Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2023 19:53
Static task
static1
Behavioral task
behavioral1
Sample
CyberGhostVPNSetup (1).exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
CyberGhostVPNSetup (1).exe
Resource
win10v2004-20231127-en
General
-
Target
CyberGhostVPNSetup (1).exe
-
Size
127KB
-
MD5
fd093f3100a56b710c50d41667da7e2b
-
SHA1
5ec9063e4380f642d2a551da76fd4d3f00fd4c96
-
SHA256
f6dfae75fd23c0446ec1721994cf2530c66bd76366423176414747b39153bf58
-
SHA512
d3daebf6e3669a4b2a944e60d97c86fd31878cea66e252f05ea8d23f92c1f02ef8e6f4dda250b979a9b9df3fa71dc43c4ab98e2cae52e7687861d1e9a3dd09c0
-
SSDEEP
3072:ACNd5JY06+ywjDnJShh8N7JNzFrxO/DLxPO4GV:TNVPtVQ7LtOz
Malware Config
Signatures
-
Detect PureLogs payload 1 IoCs
resource yara_rule behavioral2/memory/5072-57-0x000001A2A48F0000-0x000001A2A4936000-memory.dmp family_purelogs -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\SET4DCD.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET4DCD.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe -
Manipulates Digital Signatures 1 TTPs 2 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 0300000001000000140000005e66e0ca2367757e800e65b770629026e131a7dc040000000100000010000000c759d588bceb1c8a8c8a4d2c00103ba10f00000001000000140000001b4e387db74a69a0470cb08f598beb3b511617531400000001000000140000009afe50cc7c723e76b49c036a97a88c8135cb6651190000000100000010000000ea06916833e9ecb6dac092d5c3482ff15c000000010000000400000000080000180000000100000010000000c7c2cda336016dcb1d1c518e4c192b4b4b0000000100000044000000320036004100440030003100460039004300300030003200460041004400330037003400320037004500370033003400330030003200330038003300440038005f0000002000000001000000ba060000308206b63082059ea003020102021004d54dc0a2016b263eeeb255d321056e300d06092a864886f70d0101050500306f310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312e302c060355040313254469676943657274204173737572656420494420436f6465205369676e696e672043412d31301e170d3133303831333030303030305a170d3136303930323132303030305a308181310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100a10462099150b2575bc037614701c292ba96e98270fdb06e1d1f40343e720e259d6f9fdf59bcb9365f8cea69689aed7a4354591db75509826ad71ab3f00cb18ed11157effc5eb3bf5730b33b5ba76fd73f3fd7f1b2256410223a7f8f5f52b6fb8b31a979cc50f831880fc837c81168e74dd4f57368ef55a1dbe480a815128e0d944d4d70be02ed65efe486a020f50dfdfe6d2a0dfab3ff9885fdb1bc39b79bb0a38183e42d557a60da66883c3307c208655da1a43eeb2393ea10b200f55ddfd66da47eae911eebe43113c7aafdf8e13d2fef2604eac2e3739021816b323dc9ef0f8411a1a7921023ff3cd7f1f4d4307f6ad13816d47b93823c9683069315088d0203010001a382033930820335301f0603551d230418301680147b68ce29aac017be497ae1e53fd6a7f7458f3532301d0603551d0e041604149afe50cc7c723e76b49c036a97a88c8135cb6651300e0603551d0f0101ff04040302078030130603551d25040c300a06082b0601050507030330730603551d1f046c306a3033a031a02f862d687474703a2f2f63726c332e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c3033a031a02f862d687474703a2f2f63726c342e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c308201c40603551d20048201bb308201b7308201b306096086480186fd6c0301308201a4303a06082b06010505070201162e687474703a2f2f7777772e64696769636572742e636f6d2f73736c2d6370732d7265706f7369746f72792e68746d3082016406082b06010505070202308201561e8201520041006e007900200075007300650020006f00660020007400680069007300200043006500720074006900660069006300610074006500200063006f006e0073007400690074007500740065007300200061006300630065007000740061006e006300650020006f00660020007400680065002000440069006700690043006500720074002000430050002f00430050005300200061006e00640020007400680065002000520065006c00790069006e0067002000500061007200740079002000410067007200650065006d0065006e00740020007700680069006300680020006c0069006d006900740020006c0069006100620069006c00690074007900200061006e0064002000610072006500200069006e0063006f00720070006f00720061007400650064002000680065007200650069006e0020006200790020007200650066006500720065006e00630065002e30818206082b0601050507010104763074302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304c06082b060105050730028640687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274417373757265644944436f64655369676e696e6743412d312e637274300c0603551d130101ff04023000300d06092a864886f70d0101050500038201010035d3e402ab7e93e4c84f74475c2403fbaf99335beb29aef76c0cbadf9eed476e26ae26aa5e87bb55e851926d2db986d674efd71abe7ecdc4b57c98d65b862725bd09e466949c3cf68cb40631d734ee948e4a7e5c849edf9757530a17e85c91e3dbc61e31a5d30b7250e83316c23728cc3fc0c721f61780a9f8542b575131652426be91885d9756313eff308755b60ccf6ade5f7bd7e32690a51c0b470a3bfe9dbedad74b535349ff469baa3e4d741d7db011501f80afdc4138a345c36e78710681be9d5b2bd45620bfaddf8e4ebd58e0820296f5c40c06fc48db187ff49fcaf489866fdae7c4d7224e3548bac384a5e7b59175c8fd6a667fa6ee3838802ce9be DrvInst.exe Set value (int) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\ICounter = "1" Dashboard.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Control Panel\International\Geo\Nation CyberGhostVPNSetup (1).exe Key value queried \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Control Panel\International\Geo\Nation 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe Key value queried \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Control Panel\International\Geo\Nation Dashboard.exe Key value queried \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Control Panel\International\Geo\Nation CefSharp.BrowserSubprocess.exe Key value queried \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Control Panel\International\Geo\Nation Dashboard.exe Key value queried \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Control Panel\International\Geo\Nation CefSharp.BrowserSubprocess.exe -
Executes dropped EXE 17 IoCs
pid Process 5072 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe 3560 Dashboard.exe 4272 Dashboard.Service.exe 4984 Dashboard.Service.exe 1136 wyUpdate.exe 1320 tap-windows-9.21.2.exe 4176 tapinstall.exe 4376 tapinstall.exe 4648 nvspbind.exe 2404 nvspbind.exe 3644 Dashboard.exe 3944 nvspbind.exe 1320 CefSharp.BrowserSubprocess.exe 5496 CefSharp.BrowserSubprocess.exe 5508 CefSharp.BrowserSubprocess.exe 5404 CefSharp.BrowserSubprocess.exe 5364 CefSharp.BrowserSubprocess.exe -
Loads dropped DLL 42 IoCs
pid Process 1320 tap-windows-9.21.2.exe 1320 tap-windows-9.21.2.exe 1320 tap-windows-9.21.2.exe 1320 tap-windows-9.21.2.exe 1320 tap-windows-9.21.2.exe 1320 tap-windows-9.21.2.exe 1320 tap-windows-9.21.2.exe 3644 Dashboard.exe 3644 Dashboard.exe 3644 Dashboard.exe 3644 Dashboard.exe 3644 Dashboard.exe 3644 Dashboard.exe 1320 CefSharp.BrowserSubprocess.exe 1320 CefSharp.BrowserSubprocess.exe 1320 CefSharp.BrowserSubprocess.exe 1320 CefSharp.BrowserSubprocess.exe 1320 CefSharp.BrowserSubprocess.exe 5496 CefSharp.BrowserSubprocess.exe 5496 CefSharp.BrowserSubprocess.exe 5496 CefSharp.BrowserSubprocess.exe 5496 CefSharp.BrowserSubprocess.exe 5496 CefSharp.BrowserSubprocess.exe 5508 CefSharp.BrowserSubprocess.exe 5508 CefSharp.BrowserSubprocess.exe 5508 CefSharp.BrowserSubprocess.exe 5508 CefSharp.BrowserSubprocess.exe 5508 CefSharp.BrowserSubprocess.exe 5404 CefSharp.BrowserSubprocess.exe 5404 CefSharp.BrowserSubprocess.exe 5404 CefSharp.BrowserSubprocess.exe 5404 CefSharp.BrowserSubprocess.exe 5404 CefSharp.BrowserSubprocess.exe 1320 CefSharp.BrowserSubprocess.exe 1320 CefSharp.BrowserSubprocess.exe 1320 CefSharp.BrowserSubprocess.exe 1320 CefSharp.BrowserSubprocess.exe 5364 CefSharp.BrowserSubprocess.exe 5364 CefSharp.BrowserSubprocess.exe 5364 CefSharp.BrowserSubprocess.exe 5364 CefSharp.BrowserSubprocess.exe 5364 CefSharp.BrowserSubprocess.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CyberGhost = "\"C:\\Program Files\\CyberGhost 8\\Dashboard.exe\" /autostart /min" Dashboard.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 30 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF tapinstall.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{a40bd26e-670c-d547-bac7-3c34dfbf993a}\SET1AD6.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{a40bd26e-670c-d547-bac7-3c34dfbf993a}\SET1B07.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{a40bd26e-670c-d547-bac7-3c34dfbf993a}\tap0901.sys DrvInst.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\wyUpdate.exe.log wyUpdate.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F Dashboard.Service.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E wyUpdate.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E wyUpdate.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D wyUpdate.exe File created C:\Windows\System32\DriverStore\Temp\{a40bd26e-670c-d547-bac7-3c34dfbf993a}\SET1AD6.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D wyUpdate.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\908D6E8C00F147F66A3BDC489B360B37 wyUpdate.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEACCDA8653DD8D7B2EA32F21D15D44F_46E4040B4A28D439FBFA7E9FC642442C Dashboard.Service.exe File created C:\Windows\System32\DriverStore\Temp\{a40bd26e-670c-d547-bac7-3c34dfbf993a}\SET1B06.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\908D6E8C00F147F66A3BDC489B360B37 wyUpdate.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{a40bd26e-670c-d547-bac7-3c34dfbf993a}\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{a40bd26e-670c-d547-bac7-3c34dfbf993a}\SET1B07.tmp DrvInst.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Temp\KAPE\Update\c320e2f8-1fdf-43f4-9d04-518b975c1cb3\a38f5d7d-e91e-4bb9-8955-3c01dd657224.zip 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB Dashboard.Service.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEACCDA8653DD8D7B2EA32F21D15D44F_46E4040B4A28D439FBFA7E9FC642442C Dashboard.Service.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{a40bd26e-670c-d547-bac7-3c34dfbf993a} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{a40bd26e-670c-d547-bac7-3c34dfbf993a}\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F Dashboard.Service.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB Dashboard.Service.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{a40bd26e-670c-d547-bac7-3c34dfbf993a}\SET1B06.tmp DrvInst.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\Default\Flags\64\TL.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\CyberGhost\Licenses\Hardcodet.NotifyIcon.Wpf.txt 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\Default\Flags\64\WF.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\PrivacyGuard\Data\Assets\Default\Flags\64\GB.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\Default\Backgrounds\background.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\Default\Flags\64\FR.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\Default\Flags\64\PF.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\Default\Flags\64\CL.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\Default\Flags\64\DG.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\AntiVirus\AntiVirus.dll.config 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\CyberGhost\Ghosties\[email protected] 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\CyberGhost\Logos\[email protected] 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\Default\Flags\64\PF.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\Default\Flags\64\ST.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Cef\116.0.23\x64\locales\ca.pak Dashboard.Service.exe File created C:\Program Files\CyberGhost 8\Applications\AntiVirus\System.Numerics.Vectors.dll 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\Default\Onboarding\NewDot.svg 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\Default\Flags\64\LU.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\CyberGhost\Licenses\TaskScheduler.txt 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\Default\Flags\64\PL.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\AntiVirus\LaunchDarkly.ClientSdk.dll 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\AntiVirus\LaunchDarkly.EventSource.dll 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Serilog.Formatting.Compact.Reader.dll 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\Default\Logos\privacyguardGray.svg 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\Default\Flags\64\CU.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\Default\Flags\64\IQ.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\Default\Flags\64\BV.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\Default\Flags\64\EC.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\Updater\System.Linq.Async.dll 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\AntiVirus\it\Microsoft.Win32.TaskScheduler.resources.dll 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\CyberGhost\Ghosties\ghostie_briefly.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\Default\Flags\64\NP.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\Default\Flags\64\TO.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\PrivacyGuard\Data\Assets\Default\Logos\shield+[email protected] 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\Default\Flags\64\AN.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File opened for modification C:\Program Files\CyberGhost 8\debug.log CefSharp.BrowserSubprocess.exe File created C:\Program Files\CyberGhost 8\Applications\PrivacyGuard\pt\PrivacyGuard.resources.dll 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\Updater\de\Updater.resources.dll 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\Default\Flags\64\OM.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\CyberGhost\Licenses\Microsoft.Management.Infrastructure.txt 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\Default\Flags\64\BD.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\OpenVPN\x64\tap-windows-9.21.2.exe 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\CyberGhost\Ghosties\ghostie_family_welcome_slim.svg 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\Default\Flags\64\AR.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\Default\Flags\64\CW.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\Default\Flags\64\SM.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\OpenVPN\x64\vcruntime140.dll 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\CyberGhost\Licenses\PropertyChanged.Fody.txt 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\OpenVPN\x86\openssl.exe 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\OpenVPN\x86\openssl.txt 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Assets\Default\Flags\64\GW.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\PrivacyGuard\Data\Assets\Default\Backgrounds\background.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\CyberGhost\DarkTheme\Logos\[email protected] 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\PrivacyGuard\Microsoft.Bcl.HashCode.dll 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Serilog.Formatting.Compact.dll 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\de\CyberGhost.VPN.resources.dll 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\ko\CyberGhost.VPN.resources.dll 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\Default\Flags\64\GF.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\Default\Flags\64\CO.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\Default\Flags\64\SB.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File opened for modification C:\Program Files\CyberGhost 8\debug.log CefSharp.BrowserSubprocess.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\fr\CyberGhost.VPN.resources.dll 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Applications\VPN\Data\Assets\Default\Flags\64\MF.png 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe File created C:\Program Files\CyberGhost 8\Data\Cef\116.0.23\x64\locales\sk.pak Dashboard.Service.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_96DPI_PIXEL Dashboard.exe Set value (int) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Dashboard.exe = "1" Dashboard.exe Key created \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_CLIPCHILDREN_OPTIMIZATION Dashboard.exe Key created \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT Dashboard.exe Set value (int) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_96DPI_PIXEL\Dashboard.exe = "1" Dashboard.exe Set value (int) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_CLIPCHILDREN_OPTIMIZATION\Dashboard.exe = "1" Dashboard.exe Set value (int) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT\Dashboard.exe = "0" Dashboard.exe Key created \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING Dashboard.exe Set value (int) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\Dashboard.exe = "1" Dashboard.exe Key created \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Dashboard.exe Key created \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_NINPUT_LEGACYMODE Dashboard.exe Key created \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Dashboard.exe Set value (int) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Dashboard.exe = "11000" Dashboard.exe Set value (int) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_NINPUT_LEGACYMODE\Dashboard.exe = "0" Dashboard.exe Set value (int) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Dashboard.exe = "0" Dashboard.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPublisher Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPublisher\CRLs Dashboard.Service.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix wyUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPublisher Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust Dashboard.Service.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates Dashboard.Service.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPublisher\Certificates Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs Dashboard.Service.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" wyUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" wyUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates Dashboard.Service.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPublisher\CRLs Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates Dashboard.Service.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Dashboard.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 CyberGhostVPNSetup (1).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 CyberGhostVPNSetup (1).exe Key created \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\D89E3BD43D5D909B47A18977AA9D5CE36CEE184C CyberGhostVPNSetup (1).exe Set value (data) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\D89E3BD43D5D909B47A18977AA9D5CE36CEE184C\Blob = 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 CyberGhostVPNSetup (1).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 CyberGhostVPNSetup (1).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 CyberGhostVPNSetup (1).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 CyberGhostVPNSetup (1).exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5072 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe 5072 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe 5072 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe 5072 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe 5072 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 4984 Dashboard.Service.exe 1320 CefSharp.BrowserSubprocess.exe 1320 CefSharp.BrowserSubprocess.exe 5508 CefSharp.BrowserSubprocess.exe 5508 CefSharp.BrowserSubprocess.exe 5496 CefSharp.BrowserSubprocess.exe 5496 CefSharp.BrowserSubprocess.exe -
Suspicious behavior: LoadsDriver 8 IoCs
pid Process 676 Process not Found 676 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 676 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1948 CyberGhostVPNSetup (1).exe Token: SeSecurityPrivilege 1948 CyberGhostVPNSetup (1).exe Token: SeDebugPrivilege 5072 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe Token: SeSecurityPrivilege 5072 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe Token: SeDebugPrivilege 3560 Dashboard.exe Token: SeDebugPrivilege 4984 Dashboard.Service.exe Token: SeDebugPrivilege 1136 wyUpdate.exe Token: SeAuditPrivilege 3928 svchost.exe Token: SeSecurityPrivilege 3928 svchost.exe Token: SeDebugPrivilege 3644 Dashboard.exe Token: SeLoadDriverPrivilege 4376 tapinstall.exe Token: SeRestorePrivilege 4076 DrvInst.exe Token: SeBackupPrivilege 4076 DrvInst.exe Token: SeLoadDriverPrivilege 4076 DrvInst.exe Token: SeLoadDriverPrivilege 4076 DrvInst.exe Token: SeLoadDriverPrivilege 4076 DrvInst.exe Token: SeDebugPrivilege 1320 CefSharp.BrowserSubprocess.exe Token: SeDebugPrivilege 5508 CefSharp.BrowserSubprocess.exe Token: SeDebugPrivilege 5496 CefSharp.BrowserSubprocess.exe Token: SeDebugPrivilege 5404 CefSharp.BrowserSubprocess.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeDebugPrivilege 5364 CefSharp.BrowserSubprocess.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe Token: SeCreatePagefilePrivilege 3644 Dashboard.exe Token: SeShutdownPrivilege 3644 Dashboard.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 3644 Dashboard.exe 3644 Dashboard.exe 3644 Dashboard.exe 3644 Dashboard.exe 3888 firefox.exe 3888 firefox.exe 3888 firefox.exe 3888 firefox.exe 3888 firefox.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 3644 Dashboard.exe 3644 Dashboard.exe 3644 Dashboard.exe 3644 Dashboard.exe 3888 firefox.exe 3888 firefox.exe 3888 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3888 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1948 wrote to memory of 5072 1948 CyberGhostVPNSetup (1).exe 89 PID 1948 wrote to memory of 5072 1948 CyberGhostVPNSetup (1).exe 89 PID 5072 wrote to memory of 3560 5072 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe 94 PID 5072 wrote to memory of 3560 5072 7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe 94 PID 3560 wrote to memory of 4272 3560 Dashboard.exe 96 PID 3560 wrote to memory of 4272 3560 Dashboard.exe 96 PID 4984 wrote to memory of 1136 4984 Dashboard.Service.exe 98 PID 4984 wrote to memory of 1136 4984 Dashboard.Service.exe 98 PID 3560 wrote to memory of 1320 3560 Dashboard.exe 104 PID 3560 wrote to memory of 1320 3560 Dashboard.exe 104 PID 3560 wrote to memory of 1320 3560 Dashboard.exe 104 PID 1320 wrote to memory of 4176 1320 tap-windows-9.21.2.exe 107 PID 1320 wrote to memory of 4176 1320 tap-windows-9.21.2.exe 107 PID 1320 wrote to memory of 4376 1320 tap-windows-9.21.2.exe 109 PID 1320 wrote to memory of 4376 1320 tap-windows-9.21.2.exe 109 PID 3928 wrote to memory of 4224 3928 svchost.exe 112 PID 3928 wrote to memory of 4224 3928 svchost.exe 112 PID 4224 wrote to memory of 4284 4224 DrvInst.exe 113 PID 4224 wrote to memory of 4284 4224 DrvInst.exe 113 PID 4984 wrote to memory of 4648 4984 Dashboard.Service.exe 118 PID 4984 wrote to memory of 4648 4984 Dashboard.Service.exe 118 PID 4984 wrote to memory of 4648 4984 Dashboard.Service.exe 118 PID 4984 wrote to memory of 2404 4984 Dashboard.Service.exe 122 PID 4984 wrote to memory of 2404 4984 Dashboard.Service.exe 122 PID 4984 wrote to memory of 2404 4984 Dashboard.Service.exe 122 PID 4984 wrote to memory of 3944 4984 Dashboard.Service.exe 125 PID 4984 wrote to memory of 3944 4984 Dashboard.Service.exe 125 PID 4984 wrote to memory of 3944 4984 Dashboard.Service.exe 125 PID 4984 wrote to memory of 4016 4984 Dashboard.Service.exe 127 PID 4984 wrote to memory of 4016 4984 Dashboard.Service.exe 127 PID 3928 wrote to memory of 4076 3928 svchost.exe 129 PID 3928 wrote to memory of 4076 3928 svchost.exe 129 PID 3644 wrote to memory of 1320 3644 Dashboard.exe 131 PID 3644 wrote to memory of 1320 3644 Dashboard.exe 131 PID 3644 wrote to memory of 5496 3644 Dashboard.exe 135 PID 3644 wrote to memory of 5496 3644 Dashboard.exe 135 PID 3644 wrote to memory of 5508 3644 Dashboard.exe 134 PID 3644 wrote to memory of 5508 3644 Dashboard.exe 134 PID 3644 wrote to memory of 5364 3644 Dashboard.exe 133 PID 3644 wrote to memory of 5364 3644 Dashboard.exe 133 PID 3644 wrote to memory of 5404 3644 Dashboard.exe 132 PID 3644 wrote to memory of 5404 3644 Dashboard.exe 132 PID 3480 wrote to memory of 3888 3480 firefox.exe 137 PID 3480 wrote to memory of 3888 3480 firefox.exe 137 PID 3480 wrote to memory of 3888 3480 firefox.exe 137 PID 3480 wrote to memory of 3888 3480 firefox.exe 137 PID 3480 wrote to memory of 3888 3480 firefox.exe 137 PID 3480 wrote to memory of 3888 3480 firefox.exe 137 PID 3480 wrote to memory of 3888 3480 firefox.exe 137 PID 3480 wrote to memory of 3888 3480 firefox.exe 137 PID 3480 wrote to memory of 3888 3480 firefox.exe 137 PID 3480 wrote to memory of 3888 3480 firefox.exe 137 PID 3480 wrote to memory of 3888 3480 firefox.exe 137 PID 3888 wrote to memory of 4228 3888 firefox.exe 138 PID 3888 wrote to memory of 4228 3888 firefox.exe 138 PID 3888 wrote to memory of 1484 3888 firefox.exe 139 PID 3888 wrote to memory of 1484 3888 firefox.exe 139 PID 3888 wrote to memory of 1484 3888 firefox.exe 139 PID 3888 wrote to memory of 1484 3888 firefox.exe 139 PID 3888 wrote to memory of 1484 3888 firefox.exe 139 PID 3888 wrote to memory of 1484 3888 firefox.exe 139 PID 3888 wrote to memory of 1484 3888 firefox.exe 139 PID 3888 wrote to memory of 1484 3888 firefox.exe 139 PID 3888 wrote to memory of 1484 3888 firefox.exe 139 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CyberGhostVPNSetup (1).exe"C:\Users\Admin\AppData\Local\Temp\CyberGhostVPNSetup (1).exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files\caba9c68-f7b6-40ce-b3a3-30ab74513f45\7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe"C:\Program Files\caba9c68-f7b6-40ce-b3a3-30ab74513f45\7cebc91a-50eb-4bc5-953f-e3f4d48bf272.exe" "C:\Users\Admin\AppData\Local\Temp\CyberGhostVPNSetup (1).exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files\CyberGhost 8\Dashboard.exe"C:\Program Files\CyberGhost 8\Dashboard.exe" /install3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Program Files\CyberGhost 8\Dashboard.Service.exe"C:\Program Files\CyberGhost 8\Dashboard.Service.exe" --install4⤵
- Executes dropped EXE
PID:4272
-
-
C:\Program Files\CyberGhost 8\Applications\VPN\Data\OpenVPN\x64\tap-windows-9.21.2.exe"C:\Program Files\CyberGhost 8\Applications\VPN\Data\OpenVPN\x64\tap-windows-9.21.2.exe" /S4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files\TAP-Windows\bin\tapinstall.exe"C:\Program Files\TAP-Windows\bin\tapinstall.exe" hwids tap09015⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4176
-
-
C:\Program Files\TAP-Windows\bin\tapinstall.exe"C:\Program Files\TAP-Windows\bin\tapinstall.exe" install "C:\Program Files\TAP-Windows\driver\OemVista.inf" tap09015⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
-
-
-
C:\Program Files\CyberGhost 8\Dashboard.Service.exe"C:\Program Files\CyberGhost 8\Dashboard.Service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files\CyberGhost 8\wyUpdate.exe"C:\Program Files\CyberGhost 8\wyUpdate.exe" /justcheck /quickcheck /noerr -server="https://download.cyberghostvpn.com/windows/updates/8/nt/wyserver.wys"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Program Files\CyberGhost 8\Applications\VPN\Data\Tools\nvspbind.exe"C:\Program Files\CyberGhost 8\Applications\VPN\Data\Tools\nvspbind.exe" "TAP-Windows Adapter" /d *2⤵
- Executes dropped EXE
PID:4648
-
-
C:\Program Files\CyberGhost 8\Applications\VPN\Data\Tools\nvspbind.exe"C:\Program Files\CyberGhost 8\Applications\VPN\Data\Tools\nvspbind.exe" "TAP-Windows Adapter" /e ms_tcpip2⤵
- Executes dropped EXE
PID:2404
-
-
C:\Program Files\CyberGhost 8\Applications\VPN\Data\Tools\nvspbind.exe"C:\Program Files\CyberGhost 8\Applications\VPN\Data\Tools\nvspbind.exe" "TAP-Windows Adapter" /e ms_tcpip62⤵
- Executes dropped EXE
PID:3944
-
-
C:\Windows\system32\netsh.exe"netsh" interface ipv6 set teredo disable2⤵PID:4016
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{6e5f89a3-708b-114a-8b68-26be3443f754}\oemvista.inf" "9" "4d14a44ff" "0000000000000148" "WinSta0\Default" "0000000000000158" "208" "c:\program files\tap-windows\driver"2⤵
- Manipulates Digital Signatures
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{e86b83f7-f6cd-bf43-9d0a-bc59e7a3bc6f} Global\{4ce572d9-1ad0-9f4c-bf4e-2a48ec13e67f} C:\Windows\System32\DriverStore\Temp\{a40bd26e-670c-d547-bac7-3c34dfbf993a}\oemvista.inf C:\Windows\System32\DriverStore\Temp\{a40bd26e-670c-d547-bac7-3c34dfbf993a}\tap0901.cat3⤵
- Modifies system certificate store
PID:4284
-
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000148"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:672
-
C:\Program Files\CyberGhost 8\Dashboard.exe"C:\Program Files\CyberGhost 8\Dashboard.exe" /firststart1⤵
- Manipulates Digital Signatures
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Program Files\CyberGhost 8\Data\Cef\116.0.23\x64\CefSharp.BrowserSubprocess.exe"C:\Program Files\CyberGhost 8\Data\Cef\116.0.23\x64\CefSharp.BrowserSubprocess.exe" --type=gpu-process --no-sandbox --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CyberGhost" --cefsharpexitsub --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Program Files\CyberGhost 8\debug.log" --mojo-platform-channel-handle=5020 --field-trial-handle=5528,i,3700070062129455843,12962906432620753668,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion /prefetch:2 --host-process-id=36442⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
C:\Program Files\CyberGhost 8\Data\Cef\116.0.23\x64\CefSharp.BrowserSubprocess.exe"C:\Program Files\CyberGhost 8\Data\Cef\116.0.23\x64\CefSharp.BrowserSubprocess.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\CyberGhost" --cefsharpexitsub --no-sandbox --log-file="C:\Program Files\CyberGhost 8\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=6892 --field-trial-handle=5528,i,3700070062129455843,12962906432620753668,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion --host-process-id=3644 /prefetch:12⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:5404
-
-
C:\Program Files\CyberGhost 8\Data\Cef\116.0.23\x64\CefSharp.BrowserSubprocess.exe"C:\Program Files\CyberGhost 8\Data\Cef\116.0.23\x64\CefSharp.BrowserSubprocess.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\CyberGhost" --cefsharpexitsub --first-renderer-process --no-sandbox --log-file="C:\Program Files\CyberGhost 8\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=6884 --field-trial-handle=5528,i,3700070062129455843,12962906432620753668,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion --host-process-id=3644 /prefetch:12⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5364
-
-
C:\Program Files\CyberGhost 8\Data\Cef\116.0.23\x64\CefSharp.BrowserSubprocess.exe"C:\Program Files\CyberGhost 8\Data\Cef\116.0.23\x64\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CyberGhost" --cefsharpexitsub --log-file="C:\Program Files\CyberGhost 8\debug.log" --mojo-platform-channel-handle=6500 --field-trial-handle=5528,i,3700070062129455843,12962906432620753668,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion /prefetch:8 --host-process-id=36442⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5508
-
-
C:\Program Files\CyberGhost 8\Data\Cef\116.0.23\x64\CefSharp.BrowserSubprocess.exe"C:\Program Files\CyberGhost 8\Data\Cef\116.0.23\x64\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CyberGhost" --cefsharpexitsub --log-file="C:\Program Files\CyberGhost 8\debug.log" --mojo-platform-channel-handle=6484 --field-trial-handle=5528,i,3700070062129455843,12962906432620753668,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion /prefetch:8 --host-process-id=36442⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5496
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3888.0.725251219\1505844178" -parentBuildID 20221007134813 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 20808 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {db8d5c59-adb4-4c70-8233-762bee1fd46d} 3888 "\\.\pipe\gecko-crash-server-pipe.3888" 1992 224461dda58 gpu3⤵PID:4228
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3888.1.1825924198\1011016347" -parentBuildID 20221007134813 -prefsHandle 2380 -prefMapHandle 2376 -prefsLen 20844 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f620bf2-f61f-41bb-8a4f-5579f5691d55} 3888 "\\.\pipe\gecko-crash-server-pipe.3888" 2392 22445931a58 socket3⤵PID:1484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3888.2.1067768280\1782320341" -childID 1 -isForBrowser -prefsHandle 3004 -prefMapHandle 3020 -prefsLen 20947 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2cece814-7d5a-4cc1-a641-14be40ec9aa2} 3888 "\\.\pipe\gecko-crash-server-pipe.3888" 3056 22449cc7558 tab3⤵PID:5940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3888.3.63459766\1835060955" -childID 2 -isForBrowser -prefsHandle 3576 -prefMapHandle 3564 -prefsLen 26126 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d9ebd49-e44d-40fd-ac6b-eafe6ce2fd18} 3888 "\\.\pipe\gecko-crash-server-pipe.3888" 3588 2244a1c4158 tab3⤵PID:1240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3888.4.1861129418\901138081" -childID 3 -isForBrowser -prefsHandle 4628 -prefMapHandle 4620 -prefsLen 26185 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e5fae124-b9cf-4c99-ba66-d9d5bc9d0f8a} 3888 "\\.\pipe\gecko-crash-server-pipe.3888" 4640 22449fbca58 tab3⤵PID:4904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3888.5.100236403\603155164" -childID 4 -isForBrowser -prefsHandle 5020 -prefMapHandle 5052 -prefsLen 26185 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {38b91412-ac1c-4998-827b-267f4233fb1a} 3888 "\\.\pipe\gecko-crash-server-pipe.3888" 5032 2244b246258 tab3⤵PID:4644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3888.7.1790814875\1346728472" -childID 6 -isForBrowser -prefsHandle 5356 -prefMapHandle 5360 -prefsLen 26185 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {49e9dcee-d159-410d-9ee9-ceea257aa186} 3888 "\\.\pipe\gecko-crash-server-pipe.3888" 5348 2244c2c1d58 tab3⤵PID:1536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3888.6.1879260763\1584915562" -childID 5 -isForBrowser -prefsHandle 5164 -prefMapHandle 5168 -prefsLen 26185 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b58b4696-2ba8-4786-a170-77e7fff374d4} 3888 "\\.\pipe\gecko-crash-server-pipe.3888" 5156 2244c2c2358 tab3⤵PID:1212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3888.8.1460896703\1166063332" -childID 7 -isForBrowser -prefsHandle 3044 -prefMapHandle 2900 -prefsLen 26520 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0716e760-2715-4a0e-b8fa-2109c4f8fa8f} 3888 "\\.\pipe\gecko-crash-server-pipe.3888" 5708 22448e31458 tab3⤵PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
3Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193KB
MD51d47dbf77d3d345e7ef441f4abcf2158
SHA130136eea525aaf9a15822e1021828cd1d545b5d6
SHA256f573945da393beec528095f18c9d9c0e287b151ab1082d24a5d8e16cee9478e3
SHA512cb0042bbfec132f0ae38bd85c126bbd464894f85abcf1256821db8ba1cc4612a453345028ec088da06d9704179a934d59eaa6256401532e18487dd1a0e291ad9
-
Filesize
342KB
MD5df87f21564ab8bb632d13623dca1205c
SHA19620cbf164c6b27cdc5b2b467556efc23d46519d
SHA256e59500d03ee69fb901799e5a6617977a4ba91c09630944af357046ecd78dba80
SHA5126bbf3d7c32489aedfa5ecf9947608f9946303b0034146dc3bc93811aaa28ee06d83dba2da2c71d064f077ed1aec04b285c5975e263fc3ec56ac7258de927b52f
-
Filesize
4KB
MD50bcd519bc47d8f289ba01fb8e37c1aa5
SHA1d10057b61b65268f17162d135b6d67105fcf3d3d
SHA25698b63c9fa091c300e73ce1369f010f4cdc43d24b8dc45a1ad7e00d212a49fab5
SHA512f73cfe41c1f96cf8169c7641d47185f60fa469c9d89dd7d3ab5ddb44980c6c9ab397a81edf3c14de1f1ef7f3ac903ca2a672fda073f5abab5ebe432f653f0cba
-
Filesize
46KB
MD586edfc6eafd94aedc9905a6d26015607
SHA12c1a2a8d9bfc70f983b694f00c1d07b72c1c3bf7
SHA25663234e049f27819da83b4ab976b1b4c5489db3cea3f7308907db7d690ac53480
SHA51264eaca865b2bee670838691f6b1346e783d5d754a7c1a13fbec57017bf4cae57bde826b8e8583f33f26a162cca2a8ab30e2d03de9b6d7f4545b42fac6c41b9a0
-
Filesize
45KB
MD50226cea5974a04df09f1d261c38c91c6
SHA11b62d2cbdb5e2e1a22175d301a1be510aa5577fb
SHA25641d4bedf1c98bd8b567237995c144cbf7f59639b7ff2a519e08fe1a1c0c85738
SHA512b746000218cabd5c12a6b2f1f28a2a85d47cfae889e8035abe44c7f7a6a833431df34a0041d8101173a819fa1e82de61fd4f006daac7b5e0cb0feaa9c1ba8d63
-
Filesize
46KB
MD5ebabce81506e9a4d233e375c07613519
SHA1ff8c027e617862c09aea9160d4ff21a6d0315fd1
SHA25615f02ac78058f657ae85a21019b56852018438d3f8e0234da3eab9007d1d3913
SHA512cb2d09ff9d80cc1a432fe0ced82f7aed77fbe1a7846684575efcd2a3dbfed0f2043bf6d14a13133478f2d8b741fac4af5d09d9cd2fed3639a866cd19f6299508
-
Filesize
44KB
MD5ef14218721c86532f0177dd80739a5c1
SHA15f5fb9b6c89d62aaae3063434ab4ead73b1be5f3
SHA2562fb535cdfab3eb22fdeaa6294c7463c5cd8aed9065f88f2edced83aa359918f6
SHA512d0f04a783576d68814373ea30939bcff3278b576d4291aa406e5c591cfc99b44555d52e91dfb1cc65de7756411935caa4cca3c3ba3a653a4165acc716e4e467d
-
Filesize
46KB
MD5d458e0a94650c093eaa270bff198b42e
SHA1da6e9c4e3c848f36996af7258a768228f87f75fa
SHA2569d4d91752b4e04e00f973e9dce03e856f95841295cc18e76e529c81cf4235a63
SHA512a1d95d326f7b1b361d37eb780f24755c59330632dd3487367f4c5ecbac7b6b15f7340d3e7b9b66e8220b02f39bfa6a001608d5826008819445870dcbc90f6149
-
Filesize
46KB
MD59b89aad95d0ea9b52174561118b3c021
SHA111df518e82b7b2d6a620068cd3e3d4b223559bd8
SHA25664c974544c35f6c2072cd65ca4c17a8d986bd17c626b0e5e563c92a61661561c
SHA512c7a9b62bbb1adb48c5101108ba7cbc901efcd456a8510b459bfa277a490a5c65841a7f0cd73bd827533aa21aff81a50a64c14100428ab7d5eca816061616740c
-
Filesize
45KB
MD545ee7dd8686f39f948c99773b5b0a3e2
SHA16c4df0185053c270116eb5bd5d6f5bd3870c34ad
SHA256b57d99098128edb118316f2f82a68f1a9e186e874274f739efc0e57de239b142
SHA51272d90361a2bf92fa91b47a84004d48820fb18051c6927c40aee79be3f8c9eea6c547a4d594b49c11b0f0943e2d5cfbd9d6c8e0132f4b5bc6e6a4ad474b33eaad
-
Filesize
46KB
MD50c0f38ec7e774ef9eac5fdedb7701dc8
SHA158032be0ada405e4e6f33e12534713479a8afa1d
SHA256c85d1beee7f2ea0cf81672f5ce6717585dc4f2ba735d8e2b7bf8441b5a7eab2f
SHA5129d68fe863574b1ff07aba68231fdc00c13055770d6ab52f588470ec56fca8cca040343776d69315f0aaeea3c5d4435a29f5290879e8567967064acd797245ee8
-
Filesize
53KB
MD59b00d766618c9efc3808241d4927f2fe
SHA1b9a2a076ae6f2cbd61fe593e95f72742ce3ff658
SHA25616d7b9ae772a077e9360ecbecce9cd42b197f1ddc2d24f0156623f50aa24f130
SHA5125fa7edcf19c4846d447f3fee02ccd23ae152d0c5226da06dea42698bb83fde4f1c4d43b902fad061890ac033e0d74b05d1fac4f92eea45474ce7d5e9cbf985ff
-
Filesize
720KB
MD5e37f97b1c4d1479b6921567930ba57c2
SHA15164aca9abdfad16aade5c0425de3ed971b49609
SHA256e6d7f2d7440e3c370a5cd1a6c03ac1aa5dcfa59022ee08868df6ca40d85cb5da
SHA512bb7a9431672136daaa3925fa84466941294b3e986f8de8e2bfdb25d968df736ad424b962b249e35f6a03447d8baedb8b9e55c726ab0c7884d7043578ee0d28c4
-
Filesize
96KB
MD52f08601e2e1cdcd3e18309a6fc4669ba
SHA12eabca2d72a7cadba7186c7cdce14e947a95bb77
SHA25627ae1d07d4e1af4c647615abb880c81509d87fb03881ab4cafddeb67a6ec79f1
SHA5127ab7a6e02e590c465d7b48ec6da9d03c5653c043db34d157a05113dea03ce84a41b054264d15751a93a43355c23b20ba48d2dacfc0c83e2575cb903c3b910fe2
-
Filesize
116KB
MD517a5a921354fdfa15bd67344722722ec
SHA1d1ff2671a3b0748e4a740e9e9fae99c10210ffa0
SHA25638bbcf18ac3e463b974442b1c7b79aab7c3ac65eedf02b3ff1763869c8e6fc28
SHA512b17211dd565b784e0cea5ebcd4cd683b00476b1857f17c23d53b4e65e01a331d1a3928bbd842337d68624fbd4f71249ab4b45f82f7a4528c8f187e1a379eb3b1
-
Filesize
165KB
MD569fae3d77d7cd48834dc2280f6b639f7
SHA1722422b30325e402a8de9d1e7cd92d4e76ec3f7a
SHA2562241185eac330e5a7ac405872fbc8717118ee34cf152e785d3dfcaa3f8f2b5cb
SHA512e81f5a968cc8988a45ff47b2d6fc5b4ff479aa1029579165af8070a6d92398aa4a7a4de72fdd5c11f5f48e1842fe7a964b61ba29e4b4d9ed0973b93ec5a9e06d
-
Filesize
788KB
MD5cbb8a2ed75fcfde85dead7a5c5d89cc8
SHA179a55a274f85bb24ce60cd9f5823139a37fb6745
SHA256128d4cafe1120f43ff2568f68bd70dca82a0c29d4981aa18835bb4b950c79377
SHA5121f476652154d0390b9ceb7421988a1614b81db982e95e476e1299b33fe8d0651ec3e4501ea7ae1fbb80e9584d065ab4999641c5df71d886ca750abb7b1dad16a
-
Filesize
139KB
MD58c3bae7a8e1ba418ecced29696fee102
SHA190da6aab03886ad1ebf45ef2373541d04a6e28e8
SHA256db46ca5c791fda95bf37657c5b3b9626762045a7cd0b2378a2108bc6ba6e4e79
SHA51282b31913d8d775f2b4fe051aba5ae4923ec4df19dba357767b69a5eaedc487bfd61ff917796f5d2a9cd670dd7e74cb21bb3f1fe66d54e5744e773fc87acdf8b1
-
Filesize
136B
MD530bea326e5024b6a9b0136a000403d75
SHA10b6e65e87f670af6fbc4a28171aedf4db4daa0a5
SHA256e58c331133d8f780738133e2aa966c8bcb5b17a07c860a990bc401afd6382e1a
SHA51243362cef837497bc264a46dd70a67c3129d854cf7a9866bee4a33a4f62acb833ba96b4720441c6d6db56301c9b49f8c29f1465363b5c057ec6e16a213f06caac
-
Filesize
114B
MD542c4c4ecb4448888421a7c1180b4cd08
SHA1bb515751cc2f7616fe41929d2577fc965c69b51a
SHA2561ef1946b6e352f2d5a4b003367b968374d6af122c5b645c6b4d9577645fb819d
SHA5120e8d4b1c124b86d696e979d9b3aae007c80258672202f66fe3d2ea72e64d205f8dace52333d6749feab74abbd090173f6811490e9b09c3a06682f58b14e5fcbf
-
Filesize
425KB
MD53be0857aa4ff5712c36b512ea6ba7a09
SHA1b0a0ff99bff0d1d9e749e45c1dd39e7add8a98b3
SHA256c2ed092037a5fc4fd6b67bbc8c8c6a71d7fc63f2450f46cfe644dd89daf74c00
SHA512bf4c9bee180f558128cfe9f7bfef258a262ea64754b33d401967f60206e38e1f8510cb9e81a4e3347a422acb16a5fefc3f5014ee2039f1d219bd61d3030bec2e
-
Filesize
356KB
MD5f0aa0b98026e7a4d1b74eafa4e181e31
SHA120c7b4631e49b0ea13f60b877643c9834c92336f
SHA2567d4ac8f6c11d7dd24bae1d6f8a42cb358079dba87794f086ab507172ca1af1de
SHA512f5a6dccf469cda2e2f8d97a8e96b56638d631e02014af94b2383d4c191090f91cd4c84fb98b8b8814d34013a132df7174a11e37ea2a865c524c1f06d633b8556
-
Filesize
56KB
MD508417264ca26039845fd3fffdd650ab8
SHA1bd29ea42e281030c86561ccbd180fa626090214b
SHA2561b8b93bfe34767928e85181dc9401507db2f3cf42791bb817c918eae7de03e42
SHA51226f3d31e912863f8c5309b1d7d2d996eae6af014a7bbe04e8e04ad5fe93601bc4603e5f56fc2a1295ca0831c135f16050e6fb9f8fbb3bb3a36c2138658f39899
-
Filesize
629KB
MD56988f29e2cb57e5b24e32d102b05bb6d
SHA1aaadfc8ed80a5bc1c56072d0d1cb85cb37269ba4
SHA2568f3dcb5f7da46aae2b7fe6aa7fee7bd6042176860790b872efdeecb065016fdb
SHA5125fb5a1749fcc93b2c27ff6d103e67353116022407be487396e678bc3049957c967a7574a733913fbcc44eb31ae37a94cd96c4518ba1f57b4d812ba205da0f539
-
Filesize
207KB
MD578c1d20ec032c5cc89219266113dab31
SHA11358e303689afe0d9b7e8a6739fe7cc951617b0e
SHA256b2f138171e8cf773827ced5d8e98bf485001b4845c8aa2aeb260baae7021aa55
SHA512d7bed0ee0b559ef035d5e3062b6837a8c6ac063ee32e1bdb9923b61e473b8aa4ac30b77325feda77e6b96cd6fe0d9233da7b961ac6c50b7f507ef2d0df1731ce
-
Filesize
200KB
MD547a9db2eb893ee7c7d79967f93908a31
SHA1333f4971acc2bfe4a29bc5a4fcd1f91d37151d0b
SHA25607bfbf3bfbab3d10347392fa483cabcc473208b468a05470cfa38e208d19943b
SHA512dabe5a8b8f097fbefece2424f4f4aed7284b472d309ed23cbdf504ede99244d849494974a5b8c15b56c1904bd604469f4e18fd4b3adfa2d656594dc52b6533b3
-
Filesize
157KB
MD50da5d9da5696e58a2c87c8f1efce88c6
SHA130b351da85dec8d39aca6b15b7ef9374302fb214
SHA25604b066bf5e3ba15f6d33d60de5ff483d18734572cdcb9bbee11a70734d10d918
SHA51275e41af6f9e26c20069aa119c572d3f11195d609ae91b3929178dc74565f0a3b397a848178d36172f31a0565940bb241790f28a3a8ea6f8a369203d8c2db351e
-
Filesize
31KB
MD5801f36bad1dd95b10c12b7e23c5fce4c
SHA1a9c0bc7523505270cff377cf861b7d157184119f
SHA256346ae439d1e023d17d3e812d8b20fb624aa81d46c68ae7851b8040ec3d89065a
SHA5126542b33ba8a6ab40bdf17f1deb4cd0e5fcb826dcc061bb772423c8ef0a5da2d21fb9cb4a26ab23877c9660790031490eb27892a20fcf2e88030353d656d68fc6
-
Filesize
439B
MD57f45be626acd834af4bc05aec26a70b7
SHA1e4595250912835dc7c92fa0a09b62e03eba7b9a3
SHA2569dcc45001296eb80ac59c4291839a9bed4910bfe818751cdd73ba998c35bf0bd
SHA5123d693476a0eef6cc6f493443dd320cc16db8858844f4332d2388df55860d3ae0c8e685563f2b6c6533cb25019b90df5645136f50eb783a0a654cf3e5ec00cdc2
-
Filesize
705B
MD593db14a63444f0640443ef75ef8e0276
SHA193789457f75725d2af59d0ad214c65a1db9038df
SHA2564f233323f8bd797a8f1a1f7b42fd59b7b2cb4e5b8ef5c6e94a8bf85020e8543e
SHA51245f469c0f7cf7f016a6eee01251407a783f1f4845bf6596e4e54c73e7cc460e8827b701760a676c47e4d75cf12c65a5649123304f175f7803327e2fe84f6d549
-
Filesize
70KB
MD553b0086d3cec791b454d7fddd0511358
SHA1bcfdeaec52819a7b9797d9be607e2a36d799db3d
SHA256254f4948fb7088a19d3b17bc4d7aaaf2479c9bd0ee3c76e846e0853298234347
SHA51286ee8b202cc0f94e1799cd45aed3beb81828bfe9c0fe782aafbf2fd75575510ea8257895709848d5c7116a59e8f249873ea63f6642b0a9571a4969276a02d492
-
Filesize
70KB
MD553b0086d3cec791b454d7fddd0511358
SHA1bcfdeaec52819a7b9797d9be607e2a36d799db3d
SHA256254f4948fb7088a19d3b17bc4d7aaaf2479c9bd0ee3c76e846e0853298234347
SHA51286ee8b202cc0f94e1799cd45aed3beb81828bfe9c0fe782aafbf2fd75575510ea8257895709848d5c7116a59e8f249873ea63f6642b0a9571a4969276a02d492
-
Filesize
70KB
MD553b0086d3cec791b454d7fddd0511358
SHA1bcfdeaec52819a7b9797d9be607e2a36d799db3d
SHA256254f4948fb7088a19d3b17bc4d7aaaf2479c9bd0ee3c76e846e0853298234347
SHA51286ee8b202cc0f94e1799cd45aed3beb81828bfe9c0fe782aafbf2fd75575510ea8257895709848d5c7116a59e8f249873ea63f6642b0a9571a4969276a02d492
-
Filesize
3KB
MD5594b609d1b0b91f92ed36f59bf431555
SHA1ab5a419d98f2d3abfa602513bc1f43615932c1fc
SHA256478004e9145ef9db15781ce66a4334c76347cab3da033e1be8831bd4bedd484e
SHA5128efb48c17461df3bc765889ff9bfa6a85a325e285119aad76dc4abd2320b9d25bb8453a254aa0f20a76a4029087eafbfb9e61b56d8d8a66fee02b8eb1a862b12
-
Filesize
1.3MB
MD512ad5a5fd7399ff201ea7782ab5097cf
SHA1e39d26693ac1e213fe52cc330495d17968b046d8
SHA2560d4da18458b12ec16812aea11317ff33a451b7146b8d444976f30ba6c396e9a8
SHA5122c7c5a7f53088efe47377bc0d6a73c7f442e8cc68912ece4f6796eb727fff8cdfce9d0f31bfd3b84f295db2c8ea62762dc4a3413efebf3c477fe7165bedee673
-
Filesize
1.3MB
MD512ad5a5fd7399ff201ea7782ab5097cf
SHA1e39d26693ac1e213fe52cc330495d17968b046d8
SHA2560d4da18458b12ec16812aea11317ff33a451b7146b8d444976f30ba6c396e9a8
SHA5122c7c5a7f53088efe47377bc0d6a73c7f442e8cc68912ece4f6796eb727fff8cdfce9d0f31bfd3b84f295db2c8ea62762dc4a3413efebf3c477fe7165bedee673
-
Filesize
1.3MB
MD512ad5a5fd7399ff201ea7782ab5097cf
SHA1e39d26693ac1e213fe52cc330495d17968b046d8
SHA2560d4da18458b12ec16812aea11317ff33a451b7146b8d444976f30ba6c396e9a8
SHA5122c7c5a7f53088efe47377bc0d6a73c7f442e8cc68912ece4f6796eb727fff8cdfce9d0f31bfd3b84f295db2c8ea62762dc4a3413efebf3c477fe7165bedee673
-
Filesize
3KB
MD5dbad1342429edce620d2e96b1e44e179
SHA138ae22086e612f3b8f5e1f48d725799bebaa71c9
SHA2560a44b47433ae1cfd272368b9bfc8e963aae80a833cf094a2a8136879c41cd1f1
SHA51289965204168dc28556838d9cc392f2aa10eed06f60aeda0a3a189b34a01bb6c9236a63f01fba67093ba3f4f092677507f9dfeaa38fe039aec3368deb2ae9508f
-
Filesize
23KB
MD553dbf7a94ecc332323769777c457c30f
SHA101a617f202edc2ac4ba4599cfce17bbdef05586e
SHA25611210062a90ede187be30ab6af79afebd32090ed0eca0d47cd6036e71e02ca24
SHA512758952b75e8e9ccb4a3f4bd4a6edb656a162f52c969c8d3091bb1a6cdc20d0ab060964a6407fb036479d5c86e14c5d3dded3e0ed5f3f74af42f6c0107504016a
-
Filesize
593KB
MD5a50b02c722c8ee1b659c821bf21b0481
SHA1071e8f90ec31ea6ad9911f0fe43830e3529b0e79
SHA256e97a3fa12f003b525d8bcbec2e5429b22af952fcf21594c15c7757e514ad7fa4
SHA5120009b11ae8fef18466e28cc2ed40fc0292c564e826e8696f85d30a074f185949a76abad163629a21813dc951e9660f7f17fb2a5caf204bd994e777f21a367e0d
-
Filesize
694KB
MD50d5360d673585857548c294452e3be1e
SHA1596413c49e324451bb8f0b891607eaffa7c96198
SHA256fc97f41620d54578319a51382633d43acbb648f037fe59416b7048c47e5f9179
SHA512c7674460259c678ce8b0d6c388a753496e0b007e73d1099e9fab1bee3b4b7b584b33fcaa53f7f3b3dc681b949c6b6973c35ff1b40ca0ce79d29b6ded6a24d969
-
Filesize
587KB
MD53f82d579d19428a2478b7e8c3847e0a3
SHA18ad78190caebc699c0ea3945ff8cf6d727ebd55a
SHA256ed5cfb123802291bb75b7bfabbd4d2b6487d6500cdec03bb300b18d7161311fd
SHA5128c1948bd50533671b9114d17826862dc2a796d15aa6ab4ceefcb087e723121347259cdacdd0ce60dbdbdc58ce574b9189446760f07ed5e4e95f1f14893a4ada7
-
Filesize
19KB
MD50a5bdc4a2033fe83d2231a318bf31537
SHA16cef797f1098b58f6a52facb589bd5845afa87a5
SHA256fa7cfa1e1cf096cb4edb5c246cbbc68f9b7ace413355e777124379ad29cb592d
SHA512168b337c33a08e91dcc2fdc78d1a67a950970c8e6ff32ecaa58cc97fdb48cd06f1e32798f1c2ba770397aa959e9c2b0dc999deacca7983ceb35732d254a07266
-
Filesize
148KB
MD552de92bda112d367a8dd78bf483a73a0
SHA17b79300b5f2238fed10da45bfe68104aa72269a7
SHA256488c71b5268f28af00961e96d6928609393ebcadbebbd4518795a3e0a685c5b1
SHA512f8988b1f286f247adb4daf59a9ff121d89dfcdbaba54a00b0abb1134ee696b441b066c12322963235c717f96daf72ca4ce7b10fb0618b912da541011058c42d2
-
Filesize
70KB
MD50bdc0560d4f01adb30eb39d7d3be7ac4
SHA1b7417f286bca828b9519f22429668dadc7fe9b04
SHA25619982c2812ca53d764051660aa689178f80f41b5fb1509231a6aad8fb962301e
SHA512fa8c1b9544027c0fc186e3bef681ba85c826d4a15070342c6c140b4c05f31ac5037a1772e64d12339e520ceb5fb7139b32995bff7b80818273cb0efad945c80c
-
Filesize
27KB
MD5f6a94a1ea814e34cf5442c2c1d717c81
SHA166f37b339f676c7b1be1f95eaa5eaf9c3f1a230a
SHA256746f1b5065a47a03134eaaee77e2f41288ba50782838e64aab899a0d41463523
SHA512b221e4d9ac5f36aa88c3fe00dd8e3b62cbbffb07a67a3a5e1fa1f506790788f0ee2421a9e8145296f39bec8657343bb2cf29b50df694ab0fdc2ce416dd36cd42
-
Filesize
88KB
MD56513307f3940bbd289d4697d01321fab
SHA1e332574b02639ad634caac62fb6478ce905cf851
SHA256fefac7aa0525528a36af1d9d46fbb71ceba6746a4286b1a37fc5639e718030bf
SHA5124eda7014e9cdcbd3355e8141d1a2b9f74ab0f51aaa3cd82db2d510e9f6f50c478b2dc641dfef5217e567c459ee120d5e7cd73663e2202fb83b0f0b02af332bc0
-
Filesize
40KB
MD5a43f955cff263bc9435741ec08b10322
SHA167e5e88d92debeb1bd37157fd758ad8c9ec2a556
SHA256e95afc0411b088a3fe475c9d39b7756160719e0cd5c8f574da9d2a59d165afdb
SHA51201699200e6480ce3159d4552bab7f984fa502b42efe8e250f34f46eb6b3fba93a169add2282ecfcc08cdfddcda0eefe69d739e56b02b1b16a8eeeed232e5c88a
-
Filesize
59KB
MD5e8836e44f05bd7ac0c84a0d9b7678c5c
SHA1e18bbb525593c29260a4334094220f70b3488911
SHA256d41f4e19885200f6580c5d1fbc9bc4f8139be3f03028c33fcb6faaa72cc08158
SHA512d6433cf0898ec449ceebea01446cc5299a1795db8ddc8ebe255934123fa05d26b9bfd1a5d8a0f6da4b275f3a06d22849bd78a101f11557313e5c2b0c29f9d729
-
Filesize
55KB
MD571bb9ec2fe47efcbfae10ce0cbf55313
SHA10c371f1d4abd71593340569a0d4c78d17039cdda
SHA256eaeb27a571d35844b261f1e0b7ba30608da3d8ab24e5184b0d08298ed5edd89a
SHA5124cb2fa755d0a5947ef253755c58e646e567073c0b8261c466041a3530fca05487654e3c3dcbfbe9137a8cbedfd58adcbc7cd80ba8470e94100b039b2a3d09db0
-
Filesize
54KB
MD5db56574ad278319b0618c06cb379e6a7
SHA1e2d195920d402c419b5ab942a9797df7e8699a84
SHA256d3896e42eacfaddca66daa0f7b3b38e7ab21cfb974f6bfb2e7d9e672588b10cc
SHA51291f513a9af7e29d45a1940453194dbb6a20ae3c2ec6e404d328face578e283148c37660f68b2316339b6267c1117efcc54bd3320355f58ceb7864dd204a2870d
-
Filesize
56KB
MD5cf34860e0d9a42d872559cc5a4e963e3
SHA12cecb0b6bd117aaacd14f5c31e0370a52db5cd7a
SHA256f59d0d244702e0d7611c28dfe93ffe027e42722361ce52131d2bedde527a606a
SHA512d6aba3c694b21bac4dbdc11e444b013e2d6c38d2dab5256b4ade88b58c5387f9fbbe50c61168ea0e69fe9d5eb136203b9f59b8da5713eaad61fac0ecdb518102
-
Filesize
54KB
MD5da789777ad235c8a1b476baf2260121e
SHA1ab03b58b3c1c68155fa802780112747deba8b064
SHA256579ff3f1bf0211ad370f77c6f8d425ed5b20abe571617ef694393a9cc6f6fa0a
SHA512825f0119654fee79af4ef96a57a45077e0983e87a6178cc4f1e8feab037d3b46c988fb531dbcced4bd9c3ed91bee2754ed714441651d937ad7497eb0ab9984d8
-
Filesize
56KB
MD540d696858119e1e2dd8c445963b4f75a
SHA1baad61fe52be393f207e4f295e612ef2edf891cc
SHA2564007f18965305ef2926c16cedd147bbf2e55f79b4931aef0c1b0ea20758eda7c
SHA512f91b4bd62ba52eadc5d08ff4db8575ef6d3f88a999fd89daab2d4d9c489ff0a2587d947ccec88923c4b313026560b475be58d0f55732022ebaf4d5219b584c11
-
Filesize
55KB
MD590187484db99941ab15002fefed54fe2
SHA1ab9e04bc1ac79e3256e0db765fc7bc771d9f4136
SHA256d5c4715cd5fb4bb8973f52bf3cd8eaefd204def4bcd9d9c6c405827cc0ef20b1
SHA512455bcb6a0663284122d7028e2e9f31ad217b4e59ec26e040bc1d448b95225c9cad7d4f36af1c6535085ce72873ffec508862d14afb048b3d8a4f9f62a3363ca0
-
Filesize
55KB
MD532d055fda957cb191dd2ec658a92e501
SHA1ced772ce30440878137ca90f8a948baf2ae037c5
SHA2561d4ff281754c9f139021ae66d77ffe0aa7f21546bbfbe62adf2fce9ece90b68f
SHA512bf0cee0da35ee43d169c9a4f83e0ac9eac0d769426a1f39445f708afdd836003f52d021f3e8a943834971a3d4579081fec6bf4358c6b573a90ce27d82bb3a577
-
Filesize
55KB
MD57f0ffd0da836021540f00e136bf1dc9b
SHA15bc51e99a46eb3ad1451a9ec3b6c07a82b824149
SHA256044a5a2cae5a80df2cc5747c0deba151ebfae0cc0626ea9370176dbd71377578
SHA512d7bd8eaa170d201459ad1ce1441b4654d8f20fc38a1148d7132264a0cca2dc2afb222d82b8bfe02543a634486afaa8df598dd8b0c08cdfa9c8688b26c31483af
-
Filesize
65KB
MD5b72ca09bf0cc3ee455ddacf4d30b26e8
SHA11cf2fa2fdc18778e304f8fe7a5d1b0e0f8f46018
SHA256cf463d5761eb2544c902e2430cae96c954a55d075b55f943e5cb43a1be9789cc
SHA512af54510fdb7d83328da2eb83fbb126a8545be6b41c8a2707b5d68f4c9c4b90d7e16ea164b0f804c2de21480d039ba91f13470850006d85a8aa518fcca112263f
-
Filesize
624KB
MD5a2693d2717e7b9a359a86e64102cf1fd
SHA153ee455767ecff54ca7823cd26aa1e29b0ffb137
SHA25639df124ecb19cf738cb2c03a7ecd23183b6d9cc60d05a98a01fb9efce7c68515
SHA512baf5810572ca6f8b93b2202ce12e0e2299111de240210cf9e94aae57e0ba3f257d9eedb8007aacb2ab13ee990f1430cdfaab2c5927e283099c7e7967ebc3c6d3
-
Filesize
625KB
MD515268b4d9db9d29274fb619bec0368e8
SHA1f29af6f7c7244c4e99cc3e7446fe013c5fa15a04
SHA2568573b6e2a7ce347a05b65389cfc03d511cac48b0079ad1a9ea064699e8029fa2
SHA512bff93999ddcea1f8020605a475e4761ad9f8582ea424b998707a571620cb3d730df2a9898d7e8f2304abc8743bef77ef8b5d216061b4da6e7a9137c26959eb30
-
Filesize
625KB
MD515268b4d9db9d29274fb619bec0368e8
SHA1f29af6f7c7244c4e99cc3e7446fe013c5fa15a04
SHA2568573b6e2a7ce347a05b65389cfc03d511cac48b0079ad1a9ea064699e8029fa2
SHA512bff93999ddcea1f8020605a475e4761ad9f8582ea424b998707a571620cb3d730df2a9898d7e8f2304abc8743bef77ef8b5d216061b4da6e7a9137c26959eb30
-
Filesize
5.0MB
MD572540194bd451dac050609406eb50a56
SHA157c33ec10f90f81f6abc612b4d251510c36ebd6b
SHA2563a18d5fd76abcfe537d78457dab4797231af313028b5594231f019245c5f7a74
SHA512ec9b24c877e82269aba78701a9828879e8b91580c4d3002227ee18868b8db76b6c0fba08e687aba1ea3127eea05e37124e2b615c224b33e4dac2512dbefb3444
-
Filesize
5.0MB
MD572540194bd451dac050609406eb50a56
SHA157c33ec10f90f81f6abc612b4d251510c36ebd6b
SHA2563a18d5fd76abcfe537d78457dab4797231af313028b5594231f019245c5f7a74
SHA512ec9b24c877e82269aba78701a9828879e8b91580c4d3002227ee18868b8db76b6c0fba08e687aba1ea3127eea05e37124e2b615c224b33e4dac2512dbefb3444
-
Filesize
5.0MB
MD572540194bd451dac050609406eb50a56
SHA157c33ec10f90f81f6abc612b4d251510c36ebd6b
SHA2563a18d5fd76abcfe537d78457dab4797231af313028b5594231f019245c5f7a74
SHA512ec9b24c877e82269aba78701a9828879e8b91580c4d3002227ee18868b8db76b6c0fba08e687aba1ea3127eea05e37124e2b615c224b33e4dac2512dbefb3444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB
Filesize765B
MD5740e3944d4df7427dd8d79ba9a0cbe3a
SHA19bad37dcdd3f5d37517a3c9cd5f092bb6bcbb3df
SHA2561f1c81df6298a756bb720d75988da90b132e3d8f1dbd8ebdc00530bad56cf015
SHA512a2a4d64025eb6cd75f390be44c067e61bbc544c37d81a303c2a67b1741d0380b675ddf0137f541b81e835700307c80fab323331d9f4714161f2d4810c88b887b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEACCDA8653DD8D7B2EA32F21D15D44F_46E4040B4A28D439FBFA7E9FC642442C
Filesize637B
MD56078f44171846424f18fbe60cd982a60
SHA11867cc25eecd7a2d2c2fdcfa5a07c1aa999b3134
SHA256650322ff23062308d3fe982194c1c440ab39ef33f367c332f3e32572ab735e15
SHA512fc084cfa63be0793628ec2a0d9f88824503ae40ff47a37707c36829700dc4e90e07bb608928f729a180fec8e2a1924ff13dba2e2f499c3224f3fb746cd0c474f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F
Filesize1KB
MD52e4766c15e017fc9632716654a2a0acb
SHA12fbf0fee362bb02036ab4c71643733c296ef8d3c
SHA2560cd8b908bae133a2713b5c678e43ccc6e3ff8561a481d456e9f7726325d8a2d8
SHA5121119b289a7c2dd3a792ca0d56a24bd8be6c8d92bca7b39b1c7978be0d02898fa07df341ef768630fffac0b73756b12ab447dd1407c87828c19f2d064d0f92f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB
Filesize484B
MD5147e6903e81cbaf4fbea831ca4babf83
SHA10b4c37303b85147860a82b48cdbd71b71d4ec6d3
SHA256fb1807da4b0813b9152f9d820a48261495d0f6a73fdfdb82f9047765ca01a58e
SHA5124ea21386df7d1f1ac8df2d317faacf80f0ff58fac831fb4a313c3463712ee828a45e4b6f2e705d3793357474ce3e23e7a27bc980076e83b19e8db6f6e0706ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEACCDA8653DD8D7B2EA32F21D15D44F_46E4040B4A28D439FBFA7E9FC642442C
Filesize488B
MD5df0bc7887e0bb4422ed9531617d43546
SHA1e1ee2305c7d5ba98ddbb42c3dbb7c2212d29c894
SHA25615a50dfc29fc0a7e864fc2b80a03ecfd4f67b934ded8d355252454a4253de0cf
SHA512a400e6dea5d879f48877272a8b91dbd0b98755a7624cc68c7e7629dec2fe277725c4e6c936070e71070445aad86b4d4281b083812f51b7ad2649773cbbd3f7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F
Filesize482B
MD50d1c8d9de4460e093f65b0dc61d67bd7
SHA1e50cb9efc47c48323e27cbe4e4a0a26faec1d365
SHA256b7ece93e6aad7b058d5883efd5faa871a93584ac8268f67e7b7a9ff037fb6eed
SHA512f5a98afefa561365bd9d2be22ce361ca29cd8fa26976b4e78b65872c25771dcfc6ae250bec1d5b0b50e208537cfb71b0dfa3eeb5baf79d37bf1b4981f4ca1c21
-
Filesize
48B
MD5d8bad71bc9745e3f0f19ea213cbaa45b
SHA11a5bf116d587d927f920822087008bd66af4af84
SHA256606d64f0e3b58822c29898f75913b0c431612eed1db1013d6e7c6af19c5c7d99
SHA512d13b9ad023343af5805ff343477b3f3bc703ab40423ecf28941f38e830d241f33fe2982452b0101874d0cd52767da5f739bc6143b7a35ff8598d8502d8b06f5a
-
Filesize
144B
MD515599dab149702511f3c5f6649979a92
SHA14599a1dbc70285e3775c1fe799a2acaf0699782b
SHA2562f9303bf33fd4437ca1a46804ca3067de02ef601f9f80d57b73560cf5041c3d6
SHA512a28f7ae6ada9b8ee8ed222491f5075d48d6a5aad867b883bc40660407159a995e0604cd6710129c426835840e01a3989082900a8391c7e694b639b75e744d50b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
717B
MD5d0260f718af37334c6d85db9091daee9
SHA1dc37cf29c6cf89fc4e7dd5e7c725b996e068b712
SHA2567e4ec348f87c00984ad3dac634b57f518a38fadf32052529e9d8ca77200f0e7a
SHA512920a4f1865c5244c1b3e39c765dfc2937daaba290384db5a004c58e3fd928e40701c29745cf8dc5add627289c6abc24da6b046e540a6a275da930703242c449a
-
Filesize
529B
MD5cabe0b7908a0fca9fbb2caf7f9bb726a
SHA1cd03ee448162817e9a9f3758ea5acdb765fed413
SHA256775e19b8a215e565c7b54f58b7ac9fb6037de27db68fcfaad3b926fb4a228493
SHA51286341bccc46db0fc3fb0528342f30a25fedf6e7ae638076d036d5f4be1094a5a766ea599c8561f3ba6a8073d2ea0dbce988f2b80a234b24a43ca91c9b3488aa0
-
Filesize
908B
MD53d3a22539d312323b6be17075b289f37
SHA111487376ec4c05fac2d39eb0c1b8784850835922
SHA256c5b740ff96b52851de1afccf35ce7175cb93cdfef48ef9e38db7d5777b083ec7
SHA512ccb5f77f2ae15425ffb173a53271a73a6b4a7f8a5f09ba17b1c38f91b732e692606fc4c8916591242b07403b8b30198962f2beea417b33729965616c759c56a0
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
C:\Users\Admin\AppData\Local\IsolatedStorage\dkpawjq4.bgb\44macjhh.a44\StrongName.1r34rtndphgwhqowmyxywu5guyuf1gh2\StrongName.bx0ds5js14qgmnal5bhexnafezsd5pyy\identity.dat
Filesize529B
MD5b81dfaf8c0f7f1e2f170f4c6cb8c5634
SHA1c24612cfc0b9c1067c311b4a9e6f7a98feda645f
SHA2561f8da753d2cdc1c999a1cf1331c7ce4156c3cccf9ac6ed14b6621e6697566fdf
SHA512980f1be6a48154a65cfd92d45a5737b53b20e2da48f1d88afb0e8186cb0cd9079436d4f6ad422012e8a7bcacba5b5452558ed3fddf904cb1e5c5bbb6dae0c051
-
C:\Users\Admin\AppData\Local\IsolatedStorage\dkpawjq4.bgb\44macjhh.a44\StrongName.1r34rtndphgwhqowmyxywu5guyuf1gh2\identity.dat
Filesize516B
MD5cbd3f64897bc369fa23f36147efea527
SHA1bb67513ae0cd937b13065ac4309af362c584cd41
SHA256fdc1bfa45ac28a73c370ef0f9cf5da0c6a55705cd114b6a85a167f635a05c3d0
SHA5123b77226186fc43aca07b439a3e3545c441140f781a2f7f9daf86a068320593124af99b4dd039f1c6fcddc3a9804e6aa97dc22542ac884d8b3ea19b944fec9087
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\d7q3g01j.default-release\activity-stream.discovery_stream.json.tmp
Filesize21KB
MD542d3328c74bf9ed784a4d69acdda8e10
SHA1a991b8ebaaebc8fdd3c3a90406e88b98813c4be6
SHA2562cf68a4bf055e0962d2aeecf6bbf8c2c9bef870a52bd5e6c70a5d8e31f704331
SHA512e344503f951812e08f35c373a9f66f58f6a49bdfb5af8b4779b5d0f8542f706fe65138d7e324f1e4b485a49f8c30b505a8432bdbd3cc3f225343dbf8ac0f4d7f
-
Filesize
2KB
MD5647f843626b023aaaa748f924f95ac25
SHA1652cacf99409e3dcd39b6eb8839c16d22b1800e8
SHA256732dee732e0261afbfba21eca43008a5009cfc9e4c405ece8826a9746564cceb
SHA51261093dcbe07efa5bdffec4933243168bf40b8159bc5a9840552bc3ea8e7c129156276a8548c658e5267bf0b8c4448dcb5c8ab10140c72ed48eb8910c075022fa
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\d7q3g01j.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD51b1ae28fd370f3e14380e33407537f42
SHA12b0fdc64f5a2c172eb3906ff18e03e6164911ab5
SHA2565c4b475994cc96e5e4ecb5d320533ab99510fecea89c3e3500b3559ad6a3104b
SHA512443df55b6fb4c8a46da640202faee8a2024f5f9fc7516c0864ff63c6f085389e83a7ef69f5d6e7a37e0dc8a7e4ce10066b0291189936c10d0bc92bb8dd88b65e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\d7q3g01j.default-release\datareporting\glean\pending_pings\76b37f42-a9d7-4ac4-858c-8c77851657b7
Filesize11KB
MD57591b11c5de19cffcfefb3b5a62a6ccb
SHA18c99a2fa2f15725b02f0f1068f80470c66214f6e
SHA256d0e4ab498f42ae974609b01fa69d6ed8e768d491110e06d5826df1137e430080
SHA51293ea40165a173357c50bfae481369f8fbcbad1fdcfb92f9681ecbf1f105f16cdc1b7182c63da25023e4029c2c437594836031010a5019f0f6d7f9dd278a5bc5c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\d7q3g01j.default-release\datareporting\glean\pending_pings\88569caa-3ed9-4c37-8b40-118a7c7e7cf7
Filesize746B
MD501a27b42c545f3b42922035571a09bb7
SHA177b95f9b1a894b8de8953c8df8ed48b107f18601
SHA2568875135d6f28c2d7818fc24373a656e2b3bfdbc9510f5e2af5619cf17fdc9dde
SHA51227494b19cbfd4cc6cdeb4b574c3d06cd031ca2a8a33f5d0f8fd78e659499ec49810aa1db31cda74ccbc37bbb9ffa226391e9d1ff6d082ceedcc24fb61cc18fd9
-
Filesize
6KB
MD5a384c1d9ce96773a7f732c6be136aa05
SHA1af67eac9d5ea3736144d9ff284292b78d7b8d08a
SHA25636741b38206027d43a208b5c3be3e75c2ba59806af8e6bcd08f71418eb669ab4
SHA512b7351f79bd88bbc5cbf6cb58b73a67134fa80997e42a829373c5781cc8297932557d0b48e0605f8a98279f58c59aa4e988419e26002023088eaf91ed4aa92aee
-
Filesize
6KB
MD51bd71fa7dd9b75bbc4c757d4ebd4147d
SHA1f9ad2bfc44cb8694a0af956366db7bccbad186a3
SHA2567c49994897052cf2d7179b1d4191226b628c052ce7a2af6b89a7fa664f36a9ea
SHA512e5a089e7e1934b82c2b72348b17bd9b2e4c9f06103393eec9fe1b1f5b2a3539ea00fe78d46a7d1a4a71f2daa5b2836db1e5013213a877209fb2aa805a73ba52f
-
Filesize
7KB
MD587868193626dc756d10885f46d76f42e
SHA194a5ce8ed7633ed77531b6cb14ceb1927c5cae1f
SHA256b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41
SHA51279751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277
-
Filesize
19KB
MD5c757503bc0c5a6679e07fe15b93324d6
SHA16a81aa87e4b07c7fea176c8adf1b27ddcdd44573
SHA25691ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e
SHA512efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99
-
Filesize
26KB
MD5d765f43cbea72d14c04af3d2b9c8e54b
SHA1daebe266073616e5fc931c319470fcf42a06867a
SHA25689c5ca1440df186497ce158eb71c0c6bf570a75b6bc1880eac7c87a0250201c0
SHA512ff83225ed348aa8558fb3055ceb43863bad5cf775e410ed8acda7316b56cd5c9360e63ed71abbc8929f7dcf51fd9a948b16d58242a7a2b16108e696c11d548b2