPjkIzwHhNRH0.exe File created C:\Windows\rss\csrss.exe HUdcNZkpURZFPjkIzwHhNRH0.exe File created C:\Windows\Logs\CBS\CbsPersist_20231019210738.cab makecab.exe File opened for modification C:\Windows\rss XwaylN3u7O1eMGnvMRjrDLiU.exe File created C:\Windows\rss\csrss.exe XwaylN3u7O1eMGnvMRjrDLiU.exe -
Launches sc.exe 11 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 320 sc.exe 2372 sc.exe 2116 sc.exe 2136 sc.exe 1056 sc.exe 2612 sc.exe 2036 sc.exe 1316 sc.exe 2500 sc.exe 2356 sc.exe 2868 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bX31kBREhQlwENsXjZhSSpCR.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bX31kBREhQlwENsXjZhSSpCR.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bX31kBREhQlwENsXjZhSSpCR.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ritGhqxy7gfTIbmLNS44b9n1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ritGhqxy7gfTIbmLNS44b9n1.exe -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 328 schtasks.exe 1376 schtasks.exe 1284 schtasks.exe 1084 schtasks.exe 2044 schtasks.exe 2652 schtasks.exe 1880 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace\Session netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-422 = "Russian Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-4 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-581 = "North Asia East Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-101 = "Provides RD Gateway enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-421 = "Russian Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-101 = "Provides RD Gateway enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-100 = "RD Gateway Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-551 = "North Asia Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-22 = "Cape Verde Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-552 = "North Asia Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" XwaylN3u7O1eMGnvMRjrDLiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" XwaylN3u7O1eMGnvMRjrDLiU.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 ritGhqxy7gfTIbmLNS44b9n1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 ritGhqxy7gfTIbmLNS44b9n1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a42000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 19000000010000001000000014c3bd3549ee225aece13734ad8ca0b81400000001000000140000004e2254201895e6e36ee60ffafab912ed06178f39030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a40f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a3040000000100000010000000e4a68ac854ac5242460afd72481b2a442000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a ritGhqxy7gfTIbmLNS44b9n1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1304 bX31kBREhQlwENsXjZhSSpCR.exe 1304 bX31kBREhQlwENsXjZhSSpCR.exe 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE 1260 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1304 bX31kBREhQlwENsXjZhSSpCR.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 3060 InstallUtil.exe Token: SeDebugPrivilege 296 NLfulURw46ZAUIe9MkCcK3Br.exe Token: SeShutdownPrivilege 1260 Explorer.EXE Token: SeShutdownPrivilege 1260 Explorer.EXE Token: SeShutdownPrivilege 1260 Explorer.EXE Token: SeDebugPrivilege 3056 XwaylN3u7O1eMGnvMRjrDLiU.exe Token: SeImpersonatePrivilege 3056 XwaylN3u7O1eMGnvMRjrDLiU.exe Token: SeDebugPrivilege 2844 HUdcNZkpURZFPjkIzwHhNRH0.exe Token: SeImpersonatePrivilege 2844 HUdcNZkpURZFPjkIzwHhNRH0.exe Token: SeDebugPrivilege 2148 powershell.exe Token: SeShutdownPrivilege 1260 Explorer.EXE Token: SeDebugPrivilege 2844 HUdcNZkpURZFPjkIzwHhNRH0.exe Token: SeImpersonatePrivilege 2844 HUdcNZkpURZFPjkIzwHhNRH0.exe Token: SeShutdownPrivilege 1260 Explorer.EXE Token: SeShutdownPrivilege 1260 Explorer.EXE Token: SeShutdownPrivilege 1260 Explorer.EXE Token: SeShutdownPrivilege 1260 Explorer.EXE Token: SeShutdownPrivilege 2896 powercfg.exe Token: SeShutdownPrivilege 2280 powercfg.exe Token: SeShutdownPrivilege 2924 powercfg.exe Token: SeShutdownPrivilege 1828 powercfg.exe Token: SeShutdownPrivilege 1260 Explorer.EXE Token: SeShutdownPrivilege 1260 Explorer.EXE Token: SeShutdownPrivilege 1260 Explorer.EXE Token: SeShutdownPrivilege 1260 Explorer.EXE Token: SeShutdownPrivilege 1260 Explorer.EXE Token: SeShutdownPrivilege 1260 Explorer.EXE Token: SeSystemEnvironmentPrivilege 1224 csrss.exe Token: SeDebugPrivilege 2560 powershell.exe Token: SeShutdownPrivilege 1920 powercfg.exe Token: SeShutdownPrivilege 2464 powercfg.exe Token: SeShutdownPrivilege 940 powercfg.exe Token: SeShutdownPrivilege 596 powercfg.exe Token: SeDebugPrivilege 1552 updater.exe Token: SeDebugPrivilege 2812 powershell.EXE Token: SeLockMemoryPrivilege 1492 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3036 wrote to memory of 3060 3036 tmp.exe 27 PID 3036 wrote to memory of 3060 3036 tmp.exe 27 PID 3036 wrote to memory of 3060 3036 tmp.exe 27 PID 3036 wrote to memory of 3060 3036 tmp.exe 27 PID 3036 wrote to memory of 3060 3036 tmp.exe 27 PID 3036 wrote to memory of 3060 3036 tmp.exe 27 PID 3036 wrote to memory of 3060 3036 tmp.exe 27 PID 3036 wrote to memory of 3060 3036 tmp.exe 27 PID 3036 wrote to memory of 3060 3036 tmp.exe 27 PID 3036 wrote to memory of 3060 3036 tmp.exe 27 PID 3036 wrote to memory of 3060 3036 tmp.exe 27 PID 3036 wrote to memory of 3060 3036 tmp.exe 27 PID 3060 wrote to memory of 1100 3060 InstallUtil.exe 28 PID 3060 wrote to memory of 1100 3060 InstallUtil.exe 28 PID 3060 wrote to memory of 1100 3060 InstallUtil.exe 28 PID 3060 wrote to memory of 1100 3060 InstallUtil.exe 28 PID 3060 wrote to memory of 304 3060 InstallUtil.exe 29 PID 3060 wrote to memory of 304 3060 InstallUtil.exe 29 PID 3060 wrote to memory of 304 3060 InstallUtil.exe 29 PID 3060 wrote to memory of 304 3060 InstallUtil.exe 29 PID 3060 wrote to memory of 2844 3060 InstallUtil.exe 31 PID 3060 wrote to memory of 2844 3060 InstallUtil.exe 31 PID 3060 wrote to memory of 2844 3060 InstallUtil.exe 31 PID 3060 wrote to memory of 2844 3060 InstallUtil.exe 31 PID 3060 wrote to memory of 1324 3060 InstallUtil.exe 30 PID 3060 wrote to memory of 1324 3060 InstallUtil.exe 30 PID 3060 wrote to memory of 1324 3060 InstallUtil.exe 30 PID 3060 wrote to memory of 1324 3060 InstallUtil.exe 30 PID 1100 wrote to memory of 1944 1100 cIJVoLMiHC0M599dRSmJorK4.exe 32 PID 1100 wrote to memory of 1944 1100 cIJVoLMiHC0M599dRSmJorK4.exe 32 PID 1100 wrote to memory of 1944 1100 cIJVoLMiHC0M599dRSmJorK4.exe 32 PID 3060 wrote to memory of 3056 3060 InstallUtil.exe 36 PID 3060 wrote to memory of 3056 3060 InstallUtil.exe 36 PID 3060 wrote to memory of 3056 3060 InstallUtil.exe 36 PID 3060 wrote to memory of 3056 3060 InstallUtil.exe 36 PID 3060 wrote to memory of 296 3060 InstallUtil.exe 34 PID 3060 wrote to memory of 296 3060 InstallUtil.exe 34 PID 3060 wrote to memory of 296 3060 InstallUtil.exe 34 PID 3060 wrote to memory of 296 3060 InstallUtil.exe 34 PID 1324 wrote to memory of 1304 1324 bX31kBREhQlwENsXjZhSSpCR.exe 33 PID 1324 wrote to memory of 1304 1324 bX31kBREhQlwENsXjZhSSpCR.exe 33 PID 1324 wrote to memory of 1304 1324 bX31kBREhQlwENsXjZhSSpCR.exe 33 PID 1324 wrote to memory of 1304 1324 bX31kBREhQlwENsXjZhSSpCR.exe 33 PID 1324 wrote to memory of 1304 1324 bX31kBREhQlwENsXjZhSSpCR.exe 33 PID 1324 wrote to memory of 1304 1324 bX31kBREhQlwENsXjZhSSpCR.exe 33 PID 1324 wrote to memory of 1304 1324 bX31kBREhQlwENsXjZhSSpCR.exe 33 PID 3060 wrote to memory of 2124 3060 InstallUtil.exe 49 PID 3060 wrote to memory of 2124 3060 InstallUtil.exe 49 PID 3060 wrote to memory of 2124 3060 InstallUtil.exe 49 PID 3060 wrote to memory of 2124 3060 InstallUtil.exe 49 PID 3060 wrote to memory of 3016 3060 InstallUtil.exe 37 PID 3060 wrote to memory of 3016 3060 InstallUtil.exe 37 PID 3060 wrote to memory of 3016 3060 InstallUtil.exe 37 PID 3060 wrote to memory of 3016 3060 InstallUtil.exe 37 PID 3060 wrote to memory of 3016 3060 InstallUtil.exe 37 PID 3060 wrote to memory of 3016 3060 InstallUtil.exe 37 PID 3060 wrote to memory of 3016 3060 InstallUtil.exe 37 PID 304 wrote to memory of 2208 304 XFRNIQKLNGIqwO3RzFScYe0K.exe 47 PID 304 wrote to memory of 2208 304 XFRNIQKLNGIqwO3RzFScYe0K.exe 47 PID 304 wrote to memory of 2208 304 XFRNIQKLNGIqwO3RzFScYe0K.exe 47 PID 304 wrote to memory of 2208 304 XFRNIQKLNGIqwO3RzFScYe0K.exe 47 PID 2208 wrote to memory of 2652 2208 nhdues.exe 46 PID 2208 wrote to memory of 2652 2208 nhdues.exe 46 PID 2208 wrote to memory of 2652 2208 nhdues.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- DcRat
- Drops startup file
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\Pictures\cIJVoLMiHC0M599dRSmJorK4.exe"C:\Users\Admin\Pictures\cIJVoLMiHC0M599dRSmJorK4.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\cmd.execmd /c lophime.bat5⤵PID:1944
-
-
-
C:\Users\Admin\Pictures\XFRNIQKLNGIqwO3RzFScYe0K.exe"C:\Users\Admin\Pictures\XFRNIQKLNGIqwO3RzFScYe0K.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe"C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208
-
-
-
C:\Users\Admin\Pictures\bX31kBREhQlwENsXjZhSSpCR.exe"C:\Users\Admin\Pictures\bX31kBREhQlwENsXjZhSSpCR.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\Pictures\bX31kBREhQlwENsXjZhSSpCR.exe"C:\Users\Admin\Pictures\bX31kBREhQlwENsXjZhSSpCR.exe"5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1304
-
-
-
C:\Users\Admin\Pictures\HUdcNZkpURZFPjkIzwHhNRH0.exe"C:\Users\Admin\Pictures\HUdcNZkpURZFPjkIzwHhNRH0.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2844 -
C:\Users\Admin\Pictures\HUdcNZkpURZFPjkIzwHhNRH0.exe"C:\Users\Admin\Pictures\HUdcNZkpURZFPjkIzwHhNRH0.exe"5⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
PID:672 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:1644
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2908
-
-
-
-
-
C:\Users\Admin\Pictures\NLfulURw46ZAUIe9MkCcK3Br.exe"C:\Users\Admin\Pictures\NLfulURw46ZAUIe9MkCcK3Br.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:296
-
-
C:\Users\Admin\Pictures\XwaylN3u7O1eMGnvMRjrDLiU.exe"C:\Users\Admin\Pictures\XwaylN3u7O1eMGnvMRjrDLiU.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3056 -
C:\Users\Admin\Pictures\XwaylN3u7O1eMGnvMRjrDLiU.exe"C:\Users\Admin\Pictures\XwaylN3u7O1eMGnvMRjrDLiU.exe"5⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1916 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:1340
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2288
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1224 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- DcRat
- Creates scheduled task(s)
PID:328
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:2780 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER8⤵
- Modifies boot configuration data using bcdedit
PID:560
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:8⤵
- Modifies boot configuration data using bcdedit
PID:1904
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:8⤵
- Modifies boot configuration data using bcdedit
PID:3052
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows8⤵
- Modifies boot configuration data using bcdedit
PID:1620
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe8⤵
- Modifies boot configuration data using bcdedit
PID:2796
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe8⤵
- Modifies boot configuration data using bcdedit
PID:1828
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 08⤵
- Modifies boot configuration data using bcdedit
PID:2908
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn8⤵
- Modifies boot configuration data using bcdedit
PID:1340
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 18⤵
- Modifies boot configuration data using bcdedit
PID:1496
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}8⤵
- Modifies boot configuration data using bcdedit
PID:1064
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast8⤵
- Modifies boot configuration data using bcdedit
PID:436
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 08⤵
- Modifies boot configuration data using bcdedit
PID:1888
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}8⤵
- Modifies boot configuration data using bcdedit
PID:1648
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll7⤵
- Executes dropped EXE
PID:2556
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v7⤵
- Modifies boot configuration data using bcdedit
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe7⤵PID:936
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- DcRat
- Creates scheduled task(s)
PID:2044
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"7⤵PID:1692
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵PID:828
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)9⤵
- Launches sc.exe
PID:2868
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\WJHOJDwDGWeHt1MUVUwXQVD0.exe"C:\Users\Admin\Pictures\WJHOJDwDGWeHt1MUVUwXQVD0.exe" --silent --allusers=04⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3016
-
-
C:\Users\Admin\Pictures\JpWVil0nzxTzhe9NMKCKAbfP.exe"C:\Users\Admin\Pictures\JpWVil0nzxTzhe9NMKCKAbfP.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
PID:2760
-
-
C:\Users\Admin\Pictures\ritGhqxy7gfTIbmLNS44b9n1.exe"C:\Users\Admin\Pictures\ritGhqxy7gfTIbmLNS44b9n1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
PID:2124
-
-
C:\Users\Admin\Pictures\HakVdTwI4lr8VhyzUFiHbdvS.exe"C:\Users\Admin\Pictures\HakVdTwI4lr8VhyzUFiHbdvS.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\7zS75DB.tmp\Install.exe.\Install.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\7zS7A4E.tmp\Install.exe.\Install.exe /dcCcdidRiisJ "385118" /S6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
PID:548 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"7⤵PID:1668
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&8⤵PID:1980
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:329⤵PID:1492
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:649⤵PID:2744
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"7⤵PID:1696
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&8⤵PID:536
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gcgFTGBjN" /SC once /ST 12:48:14 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="7⤵
- DcRat
- Creates scheduled task(s)
PID:1376
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gcgFTGBjN"7⤵PID:1976
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gcgFTGBjN"7⤵PID:2228
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bwpFiyeZPJPVdaMxTt" /SC once /ST 21:10:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\qfiwemQmHAngVYpEP\nfIxQMeJQCLipql\ZtUBHCU.exe\" 3Y /jcsite_iducb 385118 /S" /V1 /F7⤵
- DcRat
- Creates scheduled task(s)
PID:1084
-
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:2568
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2372
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1316
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2116
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2136
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1056
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"2⤵PID:1048
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:1156
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\iacrcjwhmdyc.xml"2⤵
- DcRat
- Creates scheduled task(s)
PID:1880
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:2484
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:2720
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2500
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2356
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2612
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2036
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:320
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:2872
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:596
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\iacrcjwhmdyc.xml"2⤵
- DcRat
- Creates scheduled task(s)
PID:1284
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:268
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nhdues.exe" /P "Admin:N"&&CACLS "nhdues.exe" /P "Admin:R" /E&&echo Y|CACLS "..\1ff8bec27e" /P "Admin:N"&&CACLS "..\1ff8bec27e" /P "Admin:R" /E&&Exit1⤵PID:2756
-
C:\Windows\SysWOW64\cacls.exeCACLS "nhdues.exe" /P "Admin:N"2⤵PID:2356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:320
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nhdues.exe" /P "Admin:R" /E2⤵PID:2020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\1ff8bec27e" /P "Admin:N"2⤵PID:836
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\1ff8bec27e" /P "Admin:R" /E2⤵PID:564
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nhdues.exe /TR "C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe" /F1⤵
- DcRat
- Creates scheduled task(s)
PID:2652
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231019210738.log C:\Windows\Logs\CBS\CbsPersist_20231019210738.cab1⤵
- Drops file in Windows directory
PID:2072
-
C:\Windows\system32\taskeng.exetaskeng.exe {D256DB32-264A-41B7-922A-EA991935AB30} S-1-5-21-686452656-3203474025-4140627569-1000:UUVOHKNL\Admin:Interactive:[1]1⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exeC:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe2⤵
- Executes dropped EXE
PID:864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2812 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2384
-
-
-
C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exeC:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe2⤵
- Executes dropped EXE
PID:2868
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:641⤵PID:1988
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:321⤵PID:2692
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:1708
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
4Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de864e9083e8c936cbb75f30491b70b2
SHA1c10781a75b7c98286f31a1f497401d656f811896
SHA256b88a9fa77a857e2c8892a72231cfa5179bfc95f992cbb33c403e04e07275afa5
SHA5125dbf91ae8dbf847c7831113220a2eb75861073f7c73e3c17627b4f9923440a4efc5cd6cb1095b2aba9265a166194371714a255c8f5fbe6a13bfc326a6e19a9a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef8e935b7befa826719b1c315454abab
SHA16d3cc69e434b08214e7f623c00561fdb1ae28c85
SHA256c4b2725b8ca7e8f374163e8a2e05a126b0370b308ebbf94c51cf0cfe3d375489
SHA5128897f787d1cc23fc6da7f66356a88c2e990bee4d187ca9bc3ef723db81be147c4c386f1ca26b37ffdc4257162222816fbe34d47900bf1823af1d1af912aa5006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d3cd23a548ac7d5e5a2275b61f997df
SHA1a0c4bd43c44f93abea8ac8d8f4176c4dca7196f9
SHA25633b3b2e4a1c0fddd071090cb83666b8bb66badf4dbee756d8967ab60da3f6228
SHA5128317b15fea99632af2e26e4f453944b5d252339efa2350bc010ab443d8c675e641cee692afbd0d3e30f8f414950dd2265ac57b94beed4ec70f1f24cf6370017f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1d3136aca62813aeebb94aeda808bdf
SHA119165b43b41f953014e86e0c9156da80867870c4
SHA256767c7d8543de6083ca93b5f94f9bb2f685587bbdcd4acc028272cd20306f5eea
SHA512dd0a3f34cd85b279abdea7e3ee5b035cc001df06262d06a6091d90704b4b397c54256227e450bccb303aac5d1517b4b6b3e84239def38c2b7398735b77a1bb45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db48063d464ff82813b346a076c2e4e4
SHA11c7fd90457797ff1480d38f17671c7414a6fcfdc
SHA256afb387216e682d2283933ac27ee4c4a4ddf2353e940f1324ce9ff3ac1c5e553e
SHA512a4adc6273df7b4483fbf2b93dfd6fe9d45e37085e26a0d1d7701e580f299cc33153c661e9542a68377b5ff7f09aa6e61919ee0d8c3d78627d2b7898ccc2ba530
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
6.1MB
MD560ddd726bba5ccd38361277c0b86f26c
SHA133bbc251be61a7fbf084f1e8540649f68dc18d52
SHA256cf158febdfab345e47423394b53dcb640c03473bae3d84bbaa52e91ed4b39461
SHA512b21e4a453efe265510585e85ab2fe1e02a5a6b1cce734e4a05f416d088edc8a6d59a7bc8b1d20c56faf48fdd2feab9431367529cf2aeeca5ad70b2e3f072a5f3
-
Filesize
6.1MB
MD560ddd726bba5ccd38361277c0b86f26c
SHA133bbc251be61a7fbf084f1e8540649f68dc18d52
SHA256cf158febdfab345e47423394b53dcb640c03473bae3d84bbaa52e91ed4b39461
SHA512b21e4a453efe265510585e85ab2fe1e02a5a6b1cce734e4a05f416d088edc8a6d59a7bc8b1d20c56faf48fdd2feab9431367529cf2aeeca5ad70b2e3f072a5f3
-
Filesize
6.9MB
MD5cd3191644eeaab1d1cf9b4bea245f78c
SHA175f04b22e62b1366a4c5b2887242b63de1d83c9c
SHA256f626f7361d341ca2b7c67c2b20ca5ab516a6ce4104048c5a3ee3f2d83cc3039f
SHA51279ebd59d2f66bf3f4417760ff1c9021b3d0e3dcb65da390bf377c3316ce675add82b79bd90750e9b98f68bd5a5625c2b863fadbd0bf447c372b14a619e43d57a
-
Filesize
6.9MB
MD5cd3191644eeaab1d1cf9b4bea245f78c
SHA175f04b22e62b1366a4c5b2887242b63de1d83c9c
SHA256f626f7361d341ca2b7c67c2b20ca5ab516a6ce4104048c5a3ee3f2d83cc3039f
SHA51279ebd59d2f66bf3f4417760ff1c9021b3d0e3dcb65da390bf377c3316ce675add82b79bd90750e9b98f68bd5a5625c2b863fadbd0bf447c372b14a619e43d57a
-
Filesize
77KB
MD564a67045805443d4e6d9641fb07a7a68
SHA1197d3444f4deb836857d729e77d3b68e3abc18da
SHA2563511bc93ac70ff4fd60d0922c891ff6d8c01557aa130fb3bd6f851e818f63f3b
SHA5124921c7ba46ed443f1918bd4f63893a31f6b45fc41863c0d72a500995d58922917762db6d8724574417ec917f6eae33e9d0e14b337e0c02fdacb1c77fee9331cb
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
44B
MD5fc45457dedfbf780c80253e2672fe7b7
SHA19451d39981fb83055423f067cf83ab70fed7c5ff
SHA2561870c4b141f595a028b8900a27d438eb4ff8de91a9f9ee09fea5fae4fbefa16b
SHA512e9f338cadae170c5f433bd7a31f7388b729520d40b591bfb331385fcbc8f98684000ff0718abb01970b2ed6523a39d48682d186caf60fa86e5febdce72499133
-
C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
Filesize8.3MB
MD5fd2727132edd0b59fa33733daa11d9ef
SHA163e36198d90c4c2b9b09dd6786b82aba5f03d29a
SHA2563a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e
SHA5123e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e
-
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
Filesize395KB
MD55da3a881ef991e8010deed799f1a5aaf
SHA1fea1acea7ed96d7c9788783781e90a2ea48c1a53
SHA256f18fdb9e03546bfb98397bcb8378b505eaf4ac061749229a7ee92a1c3cf156e4
SHA51224fbcb5353a3d51ee01f1de1bbb965f9e40e0d00e52c42713d446f12edceeb8d08b086a8687a6188decaa8f256899e24a06c424d8d73adaad910149a9c45ef09
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
1KB
MD5546d67a48ff2bf7682cea9fac07b942e
SHA1a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90
SHA256eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a
SHA51210d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe
-
Filesize
5.3MB
MD51afff8d5352aecef2ecd47ffa02d7f7d
SHA18b115b84efdb3a1b87f750d35822b2609e665bef
SHA256c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1
SHA512e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb
-
Filesize
591KB
MD5e2f68dc7fbd6e0bf031ca3809a739346
SHA19c35494898e65c8a62887f28e04c0359ab6f63f5
SHA256b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4
SHA51226256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579
-
Filesize
6.9MB
MD5cd3191644eeaab1d1cf9b4bea245f78c
SHA175f04b22e62b1366a4c5b2887242b63de1d83c9c
SHA256f626f7361d341ca2b7c67c2b20ca5ab516a6ce4104048c5a3ee3f2d83cc3039f
SHA51279ebd59d2f66bf3f4417760ff1c9021b3d0e3dcb65da390bf377c3316ce675add82b79bd90750e9b98f68bd5a5625c2b863fadbd0bf447c372b14a619e43d57a
-
Filesize
4.1MB
MD53e3831350972800634a6435cb165ec66
SHA184e19e1e32ba66d7405d958de44c0be7724c448e
SHA256469a21679a564f73fa68930555c21738a2ec56b4746939b48ba18f3ccf5be9d3
SHA512857a82c3d9f38b79e0d97d838bfa3b90a633b5f8a1dcb7b83a91ca8e90787f8dff190eca59f7e1647c34f7aec8c8d0d99d933e9ee3fcb31199ec481e6ce83312
-
Filesize
4.1MB
MD53e3831350972800634a6435cb165ec66
SHA184e19e1e32ba66d7405d958de44c0be7724c448e
SHA256469a21679a564f73fa68930555c21738a2ec56b4746939b48ba18f3ccf5be9d3
SHA512857a82c3d9f38b79e0d97d838bfa3b90a633b5f8a1dcb7b83a91ca8e90787f8dff190eca59f7e1647c34f7aec8c8d0d99d933e9ee3fcb31199ec481e6ce83312
-
Filesize
4.1MB
MD53e3831350972800634a6435cb165ec66
SHA184e19e1e32ba66d7405d958de44c0be7724c448e
SHA256469a21679a564f73fa68930555c21738a2ec56b4746939b48ba18f3ccf5be9d3
SHA512857a82c3d9f38b79e0d97d838bfa3b90a633b5f8a1dcb7b83a91ca8e90787f8dff190eca59f7e1647c34f7aec8c8d0d99d933e9ee3fcb31199ec481e6ce83312
-
Filesize
4.1MB
MD53e3831350972800634a6435cb165ec66
SHA184e19e1e32ba66d7405d958de44c0be7724c448e
SHA256469a21679a564f73fa68930555c21738a2ec56b4746939b48ba18f3ccf5be9d3
SHA512857a82c3d9f38b79e0d97d838bfa3b90a633b5f8a1dcb7b83a91ca8e90787f8dff190eca59f7e1647c34f7aec8c8d0d99d933e9ee3fcb31199ec481e6ce83312
-
Filesize
7.1MB
MD53111f8d446efd3c0a0e2c91cbf303998
SHA1da86c8d200f799d6467e74e1ea65781078f50be7
SHA2567ad618232c089a82b096bd93151d6930853caa6cde160d24787e9d70bd87acad
SHA5120f4101325b359e5f85692ec5fa5bb771ca723a119fee6fde787336fc623c30bf104cc4cdedab6a1a8ff0eb9efc97f5f5245c677869117161e25e5f189a874170
-
Filesize
7.1MB
MD53111f8d446efd3c0a0e2c91cbf303998
SHA1da86c8d200f799d6467e74e1ea65781078f50be7
SHA2567ad618232c089a82b096bd93151d6930853caa6cde160d24787e9d70bd87acad
SHA5120f4101325b359e5f85692ec5fa5bb771ca723a119fee6fde787336fc623c30bf104cc4cdedab6a1a8ff0eb9efc97f5f5245c677869117161e25e5f189a874170
-
Filesize
7.1MB
MD53111f8d446efd3c0a0e2c91cbf303998
SHA1da86c8d200f799d6467e74e1ea65781078f50be7
SHA2567ad618232c089a82b096bd93151d6930853caa6cde160d24787e9d70bd87acad
SHA5120f4101325b359e5f85692ec5fa5bb771ca723a119fee6fde787336fc623c30bf104cc4cdedab6a1a8ff0eb9efc97f5f5245c677869117161e25e5f189a874170
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
2.8MB
MD5b4fa775be8497ab305e94e00a7cc659a
SHA13d72bd10f981c9c0347171aa228c727af4963f91
SHA256035fcd703f10bc15639c11d480d278deee653ff3011adcf3ff8c04267ac4b495
SHA5121d586e26ae6a13ca9968d5cd75476b588f31c2b113f53286281ca5cfc07058d84b93121cb1fae22239a67e7f64594f754f4aec54dfccb4be9b09871d81db5919
-
Filesize
2.8MB
MD5b4fa775be8497ab305e94e00a7cc659a
SHA13d72bd10f981c9c0347171aa228c727af4963f91
SHA256035fcd703f10bc15639c11d480d278deee653ff3011adcf3ff8c04267ac4b495
SHA5121d586e26ae6a13ca9968d5cd75476b588f31c2b113f53286281ca5cfc07058d84b93121cb1fae22239a67e7f64594f754f4aec54dfccb4be9b09871d81db5919
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
4.1MB
MD59979fec91f69c0163f9c1ae105a23c23
SHA169696d6eabd6715a4000cc3d4fcc96900a271d2a
SHA256871df19ef1af680602fa18b6f828d4e5514d704b172fd8e0e9ff9104500ad658
SHA5121cd8b1d0a8fdea2ac3efbde4fcb8f469aaec8aac8a2aa74da92a89315660c3f5dace46f3c62de0322e384c5b5de8f3c1fca54158473c40064e232381275a6029
-
Filesize
4.1MB
MD59979fec91f69c0163f9c1ae105a23c23
SHA169696d6eabd6715a4000cc3d4fcc96900a271d2a
SHA256871df19ef1af680602fa18b6f828d4e5514d704b172fd8e0e9ff9104500ad658
SHA5121cd8b1d0a8fdea2ac3efbde4fcb8f469aaec8aac8a2aa74da92a89315660c3f5dace46f3c62de0322e384c5b5de8f3c1fca54158473c40064e232381275a6029
-
Filesize
4.1MB
MD59979fec91f69c0163f9c1ae105a23c23
SHA169696d6eabd6715a4000cc3d4fcc96900a271d2a
SHA256871df19ef1af680602fa18b6f828d4e5514d704b172fd8e0e9ff9104500ad658
SHA5121cd8b1d0a8fdea2ac3efbde4fcb8f469aaec8aac8a2aa74da92a89315660c3f5dace46f3c62de0322e384c5b5de8f3c1fca54158473c40064e232381275a6029
-
Filesize
4.1MB
MD59979fec91f69c0163f9c1ae105a23c23
SHA169696d6eabd6715a4000cc3d4fcc96900a271d2a
SHA256871df19ef1af680602fa18b6f828d4e5514d704b172fd8e0e9ff9104500ad658
SHA5121cd8b1d0a8fdea2ac3efbde4fcb8f469aaec8aac8a2aa74da92a89315660c3f5dace46f3c62de0322e384c5b5de8f3c1fca54158473c40064e232381275a6029
-
Filesize
247KB
MD5bb4ffc473b7a765ba16ea6b6d0dbec0f
SHA1c0ffe7774fa104e5b2b29feccfc943bfdc57bc52
SHA256e1b8b3358f7cdee4c12f8f07c80d8f01e703584f46cde07740ef8d4351f49f89
SHA512679f3e16cb01f01c5c9e21a302617bb487b1f4389d69f32f3340d22248d419c4f49b38132a9e8cefc0235ebe1ed6973c3c2d1c761bc36ab8f59789bbc3d14c88
-
Filesize
247KB
MD5bb4ffc473b7a765ba16ea6b6d0dbec0f
SHA1c0ffe7774fa104e5b2b29feccfc943bfdc57bc52
SHA256e1b8b3358f7cdee4c12f8f07c80d8f01e703584f46cde07740ef8d4351f49f89
SHA512679f3e16cb01f01c5c9e21a302617bb487b1f4389d69f32f3340d22248d419c4f49b38132a9e8cefc0235ebe1ed6973c3c2d1c761bc36ab8f59789bbc3d14c88
-
Filesize
247KB
MD5bb4ffc473b7a765ba16ea6b6d0dbec0f
SHA1c0ffe7774fa104e5b2b29feccfc943bfdc57bc52
SHA256e1b8b3358f7cdee4c12f8f07c80d8f01e703584f46cde07740ef8d4351f49f89
SHA512679f3e16cb01f01c5c9e21a302617bb487b1f4389d69f32f3340d22248d419c4f49b38132a9e8cefc0235ebe1ed6973c3c2d1c761bc36ab8f59789bbc3d14c88
-
Filesize
247KB
MD5bb4ffc473b7a765ba16ea6b6d0dbec0f
SHA1c0ffe7774fa104e5b2b29feccfc943bfdc57bc52
SHA256e1b8b3358f7cdee4c12f8f07c80d8f01e703584f46cde07740ef8d4351f49f89
SHA512679f3e16cb01f01c5c9e21a302617bb487b1f4389d69f32f3340d22248d419c4f49b38132a9e8cefc0235ebe1ed6973c3c2d1c761bc36ab8f59789bbc3d14c88
-
Filesize
288KB
MD5d5c07326071e34b28ce94e867f11e03d
SHA1e9ea832b7a9eb3078b703bbba9d9be31b0378d17
SHA25689ecd4d3608b88b795626091ab8e31b64009b32223b8cbc0120afb0b2005e528
SHA512ad1a7a19fe727ca22f6dee9e3ed39bb8b1a7c253e463e0e85c4d23dfb50883dc599091a132a396f1144abf563b8cea6b255eb1d31996e59f99e1a94346f8c4b3
-
Filesize
347KB
MD54c96a479f7000cd3d871a04e0fc7e728
SHA1d37889883418dcdd2c3a3f9403fe585f12058d68
SHA256dc3c91dfbed51d07d5dd4d2dff0bd8fd9a5d89663bdd60fa1c810596fc1188a7
SHA5125bbdbc051bb25382e775e6d119e8c36643aaa0ff188d706c90a515e03eec52506c5b96001b465798bc56c58d04e427b318b8ad029d1983dfa1fe6d88a0d081e9
-
Filesize
347KB
MD54c96a479f7000cd3d871a04e0fc7e728
SHA1d37889883418dcdd2c3a3f9403fe585f12058d68
SHA256dc3c91dfbed51d07d5dd4d2dff0bd8fd9a5d89663bdd60fa1c810596fc1188a7
SHA5125bbdbc051bb25382e775e6d119e8c36643aaa0ff188d706c90a515e03eec52506c5b96001b465798bc56c58d04e427b318b8ad029d1983dfa1fe6d88a0d081e9
-
Filesize
4.1MB
MD59979fec91f69c0163f9c1ae105a23c23
SHA169696d6eabd6715a4000cc3d4fcc96900a271d2a
SHA256871df19ef1af680602fa18b6f828d4e5514d704b172fd8e0e9ff9104500ad658
SHA5121cd8b1d0a8fdea2ac3efbde4fcb8f469aaec8aac8a2aa74da92a89315660c3f5dace46f3c62de0322e384c5b5de8f3c1fca54158473c40064e232381275a6029
-
Filesize
2.8MB
MD5b4fa775be8497ab305e94e00a7cc659a
SHA13d72bd10f981c9c0347171aa228c727af4963f91
SHA256035fcd703f10bc15639c11d480d278deee653ff3011adcf3ff8c04267ac4b495
SHA5121d586e26ae6a13ca9968d5cd75476b588f31c2b113f53286281ca5cfc07058d84b93121cb1fae22239a67e7f64594f754f4aec54dfccb4be9b09871d81db5919
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
6.1MB
MD560ddd726bba5ccd38361277c0b86f26c
SHA133bbc251be61a7fbf084f1e8540649f68dc18d52
SHA256cf158febdfab345e47423394b53dcb640c03473bae3d84bbaa52e91ed4b39461
SHA512b21e4a453efe265510585e85ab2fe1e02a5a6b1cce734e4a05f416d088edc8a6d59a7bc8b1d20c56faf48fdd2feab9431367529cf2aeeca5ad70b2e3f072a5f3
-
Filesize
6.1MB
MD560ddd726bba5ccd38361277c0b86f26c
SHA133bbc251be61a7fbf084f1e8540649f68dc18d52
SHA256cf158febdfab345e47423394b53dcb640c03473bae3d84bbaa52e91ed4b39461
SHA512b21e4a453efe265510585e85ab2fe1e02a5a6b1cce734e4a05f416d088edc8a6d59a7bc8b1d20c56faf48fdd2feab9431367529cf2aeeca5ad70b2e3f072a5f3
-
Filesize
6.1MB
MD560ddd726bba5ccd38361277c0b86f26c
SHA133bbc251be61a7fbf084f1e8540649f68dc18d52
SHA256cf158febdfab345e47423394b53dcb640c03473bae3d84bbaa52e91ed4b39461
SHA512b21e4a453efe265510585e85ab2fe1e02a5a6b1cce734e4a05f416d088edc8a6d59a7bc8b1d20c56faf48fdd2feab9431367529cf2aeeca5ad70b2e3f072a5f3
-
Filesize
6.1MB
MD560ddd726bba5ccd38361277c0b86f26c
SHA133bbc251be61a7fbf084f1e8540649f68dc18d52
SHA256cf158febdfab345e47423394b53dcb640c03473bae3d84bbaa52e91ed4b39461
SHA512b21e4a453efe265510585e85ab2fe1e02a5a6b1cce734e4a05f416d088edc8a6d59a7bc8b1d20c56faf48fdd2feab9431367529cf2aeeca5ad70b2e3f072a5f3
-
Filesize
6.9MB
MD5cd3191644eeaab1d1cf9b4bea245f78c
SHA175f04b22e62b1366a4c5b2887242b63de1d83c9c
SHA256f626f7361d341ca2b7c67c2b20ca5ab516a6ce4104048c5a3ee3f2d83cc3039f
SHA51279ebd59d2f66bf3f4417760ff1c9021b3d0e3dcb65da390bf377c3316ce675add82b79bd90750e9b98f68bd5a5625c2b863fadbd0bf447c372b14a619e43d57a
-
Filesize
4.7MB
MD51312b9c3111e7eaea09326ff644feb04
SHA1114f2fd35c67fe5378e0cac3335485eb2ae8f292
SHA256246411eb4d336db6f5563483030c3ebdc476e6715f264658655f6712aee5bb0f
SHA512372ea048f5ebf256fd85e932a406de5e3d1842722e505d432b0679ed0990ea3522c2397fe7c91a9e915950f36207d81689d7b04817005b95d118539452f4384a
-
Filesize
4.1MB
MD53e3831350972800634a6435cb165ec66
SHA184e19e1e32ba66d7405d958de44c0be7724c448e
SHA256469a21679a564f73fa68930555c21738a2ec56b4746939b48ba18f3ccf5be9d3
SHA512857a82c3d9f38b79e0d97d838bfa3b90a633b5f8a1dcb7b83a91ca8e90787f8dff190eca59f7e1647c34f7aec8c8d0d99d933e9ee3fcb31199ec481e6ce83312
-
Filesize
4.1MB
MD53e3831350972800634a6435cb165ec66
SHA184e19e1e32ba66d7405d958de44c0be7724c448e
SHA256469a21679a564f73fa68930555c21738a2ec56b4746939b48ba18f3ccf5be9d3
SHA512857a82c3d9f38b79e0d97d838bfa3b90a633b5f8a1dcb7b83a91ca8e90787f8dff190eca59f7e1647c34f7aec8c8d0d99d933e9ee3fcb31199ec481e6ce83312
-
Filesize
7.1MB
MD53111f8d446efd3c0a0e2c91cbf303998
SHA1da86c8d200f799d6467e74e1ea65781078f50be7
SHA2567ad618232c089a82b096bd93151d6930853caa6cde160d24787e9d70bd87acad
SHA5120f4101325b359e5f85692ec5fa5bb771ca723a119fee6fde787336fc623c30bf104cc4cdedab6a1a8ff0eb9efc97f5f5245c677869117161e25e5f189a874170
-
Filesize
7.1MB
MD53111f8d446efd3c0a0e2c91cbf303998
SHA1da86c8d200f799d6467e74e1ea65781078f50be7
SHA2567ad618232c089a82b096bd93151d6930853caa6cde160d24787e9d70bd87acad
SHA5120f4101325b359e5f85692ec5fa5bb771ca723a119fee6fde787336fc623c30bf104cc4cdedab6a1a8ff0eb9efc97f5f5245c677869117161e25e5f189a874170
-
Filesize
7.1MB
MD53111f8d446efd3c0a0e2c91cbf303998
SHA1da86c8d200f799d6467e74e1ea65781078f50be7
SHA2567ad618232c089a82b096bd93151d6930853caa6cde160d24787e9d70bd87acad
SHA5120f4101325b359e5f85692ec5fa5bb771ca723a119fee6fde787336fc623c30bf104cc4cdedab6a1a8ff0eb9efc97f5f5245c677869117161e25e5f189a874170
-
Filesize
7.1MB
MD53111f8d446efd3c0a0e2c91cbf303998
SHA1da86c8d200f799d6467e74e1ea65781078f50be7
SHA2567ad618232c089a82b096bd93151d6930853caa6cde160d24787e9d70bd87acad
SHA5120f4101325b359e5f85692ec5fa5bb771ca723a119fee6fde787336fc623c30bf104cc4cdedab6a1a8ff0eb9efc97f5f5245c677869117161e25e5f189a874170
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
4.7MB
MD51312b9c3111e7eaea09326ff644feb04
SHA1114f2fd35c67fe5378e0cac3335485eb2ae8f292
SHA256246411eb4d336db6f5563483030c3ebdc476e6715f264658655f6712aee5bb0f
SHA512372ea048f5ebf256fd85e932a406de5e3d1842722e505d432b0679ed0990ea3522c2397fe7c91a9e915950f36207d81689d7b04817005b95d118539452f4384a
-
Filesize
2.8MB
MD5b4fa775be8497ab305e94e00a7cc659a
SHA13d72bd10f981c9c0347171aa228c727af4963f91
SHA256035fcd703f10bc15639c11d480d278deee653ff3011adcf3ff8c04267ac4b495
SHA5121d586e26ae6a13ca9968d5cd75476b588f31c2b113f53286281ca5cfc07058d84b93121cb1fae22239a67e7f64594f754f4aec54dfccb4be9b09871d81db5919
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
4.1MB
MD59979fec91f69c0163f9c1ae105a23c23
SHA169696d6eabd6715a4000cc3d4fcc96900a271d2a
SHA256871df19ef1af680602fa18b6f828d4e5514d704b172fd8e0e9ff9104500ad658
SHA5121cd8b1d0a8fdea2ac3efbde4fcb8f469aaec8aac8a2aa74da92a89315660c3f5dace46f3c62de0322e384c5b5de8f3c1fca54158473c40064e232381275a6029
-
Filesize
4.1MB
MD59979fec91f69c0163f9c1ae105a23c23
SHA169696d6eabd6715a4000cc3d4fcc96900a271d2a
SHA256871df19ef1af680602fa18b6f828d4e5514d704b172fd8e0e9ff9104500ad658
SHA5121cd8b1d0a8fdea2ac3efbde4fcb8f469aaec8aac8a2aa74da92a89315660c3f5dace46f3c62de0322e384c5b5de8f3c1fca54158473c40064e232381275a6029
-
Filesize
247KB
MD5bb4ffc473b7a765ba16ea6b6d0dbec0f
SHA1c0ffe7774fa104e5b2b29feccfc943bfdc57bc52
SHA256e1b8b3358f7cdee4c12f8f07c80d8f01e703584f46cde07740ef8d4351f49f89
SHA512679f3e16cb01f01c5c9e21a302617bb487b1f4389d69f32f3340d22248d419c4f49b38132a9e8cefc0235ebe1ed6973c3c2d1c761bc36ab8f59789bbc3d14c88
-
Filesize
247KB
MD5bb4ffc473b7a765ba16ea6b6d0dbec0f
SHA1c0ffe7774fa104e5b2b29feccfc943bfdc57bc52
SHA256e1b8b3358f7cdee4c12f8f07c80d8f01e703584f46cde07740ef8d4351f49f89
SHA512679f3e16cb01f01c5c9e21a302617bb487b1f4389d69f32f3340d22248d419c4f49b38132a9e8cefc0235ebe1ed6973c3c2d1c761bc36ab8f59789bbc3d14c88
-
Filesize
288KB
MD5d5c07326071e34b28ce94e867f11e03d
SHA1e9ea832b7a9eb3078b703bbba9d9be31b0378d17
SHA25689ecd4d3608b88b795626091ab8e31b64009b32223b8cbc0120afb0b2005e528
SHA512ad1a7a19fe727ca22f6dee9e3ed39bb8b1a7c253e463e0e85c4d23dfb50883dc599091a132a396f1144abf563b8cea6b255eb1d31996e59f99e1a94346f8c4b3
-
Filesize
347KB
MD54c96a479f7000cd3d871a04e0fc7e728
SHA1d37889883418dcdd2c3a3f9403fe585f12058d68
SHA256dc3c91dfbed51d07d5dd4d2dff0bd8fd9a5d89663bdd60fa1c810596fc1188a7
SHA5125bbdbc051bb25382e775e6d119e8c36643aaa0ff188d706c90a515e03eec52506c5b96001b465798bc56c58d04e427b318b8ad029d1983dfa1fe6d88a0d081e9
-
Filesize
347KB
MD54c96a479f7000cd3d871a04e0fc7e728
SHA1d37889883418dcdd2c3a3f9403fe585f12058d68
SHA256dc3c91dfbed51d07d5dd4d2dff0bd8fd9a5d89663bdd60fa1c810596fc1188a7
SHA5125bbdbc051bb25382e775e6d119e8c36643aaa0ff188d706c90a515e03eec52506c5b96001b465798bc56c58d04e427b318b8ad029d1983dfa1fe6d88a0d081e9
-
Filesize
4.1MB
MD59979fec91f69c0163f9c1ae105a23c23
SHA169696d6eabd6715a4000cc3d4fcc96900a271d2a
SHA256871df19ef1af680602fa18b6f828d4e5514d704b172fd8e0e9ff9104500ad658
SHA5121cd8b1d0a8fdea2ac3efbde4fcb8f469aaec8aac8a2aa74da92a89315660c3f5dace46f3c62de0322e384c5b5de8f3c1fca54158473c40064e232381275a6029
-
Filesize
4.1MB
MD59979fec91f69c0163f9c1ae105a23c23
SHA169696d6eabd6715a4000cc3d4fcc96900a271d2a
SHA256871df19ef1af680602fa18b6f828d4e5514d704b172fd8e0e9ff9104500ad658
SHA5121cd8b1d0a8fdea2ac3efbde4fcb8f469aaec8aac8a2aa74da92a89315660c3f5dace46f3c62de0322e384c5b5de8f3c1fca54158473c40064e232381275a6029