Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2023 08:54
Static task
static1
Behavioral task
behavioral1
Sample
SirixStation-enjoypumarkets1.9.49688.0_JC.msi
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
SirixStation-enjoypumarkets1.9.49688.0_JC.msi
Resource
win10v2004-20231020-en
General
-
Target
SirixStation-enjoypumarkets1.9.49688.0_JC.msi
-
Size
13.4MB
-
MD5
75640d92963192670524067d9fb1b560
-
SHA1
699e708155a657e177d031701424fc26d8b2d8e9
-
SHA256
058adb3c51411c048b89491fed3a09d7ccbdbe3c2d52bc82fe3cbcce5bcfa1ac
-
SHA512
c4f4164577fcb46eb7def6231a1b0ac217ec67bf5df56707ccfe90831b275693341c27706f8c43786eb4bd6e37560a7a7fd24b19427feb2465b86144acf5c6e0
-
SSDEEP
393216:lpkokD0t6CmGeTrSJPk1HulyI1CMoCQqvV:lpuAPaSJPkJulyI15nQqvV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
SIRIX Station by enjoypumarkets.exepid process 1888 SIRIX Station by enjoypumarkets.exe -
Loads dropped DLL 22 IoCs
Processes:
SIRIX Station by enjoypumarkets.exepid process 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe -
Blocklisted process makes network request 2 IoCs
Processes:
msiexec.exeflow pid process 5 1752 msiexec.exe 8 1752 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe -
Drops file in Program Files directory 25 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\nl\FluentValidation.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\ru\FluentValidation.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\zh-Hans\Leverate.DesktopTrader.Core.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\es\FluentValidation.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\ru\Leverate.DesktopTrader.Core.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\fr\Leverate.DesktopTrader.Core.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\he\Leverate.DesktopTrader.Core.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\SIRIX Station By enjoypumarkets.exe msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\tr\Leverate.DesktopTrader.Core.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\Leverate.DesktopTrader.TechnicalServices.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\Leverate.DesktopTrader.TechIndicators.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\pt\FluentValidation.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\zh\Leverate.DesktopTrader.Core.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\de\FluentValidation.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\Leverate.DesktopTrader.Gui.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\DevExpress.Xpf.Themes.DesktopTraderTheme.v13.2.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\ar\Leverate.DesktopTrader.Core.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\it\FluentValidation.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\sv\FluentValidation.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\pl\FluentValidation.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\Leverate.Trading.PlatrofmServer.Common.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\fr\FluentValidation.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\tr\FluentValidation.resources.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\DevExpress.Xpf.Themes.DesktopTraderLight.v13.2.dll msiexec.exe File created C:\Program Files (x86)\SIRIX Station By enjoypumarkets\es\Leverate.DesktopTrader.Core.resources.dll msiexec.exe -
Drops file in Windows directory 10 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\{AB89B7FF-6B0F-4A7C-9EB5-EB64076A6327}\SirixStationExeIcon msiexec.exe File opened for modification C:\Windows\Installer\{AB89B7FF-6B0F-4A7C-9EB5-EB64076A6327}\SirixStationExeIcon msiexec.exe File opened for modification C:\Windows\Installer\e578443.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI8712.tmp msiexec.exe File created C:\Windows\Installer\e578445.msi msiexec.exe File created C:\Windows\Installer\e578443.msi msiexec.exe File created C:\Windows\Installer\SourceHash{AB89B7FF-6B0F-4A7C-9EB5-EB64076A6327} msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
msiexec.exedescription ioc process Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1b msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1A\52C64B7E msiexec.exe -
Modifies registry class 23 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\PackageCode = "121F036D5343DB941BC8F211F4FC8B5E" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A83596CFBB3E70F4282FC6FC9948918F\FF7B98BAF0B6C7A4E95BBE4670A63672 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\ProductIcon = "C:\\Windows\\Installer\\{AB89B7FF-6B0F-4A7C-9EB5-EB64076A6327}\\SirixStationExeIcon" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\SourceList\Media msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\FF7B98BAF0B6C7A4E95BBE4670A63672 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\Version = "17416692" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\FF7B98BAF0B6C7A4E95BBE4670A63672\F_FullApplication msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\ProductName = "SIRIX Station By enjoypumarkets" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A83596CFBB3E70F4282FC6FC9948918F msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FF7B98BAF0B6C7A4E95BBE4670A63672\SourceList\PackageName = "SirixStation-enjoypumarkets1.9.49688.0_JC.msi" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
msiexec.exeSIRIX Station by enjoypumarkets.exepid process 5088 msiexec.exe 5088 msiexec.exe 1888 SIRIX Station by enjoypumarkets.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exedescription pid process Token: SeShutdownPrivilege 1752 msiexec.exe Token: SeIncreaseQuotaPrivilege 1752 msiexec.exe Token: SeSecurityPrivilege 5088 msiexec.exe Token: SeCreateTokenPrivilege 1752 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1752 msiexec.exe Token: SeLockMemoryPrivilege 1752 msiexec.exe Token: SeIncreaseQuotaPrivilege 1752 msiexec.exe Token: SeMachineAccountPrivilege 1752 msiexec.exe Token: SeTcbPrivilege 1752 msiexec.exe Token: SeSecurityPrivilege 1752 msiexec.exe Token: SeTakeOwnershipPrivilege 1752 msiexec.exe Token: SeLoadDriverPrivilege 1752 msiexec.exe Token: SeSystemProfilePrivilege 1752 msiexec.exe Token: SeSystemtimePrivilege 1752 msiexec.exe Token: SeProfSingleProcessPrivilege 1752 msiexec.exe Token: SeIncBasePriorityPrivilege 1752 msiexec.exe Token: SeCreatePagefilePrivilege 1752 msiexec.exe Token: SeCreatePermanentPrivilege 1752 msiexec.exe Token: SeBackupPrivilege 1752 msiexec.exe Token: SeRestorePrivilege 1752 msiexec.exe Token: SeShutdownPrivilege 1752 msiexec.exe Token: SeDebugPrivilege 1752 msiexec.exe Token: SeAuditPrivilege 1752 msiexec.exe Token: SeSystemEnvironmentPrivilege 1752 msiexec.exe Token: SeChangeNotifyPrivilege 1752 msiexec.exe Token: SeRemoteShutdownPrivilege 1752 msiexec.exe Token: SeUndockPrivilege 1752 msiexec.exe Token: SeSyncAgentPrivilege 1752 msiexec.exe Token: SeEnableDelegationPrivilege 1752 msiexec.exe Token: SeManageVolumePrivilege 1752 msiexec.exe Token: SeImpersonatePrivilege 1752 msiexec.exe Token: SeCreateGlobalPrivilege 1752 msiexec.exe Token: SeBackupPrivilege 3804 vssvc.exe Token: SeRestorePrivilege 3804 vssvc.exe Token: SeAuditPrivilege 3804 vssvc.exe Token: SeRestorePrivilege 5088 msiexec.exe Token: SeTakeOwnershipPrivilege 5088 msiexec.exe Token: SeRestorePrivilege 5088 msiexec.exe Token: SeTakeOwnershipPrivilege 5088 msiexec.exe Token: SeRestorePrivilege 5088 msiexec.exe Token: SeTakeOwnershipPrivilege 5088 msiexec.exe Token: SeRestorePrivilege 5088 msiexec.exe Token: SeTakeOwnershipPrivilege 5088 msiexec.exe Token: SeRestorePrivilege 5088 msiexec.exe Token: SeTakeOwnershipPrivilege 5088 msiexec.exe Token: SeRestorePrivilege 5088 msiexec.exe Token: SeTakeOwnershipPrivilege 5088 msiexec.exe Token: SeRestorePrivilege 5088 msiexec.exe Token: SeTakeOwnershipPrivilege 5088 msiexec.exe Token: SeRestorePrivilege 5088 msiexec.exe Token: SeTakeOwnershipPrivilege 5088 msiexec.exe Token: SeRestorePrivilege 5088 msiexec.exe Token: SeTakeOwnershipPrivilege 5088 msiexec.exe Token: SeRestorePrivilege 5088 msiexec.exe Token: SeTakeOwnershipPrivilege 5088 msiexec.exe Token: SeRestorePrivilege 5088 msiexec.exe Token: SeTakeOwnershipPrivilege 5088 msiexec.exe Token: SeRestorePrivilege 5088 msiexec.exe Token: SeTakeOwnershipPrivilege 5088 msiexec.exe Token: SeRestorePrivilege 5088 msiexec.exe Token: SeTakeOwnershipPrivilege 5088 msiexec.exe Token: SeRestorePrivilege 5088 msiexec.exe Token: SeTakeOwnershipPrivilege 5088 msiexec.exe Token: SeRestorePrivilege 5088 msiexec.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
msiexec.exeSIRIX Station by enjoypumarkets.exepid process 1752 msiexec.exe 1752 msiexec.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
SIRIX Station by enjoypumarkets.exepid process 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe 1888 SIRIX Station by enjoypumarkets.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
msiexec.exedescription pid process target process PID 5088 wrote to memory of 1888 5088 msiexec.exe SIRIX Station by enjoypumarkets.exe PID 5088 wrote to memory of 1888 5088 msiexec.exe SIRIX Station by enjoypumarkets.exe PID 5088 wrote to memory of 1888 5088 msiexec.exe SIRIX Station by enjoypumarkets.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SirixStation-enjoypumarkets1.9.49688.0_JC.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1752
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\SIRIX Station By enjoypumarkets\SIRIX Station by enjoypumarkets.exe"C:\Program Files (x86)\SIRIX Station By enjoypumarkets\SIRIX Station by enjoypumarkets.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1888
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5bb209c17312117e540153252d0d17021
SHA1d4026ec40d5afee70109bb251fadebb527016d32
SHA256b4f39712bb3dd383e1e1b247a8f78bc5aad99c5c120b455cc5cc5797ea6425ba
SHA512f4c62d82217e8bef57e754daf6d634cd4c819155902524cdac053880635962e678ff7aa766ce0992cfe46a0924b052137adfd612ec9c6c3601e88425067767bb
-
C:\Program Files (x86)\SIRIX Station By enjoypumarkets\DevExpress.Xpf.Themes.DesktopTraderTheme.v13.2.dll
Filesize2.6MB
MD551ec2eafc9f435cd77eb5894db27c104
SHA1fda35bbaa220a0740ddbc2739b86be74f8540255
SHA2563c0baca2fe4c3315410a37434f532d76cc0498e2ce12033e411a0cb7bb443919
SHA5122b2533ca9a151415682dc407f6757c30eef102f4760ed0138264316b9a3a50c88699f63a950b4687e49865ecfd93de85cc841bbfa3cca34f5adc3bcc868626ea
-
C:\Program Files (x86)\SIRIX Station By enjoypumarkets\DevExpress.Xpf.Themes.DesktopTraderTheme.v13.2.dll
Filesize2.6MB
MD551ec2eafc9f435cd77eb5894db27c104
SHA1fda35bbaa220a0740ddbc2739b86be74f8540255
SHA2563c0baca2fe4c3315410a37434f532d76cc0498e2ce12033e411a0cb7bb443919
SHA5122b2533ca9a151415682dc407f6757c30eef102f4760ed0138264316b9a3a50c88699f63a950b4687e49865ecfd93de85cc841bbfa3cca34f5adc3bcc868626ea
-
C:\Program Files (x86)\SIRIX Station By enjoypumarkets\DevExpress.Xpf.Themes.DesktopTraderTheme.v13.2.dll
Filesize2.6MB
MD551ec2eafc9f435cd77eb5894db27c104
SHA1fda35bbaa220a0740ddbc2739b86be74f8540255
SHA2563c0baca2fe4c3315410a37434f532d76cc0498e2ce12033e411a0cb7bb443919
SHA5122b2533ca9a151415682dc407f6757c30eef102f4760ed0138264316b9a3a50c88699f63a950b4687e49865ecfd93de85cc841bbfa3cca34f5adc3bcc868626ea
-
Filesize
3.0MB
MD539e7ba45e5e079d555827fc98c9dbf22
SHA10c68062baeaab291d026757187b5d23165c9b6b3
SHA2567d3e329b81877accc091ee073f597151fdb7eef28843832cd0965c631f72041f
SHA5123c9e97e39253cf33d17bc56dc161f4881665dd1ac220731dcf71acb8389242b2c7c23db23c899ecb4d9feb46537d75b81703b969d83c9edd258a0f10b584e1a5
-
Filesize
3.0MB
MD539e7ba45e5e079d555827fc98c9dbf22
SHA10c68062baeaab291d026757187b5d23165c9b6b3
SHA2567d3e329b81877accc091ee073f597151fdb7eef28843832cd0965c631f72041f
SHA5123c9e97e39253cf33d17bc56dc161f4881665dd1ac220731dcf71acb8389242b2c7c23db23c899ecb4d9feb46537d75b81703b969d83c9edd258a0f10b584e1a5
-
Filesize
3.0MB
MD539e7ba45e5e079d555827fc98c9dbf22
SHA10c68062baeaab291d026757187b5d23165c9b6b3
SHA2567d3e329b81877accc091ee073f597151fdb7eef28843832cd0965c631f72041f
SHA5123c9e97e39253cf33d17bc56dc161f4881665dd1ac220731dcf71acb8389242b2c7c23db23c899ecb4d9feb46537d75b81703b969d83c9edd258a0f10b584e1a5
-
Filesize
26KB
MD5c48c550a8aa74f8c26fb2e3ac9d88cc2
SHA1beaf98fd7212a76e91a4c34ff83db0b546e065b3
SHA256fc15514079ba6fba57b826914ee9e820b1bd0ae82e026c124fe5d6b1537b6ba7
SHA512b05b9498a46dbb48b9351c9f82514982672a2163f0a735a0e2839cc27e13ac358b98042f63b5489172ce74959ea672b2ed98bf7e74d45f04df4ea1f23256dfca
-
Filesize
26KB
MD5c48c550a8aa74f8c26fb2e3ac9d88cc2
SHA1beaf98fd7212a76e91a4c34ff83db0b546e065b3
SHA256fc15514079ba6fba57b826914ee9e820b1bd0ae82e026c124fe5d6b1537b6ba7
SHA512b05b9498a46dbb48b9351c9f82514982672a2163f0a735a0e2839cc27e13ac358b98042f63b5489172ce74959ea672b2ed98bf7e74d45f04df4ea1f23256dfca
-
Filesize
26KB
MD5c48c550a8aa74f8c26fb2e3ac9d88cc2
SHA1beaf98fd7212a76e91a4c34ff83db0b546e065b3
SHA256fc15514079ba6fba57b826914ee9e820b1bd0ae82e026c124fe5d6b1537b6ba7
SHA512b05b9498a46dbb48b9351c9f82514982672a2163f0a735a0e2839cc27e13ac358b98042f63b5489172ce74959ea672b2ed98bf7e74d45f04df4ea1f23256dfca
-
Filesize
277KB
MD5ffa76f01731ba162a660fc20d546e0a9
SHA1e0647d6176ee2419cc3d469d17d02653dd041a96
SHA2568003a074ab76178ad9fba50950eb0d811ded5cb5f73e7402ea8b43951545d2d7
SHA51295c004a0e710979ef2693cbeb5334686ac7de91b65b92cb7a375b4ece400da9b75c3ce39e90961b280884f3dc50ae10b5a3b15cb87517586fac566bfc0360a1a
-
Filesize
277KB
MD5ffa76f01731ba162a660fc20d546e0a9
SHA1e0647d6176ee2419cc3d469d17d02653dd041a96
SHA2568003a074ab76178ad9fba50950eb0d811ded5cb5f73e7402ea8b43951545d2d7
SHA51295c004a0e710979ef2693cbeb5334686ac7de91b65b92cb7a375b4ece400da9b75c3ce39e90961b280884f3dc50ae10b5a3b15cb87517586fac566bfc0360a1a
-
Filesize
277KB
MD5ffa76f01731ba162a660fc20d546e0a9
SHA1e0647d6176ee2419cc3d469d17d02653dd041a96
SHA2568003a074ab76178ad9fba50950eb0d811ded5cb5f73e7402ea8b43951545d2d7
SHA51295c004a0e710979ef2693cbeb5334686ac7de91b65b92cb7a375b4ece400da9b75c3ce39e90961b280884f3dc50ae10b5a3b15cb87517586fac566bfc0360a1a
-
Filesize
87KB
MD53790ea60557aefadcc7e36dd9a1820a8
SHA1bfe2b1d0ed7c72ed4b6a2b53bbffbbe391bb929a
SHA256e4ca3379bcf5a61f10268a87e8a3643c07966f55a7513eda082d7cedc0fae38c
SHA5126183fb7a1af447f8837579751943493a8593a2955389bc1711a338edb4b804d4e2b3b85876b1a4e325f3c8ad4780ab31ba4fdb57824c8e0ea8788561b9a01eb2
-
Filesize
87KB
MD53790ea60557aefadcc7e36dd9a1820a8
SHA1bfe2b1d0ed7c72ed4b6a2b53bbffbbe391bb929a
SHA256e4ca3379bcf5a61f10268a87e8a3643c07966f55a7513eda082d7cedc0fae38c
SHA5126183fb7a1af447f8837579751943493a8593a2955389bc1711a338edb4b804d4e2b3b85876b1a4e325f3c8ad4780ab31ba4fdb57824c8e0ea8788561b9a01eb2
-
Filesize
87KB
MD53790ea60557aefadcc7e36dd9a1820a8
SHA1bfe2b1d0ed7c72ed4b6a2b53bbffbbe391bb929a
SHA256e4ca3379bcf5a61f10268a87e8a3643c07966f55a7513eda082d7cedc0fae38c
SHA5126183fb7a1af447f8837579751943493a8593a2955389bc1711a338edb4b804d4e2b3b85876b1a4e325f3c8ad4780ab31ba4fdb57824c8e0ea8788561b9a01eb2
-
Filesize
10.8MB
MD5d135dd1893a503ddace4b0bbbd1a990a
SHA1f49b102b81742d18c13686df6b3c3c4367556f68
SHA2565c609156433729a517d8416a8bf325a3706bbeebd9c211ef91644412c1b926d1
SHA5129b5eaf711a97a7c812d2defa9031809248f4498770a57413b22881d3bdc17902c67ba2ef31a31e112552ce86a715339ea4375864c65732754436607fcb364810
-
Filesize
10.8MB
MD5d135dd1893a503ddace4b0bbbd1a990a
SHA1f49b102b81742d18c13686df6b3c3c4367556f68
SHA2565c609156433729a517d8416a8bf325a3706bbeebd9c211ef91644412c1b926d1
SHA5129b5eaf711a97a7c812d2defa9031809248f4498770a57413b22881d3bdc17902c67ba2ef31a31e112552ce86a715339ea4375864c65732754436607fcb364810
-
Filesize
10.8MB
MD5d135dd1893a503ddace4b0bbbd1a990a
SHA1f49b102b81742d18c13686df6b3c3c4367556f68
SHA2565c609156433729a517d8416a8bf325a3706bbeebd9c211ef91644412c1b926d1
SHA5129b5eaf711a97a7c812d2defa9031809248f4498770a57413b22881d3bdc17902c67ba2ef31a31e112552ce86a715339ea4375864c65732754436607fcb364810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_EF52C1EC85F21F31CC0157A5C8803013
Filesize765B
MD5fd23736f1ad84053bc8e70d26fa10c58
SHA12f7fbd1fd8f4e793048b452e824ba01547677d8b
SHA25631e506ecbff411eba9ce3eb262568587450ee129fd7c7911e6e77a2bd59c2ec0
SHA5121e8a4f6835fecd05fb42eca435cf21eac8f81df99953f236bb74a708bc077f25689286c950baa7c32912d7f8b84061dfa200a64167174662ccdb1dfe14dda564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3AA0DCD5A74331FBD6F344550EC48B87_EE51B9471E2B50108A915B77B94DC0B7
Filesize637B
MD50a9cbb0bb1a734f023ffcad08a81e043
SHA10ec04dac43c27fbb704b01eb7777ddaa514c9d64
SHA2567ca8df20eb65e6248d56fb5f377aaded6c4b6d78259b0f6153ed50bf6cd9c783
SHA512139f8cea5a49d19ace574c86e233550cf0c94f2c566d3767e1bd4bb3efd43a29ca2783c889d9b9acf4ecfb4efd5d4dd60466553076b45753d9277fd423e8d10d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F
Filesize1KB
MD5fd2cdf2dd8eca4ee331e90045a044fe2
SHA1158f7fdce37e7c7c85b6d58a53db4f5ceafc5c75
SHA2568986eb81e93a6c6ece0d7f4423f5aed2e991dab60c707978231d35a9d5686480
SHA5125a75efe876c8a6c0c95eec5928314578206088365bda36310e9e2602cc03e8e0cfb4d9bfec9b2caa7e8705703d0070f4024cca2c6091826f8f18bd0e08aee44b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_EF52C1EC85F21F31CC0157A5C8803013
Filesize484B
MD5da7a38635a7bc2a4e44aae9148816265
SHA1d2789006303d632d528b04ea63fd451f120e496d
SHA256085108d56000420ca10210529d31d2b1908db248761fced1108f9e4ebafa6bfb
SHA51271e9d7afe1016397a7ad80f20dc1398ddc4c071e0890b1fb1f0ba4f14f2ace42b2b4abd865714c8862b205bd8027d4b654cb02af0857159a59577b688f3e5709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3AA0DCD5A74331FBD6F344550EC48B87_EE51B9471E2B50108A915B77B94DC0B7
Filesize484B
MD55fb10f995e9bd52d64bcbc6e17f7e6f7
SHA104dd69f2b47f44cca62b85a8cab2fa0865015321
SHA25661842ddb2c19f2eb095b0e4d818b885a51e2a7e0eec46c2d55b843674efdb9d1
SHA5125acf8b5d36c2aa1dd594940159387602b2ffad69931fe53438aaf7099152146201ddaf03e8303c313bcd119ddefcfcff45e6ff217c30bd504fe476313d23640d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F
Filesize482B
MD5743a0a6d03ea3fe926ceee4a927dd52e
SHA161a7824091541bd418996d72143e9ada678c21a8
SHA256495eeb435ef974cb0903ca845a4f7fbd941ffdcd261d38a0913ebad5d04bcb06
SHA5122d02ba1915152461696f3b3e8a50a829e35ded1327458750211e9775eb3ea1512ebba2a7c515b1a8f9ea8ca5d1392dbbb497b4cb1e79bb61da477b11db803a5b
-
C:\Users\Admin\AppData\Local\Temp\d3bb8e4e8722ddc0e46007272afa2e18\248330ff1f7dcfd26a41e0b3044452e9.dll
Filesize45KB
MD56f67f021eda1a2ed6846242188db5095
SHA1be1eee6125da7c9d5da8c74399284e939b195544
SHA25692074bd461915449a87f878c0325f4bfe7b797a5bb12d7c4a491e00e58a19151
SHA512c237b89c5408fcfed1a9657480f653fcbfe7676c2aebaa6c713d243241624aecf08cd3f0c19601ac67fe52bc62d0c121a2a0a0f5d304a7f9def7255ef481b588
-
C:\Users\Admin\AppData\Local\Temp\d3bb8e4e8722ddc0e46007272afa2e18\248330ff1f7dcfd26a41e0b3044452e9.dll
Filesize45KB
MD56f67f021eda1a2ed6846242188db5095
SHA1be1eee6125da7c9d5da8c74399284e939b195544
SHA25692074bd461915449a87f878c0325f4bfe7b797a5bb12d7c4a491e00e58a19151
SHA512c237b89c5408fcfed1a9657480f653fcbfe7676c2aebaa6c713d243241624aecf08cd3f0c19601ac67fe52bc62d0c121a2a0a0f5d304a7f9def7255ef481b588
-
C:\Users\Admin\AppData\Local\Temp\d3bb8e4e8722ddc0e46007272afa2e18\863354e234682a73c76a9b0fb4235333.dll
Filesize194KB
MD567035229191d3bbbb33ff3fe2c5dd54b
SHA19ee1ad86c376769af3e48fd05c23af97578a5d6d
SHA2563a65181e0c2e7eaf2c87504e6005fb34311e630b5d7a3130992bf4e981be3a86
SHA512ac0a90581a3e3a87e41812eac925e22ce7eb77d2eb157eeb4ef025ad7e519dd3e678dd650a0cf21e11be4d0a211f04477ca581739ac159ca4e162ae5141a2d68
-
C:\Users\Admin\AppData\Local\Temp\d3bb8e4e8722ddc0e46007272afa2e18\863354e234682a73c76a9b0fb4235333.dll
Filesize194KB
MD567035229191d3bbbb33ff3fe2c5dd54b
SHA19ee1ad86c376769af3e48fd05c23af97578a5d6d
SHA2563a65181e0c2e7eaf2c87504e6005fb34311e630b5d7a3130992bf4e981be3a86
SHA512ac0a90581a3e3a87e41812eac925e22ce7eb77d2eb157eeb4ef025ad7e519dd3e678dd650a0cf21e11be4d0a211f04477ca581739ac159ca4e162ae5141a2d68
-
C:\Users\Admin\AppData\Local\Temp\d3bb8e4e8722ddc0e46007272afa2e18\863354e234682a73c76a9b0fb4235333.dll
Filesize194KB
MD567035229191d3bbbb33ff3fe2c5dd54b
SHA19ee1ad86c376769af3e48fd05c23af97578a5d6d
SHA2563a65181e0c2e7eaf2c87504e6005fb34311e630b5d7a3130992bf4e981be3a86
SHA512ac0a90581a3e3a87e41812eac925e22ce7eb77d2eb157eeb4ef025ad7e519dd3e678dd650a0cf21e11be4d0a211f04477ca581739ac159ca4e162ae5141a2d68
-
C:\Users\Admin\AppData\Local\Temp\d3bb8e4e8722ddc0e46007272afa2e18\89a83f52debea8c508da2f233c74c350.dll
Filesize1.6MB
MD53bb0b61a4da446e60b7edce2fbcf52ea
SHA110839c1f60df954abd29020bb1f2af8d73650e7a
SHA256b786b1a218b0a2b2151c8dbcceeec4ef873a668c43bcb15ee1182e299ad5f0f4
SHA512ffd84765fbeb323baab18924730ca8d70b9787d5709675f990e37a127f45c8326e5ebbf0c3a729cd418c3724f9057e6025057599959b2e6188af37f9da321c10
-
C:\Users\Admin\AppData\Local\Temp\d3bb8e4e8722ddc0e46007272afa2e18\89a83f52debea8c508da2f233c74c350.dll
Filesize1.6MB
MD53bb0b61a4da446e60b7edce2fbcf52ea
SHA110839c1f60df954abd29020bb1f2af8d73650e7a
SHA256b786b1a218b0a2b2151c8dbcceeec4ef873a668c43bcb15ee1182e299ad5f0f4
SHA512ffd84765fbeb323baab18924730ca8d70b9787d5709675f990e37a127f45c8326e5ebbf0c3a729cd418c3724f9057e6025057599959b2e6188af37f9da321c10
-
C:\Users\Admin\AppData\Local\Temp\d3bb8e4e8722ddc0e46007272afa2e18\8c2c4d8e470d84876c7603b3afce38a6.dll
Filesize116KB
MD53abbb099e77e91a358be9f6805457ce4
SHA1d9c5d4cd58ffcf8f90625ae512659465107da3eb
SHA25691a48c7a7aafa7deb5d18d5c9bfce6ea3f629d9e07571388e967b30651cdcece
SHA5121ba98011a8dc99984064115192c372ee87acd280eb45003f1631410bdf8f84483e14fd2cb4c8ee9643607e4b2c038aa6b01430fe373d9d225ee3fc2f7dc8b7e3
-
C:\Users\Admin\AppData\Local\Temp\d3bb8e4e8722ddc0e46007272afa2e18\8c2c4d8e470d84876c7603b3afce38a6.dll
Filesize116KB
MD53abbb099e77e91a358be9f6805457ce4
SHA1d9c5d4cd58ffcf8f90625ae512659465107da3eb
SHA25691a48c7a7aafa7deb5d18d5c9bfce6ea3f629d9e07571388e967b30651cdcece
SHA5121ba98011a8dc99984064115192c372ee87acd280eb45003f1631410bdf8f84483e14fd2cb4c8ee9643607e4b2c038aa6b01430fe373d9d225ee3fc2f7dc8b7e3
-
C:\Users\Admin\AppData\Local\Temp\d3bb8e4e8722ddc0e46007272afa2e18\a34b23f7b6239c1d92c55209eb456207.dll
Filesize163KB
MD5f4af16eb7702ee0a2c7b1254a8cf1ced
SHA1fbda72a3b98c39c06ff2822cc3ba648c9135779d
SHA256eb98491e0056bb1f8a42b2529ab283b4cd9d57bcf814c7306368938152b60a14
SHA51286127758e4854c83c745ca5d6286e57503c814db465b7f74dec928894a0c4f5a51a0d6647462e6359b3f45ca1db1bbd10e527a84048baad299ad4916f66cd35d
-
C:\Users\Admin\AppData\Local\Temp\d3bb8e4e8722ddc0e46007272afa2e18\a34b23f7b6239c1d92c55209eb456207.dll
Filesize163KB
MD5f4af16eb7702ee0a2c7b1254a8cf1ced
SHA1fbda72a3b98c39c06ff2822cc3ba648c9135779d
SHA256eb98491e0056bb1f8a42b2529ab283b4cd9d57bcf814c7306368938152b60a14
SHA51286127758e4854c83c745ca5d6286e57503c814db465b7f74dec928894a0c4f5a51a0d6647462e6359b3f45ca1db1bbd10e527a84048baad299ad4916f66cd35d
-
C:\Users\Admin\AppData\Local\Temp\d3bb8e4e8722ddc0e46007272afa2e18\a4bc67905fb52af7e783a6aa60c3d0f6.dll
Filesize456KB
MD552a398fe71a30bdc4edbcfac6f852a47
SHA1704c593819f603948c5d3afe527226ff73d15c94
SHA2568eee5213313f54cbddc6fe5519f56fe3b0239b70a62a9497284e524efcf46866
SHA51211470e0452cf783595d93882b8a7aa79be8852fe24597e5172e7e5d7a3e7a6e82296863a0e0afaeedc98fe7d5e905216d09783f7d411f38e36a5434933d61e10
-
C:\Users\Admin\AppData\Local\Temp\d3bb8e4e8722ddc0e46007272afa2e18\a4bc67905fb52af7e783a6aa60c3d0f6.dll
Filesize456KB
MD552a398fe71a30bdc4edbcfac6f852a47
SHA1704c593819f603948c5d3afe527226ff73d15c94
SHA2568eee5213313f54cbddc6fe5519f56fe3b0239b70a62a9497284e524efcf46866
SHA51211470e0452cf783595d93882b8a7aa79be8852fe24597e5172e7e5d7a3e7a6e82296863a0e0afaeedc98fe7d5e905216d09783f7d411f38e36a5434933d61e10
-
Filesize
13.4MB
MD575640d92963192670524067d9fb1b560
SHA1699e708155a657e177d031701424fc26d8b2d8e9
SHA256058adb3c51411c048b89491fed3a09d7ccbdbe3c2d52bc82fe3cbcce5bcfa1ac
SHA512c4f4164577fcb46eb7def6231a1b0ac217ec67bf5df56707ccfe90831b275693341c27706f8c43786eb4bd6e37560a7a7fd24b19427feb2465b86144acf5c6e0