Analysis
-
max time kernel
88s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20-01-2024 06:12
Static task
static1
General
-
Target
latestrocki.exe
-
Size
6.5MB
-
MD5
0518d9c6db9a614769bf43fbff180167
-
SHA1
928084a70bffb6eb474658dcf062d74f5ca84f68
-
SHA256
6369f6e4a8398cccbbebef2ae7078834d3f92d499257a59b4f9142bd5b079057
-
SHA512
a3a9ae62006133d5e6e7d74527732d6f245c7bfbb8770fba371e877c56b47b61fd5e809eac7e462013c811ab4e49c1162ce16eec7dd15db76530ea09c2a0cbf1
-
SSDEEP
196608:21qELhrUIpNiSF4B3ri+e7UDV2BnIuaR:shRpNPcrrDVgnIH
Malware Config
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Extracted
fabookie
http://app.alie3ksgaa.com/check/safe
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdpo
-
offline_id
Bn3q97hwLouKbhkQRNO4SeV07gjdEQVm8NKhg0t1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-FCWSCsjEWS Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0844OSkw
Signatures
-
DcRat 6 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 1304 schtasks.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe 2352 schtasks.exe 2592 schtasks.exe 2376 schtasks.exe -
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral1/memory/2388-226-0x0000000003670000-0x00000000037A0000-memory.dmp family_fabookie behavioral1/memory/2388-382-0x0000000003670000-0x00000000037A0000-memory.dmp family_fabookie -
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/2468-510-0x0000000000230000-0x000000000025B000-memory.dmp family_vidar_v6 behavioral1/memory/2032-514-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 -
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/2680-670-0x000000001BB90000-0x000000001BCC2000-memory.dmp family_zgrat_v1 -
Detected Djvu ransomware 8 IoCs
resource yara_rule behavioral1/memory/1612-431-0x0000000001E30000-0x0000000001F4B000-memory.dmp family_djvu behavioral1/memory/2284-433-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2284-432-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2284-426-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2284-457-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2996-471-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2996-472-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2996-485-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 13 IoCs
resource yara_rule behavioral1/memory/2848-36-0x0000000002B90000-0x000000000347B000-memory.dmp family_glupteba behavioral1/memory/2848-48-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1644-159-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2848-155-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2848-158-0x0000000002B90000-0x000000000347B000-memory.dmp family_glupteba behavioral1/memory/1644-169-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1956-172-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1956-367-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1956-377-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1956-392-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1956-406-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1956-430-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1956-462-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Modifies boot configuration data using bcdedit 14 IoCs
pid Process 1500 bcdedit.exe 1648 bcdedit.exe 1056 bcdedit.exe 2820 bcdedit.exe 1508 bcdedit.exe 3060 bcdedit.exe 2836 bcdedit.exe 1064 bcdedit.exe 1664 bcdedit.exe 1264 bcdedit.exe 2176 bcdedit.exe 1628 bcdedit.exe 804 bcdedit.exe 2840 bcdedit.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\Winmon.sys csrss.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1988 netsh.exe -
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE 22 IoCs
pid Process 2148 InstallSetup7.exe 2752 toolspub1.exe 2848 conhost.exe 2388 rty25.exe 2580 BroomSetup.exe 1616 nsy210B.tmp 1644 31839b57a4f11171d6abc8bbc4451ee4.exe 1956 csrss.exe 2764 patch.exe 1268 injector.exe 2624 dsefix.exe 2660 windefender.exe 2436 windefender.exe 1588 CC54.exe 1612 F3B3.exe 2284 F3B3.exe 1984 F3B3.exe 2996 F3B3.exe 2468 build2.exe 2032 build2.exe 2356 build3.exe 1200 5B8A.exe -
Loads dropped DLL 34 IoCs
pid Process 2920 latestrocki.exe 2920 latestrocki.exe 2920 latestrocki.exe 2920 latestrocki.exe 2920 latestrocki.exe 2920 latestrocki.exe 2148 InstallSetup7.exe 2148 InstallSetup7.exe 2148 InstallSetup7.exe 2148 InstallSetup7.exe 2148 InstallSetup7.exe 1644 31839b57a4f11171d6abc8bbc4451ee4.exe 1644 31839b57a4f11171d6abc8bbc4451ee4.exe 860 Process not Found 2764 patch.exe 2764 patch.exe 2764 patch.exe 2764 patch.exe 2764 patch.exe 1956 csrss.exe 1616 nsy210B.tmp 1616 nsy210B.tmp 2764 patch.exe 2764 patch.exe 2764 patch.exe 1956 csrss.exe 1612 F3B3.exe 2284 F3B3.exe 2284 F3B3.exe 1984 F3B3.exe 2996 F3B3.exe 2996 F3B3.exe 2996 F3B3.exe 2996 F3B3.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1876 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0008000000016c25-386.dat upx behavioral1/files/0x0008000000016c25-388.dat upx behavioral1/files/0x0008000000016c25-389.dat upx behavioral1/memory/2436-391-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2660-390-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2660-387-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2436-398-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2436-470-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\e4a6ce50-26e3-43e2-8865-cce745508619\\F3B3.exe\" --AutoStart" F3B3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 43 api.2ip.ua 50 api.2ip.ua 42 api.2ip.ua -
Manipulates WinMon driver. 1 IoCs
Roottkits write to WinMon to hide PIDs from being detected.
description ioc Process File opened for modification \??\WinMon csrss.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1612 set thread context of 2284 1612 F3B3.exe 101 PID 1984 set thread context of 2996 1984 F3B3.exe 104 PID 2468 set thread context of 2032 2468 build2.exe 107 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\Logs\CBS\CbsPersist_20240120061217.cab makecab.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2224 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2716 2032 WerFault.exe 107 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CC54.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CC54.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CC54.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsy210B.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nsy210B.tmp -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2352 schtasks.exe 2376 schtasks.exe 2592 schtasks.exe 1304 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2108 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-531 = "Sri Lanka Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-191 = "Mountain Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-242 = "Samoa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-911 = "Mauritius Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-741 = "New Zealand Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-521 = "N. Central Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-621 = "Korea Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-32 = "Mid-Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-751 = "Tonga Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-752 = "Tonga Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-571 = "China Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-41 = "E. South America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-731 = "Fiji Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-3 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-365 = "Middle East Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-101 = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies." netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-371 = "Jerusalem Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-981 = "Kamchatka Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-21 = "Cape Verde Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-421 = "Russian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 rty25.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 040000000100000010000000e4a68ac854ac5242460afd72481b2a440f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a3030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a41400000001000000140000004e2254201895e6e36ee60ffafab912ed06178f392000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 rty25.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2848 conhost.exe 1616 nsy210B.tmp 1644 31839b57a4f11171d6abc8bbc4451ee4.exe 1644 31839b57a4f11171d6abc8bbc4451ee4.exe 1644 31839b57a4f11171d6abc8bbc4451ee4.exe 1644 31839b57a4f11171d6abc8bbc4451ee4.exe 1644 31839b57a4f11171d6abc8bbc4451ee4.exe 1268 injector.exe 1268 injector.exe 1268 injector.exe 1268 injector.exe 1268 injector.exe 1268 injector.exe 1268 injector.exe 1268 injector.exe 1268 injector.exe 1268 injector.exe 1268 injector.exe 1268 injector.exe 1268 injector.exe 1268 injector.exe 2752 toolspub1.exe 2752 toolspub1.exe 1268 injector.exe 1268 injector.exe 1268 injector.exe 1268 injector.exe 1268 injector.exe 1208 Process not Found 1956 csrss.exe 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1268 injector.exe 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1268 injector.exe 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1268 injector.exe 1208 Process not Found 1208 Process not Found 1208 Process not Found 1956 csrss.exe 1208 Process not Found 1208 Process not Found -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 480 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2752 toolspub1.exe 1588 CC54.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2848 conhost.exe Token: SeImpersonatePrivilege 2848 conhost.exe Token: SeSystemEnvironmentPrivilege 1956 csrss.exe Token: SeSecurityPrivilege 2224 sc.exe Token: SeSecurityPrivilege 2224 sc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2580 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2148 2920 latestrocki.exe 28 PID 2920 wrote to memory of 2148 2920 latestrocki.exe 28 PID 2920 wrote to memory of 2148 2920 latestrocki.exe 28 PID 2920 wrote to memory of 2148 2920 latestrocki.exe 28 PID 2920 wrote to memory of 2148 2920 latestrocki.exe 28 PID 2920 wrote to memory of 2148 2920 latestrocki.exe 28 PID 2920 wrote to memory of 2148 2920 latestrocki.exe 28 PID 2920 wrote to memory of 2752 2920 latestrocki.exe 29 PID 2920 wrote to memory of 2752 2920 latestrocki.exe 29 PID 2920 wrote to memory of 2752 2920 latestrocki.exe 29 PID 2920 wrote to memory of 2752 2920 latestrocki.exe 29 PID 2920 wrote to memory of 2848 2920 latestrocki.exe 57 PID 2920 wrote to memory of 2848 2920 latestrocki.exe 57 PID 2920 wrote to memory of 2848 2920 latestrocki.exe 57 PID 2920 wrote to memory of 2848 2920 latestrocki.exe 57 PID 2920 wrote to memory of 2388 2920 latestrocki.exe 31 PID 2920 wrote to memory of 2388 2920 latestrocki.exe 31 PID 2920 wrote to memory of 2388 2920 latestrocki.exe 31 PID 2920 wrote to memory of 2388 2920 latestrocki.exe 31 PID 2148 wrote to memory of 2580 2148 InstallSetup7.exe 32 PID 2148 wrote to memory of 2580 2148 InstallSetup7.exe 32 PID 2148 wrote to memory of 2580 2148 InstallSetup7.exe 32 PID 2148 wrote to memory of 2580 2148 InstallSetup7.exe 32 PID 2148 wrote to memory of 2580 2148 InstallSetup7.exe 32 PID 2148 wrote to memory of 2580 2148 InstallSetup7.exe 32 PID 2148 wrote to memory of 2580 2148 InstallSetup7.exe 32 PID 2148 wrote to memory of 1616 2148 InstallSetup7.exe 33 PID 2148 wrote to memory of 1616 2148 InstallSetup7.exe 33 PID 2148 wrote to memory of 1616 2148 InstallSetup7.exe 33 PID 2148 wrote to memory of 1616 2148 InstallSetup7.exe 33 PID 2580 wrote to memory of 408 2580 BroomSetup.exe 40 PID 2580 wrote to memory of 408 2580 BroomSetup.exe 40 PID 2580 wrote to memory of 408 2580 BroomSetup.exe 40 PID 2580 wrote to memory of 408 2580 BroomSetup.exe 40 PID 408 wrote to memory of 2120 408 cmd.exe 43 PID 408 wrote to memory of 2120 408 cmd.exe 43 PID 408 wrote to memory of 2120 408 cmd.exe 43 PID 408 wrote to memory of 2120 408 cmd.exe 43 PID 408 wrote to memory of 1304 408 cmd.exe 42 PID 408 wrote to memory of 1304 408 cmd.exe 42 PID 408 wrote to memory of 1304 408 cmd.exe 42 PID 408 wrote to memory of 1304 408 cmd.exe 42 PID 1644 wrote to memory of 1312 1644 31839b57a4f11171d6abc8bbc4451ee4.exe 44 PID 1644 wrote to memory of 1312 1644 31839b57a4f11171d6abc8bbc4451ee4.exe 44 PID 1644 wrote to memory of 1312 1644 31839b57a4f11171d6abc8bbc4451ee4.exe 44 PID 1644 wrote to memory of 1312 1644 31839b57a4f11171d6abc8bbc4451ee4.exe 44 PID 1312 wrote to memory of 1988 1312 cmd.exe 45 PID 1312 wrote to memory of 1988 1312 cmd.exe 45 PID 1312 wrote to memory of 1988 1312 cmd.exe 45 PID 1644 wrote to memory of 1956 1644 31839b57a4f11171d6abc8bbc4451ee4.exe 47 PID 1644 wrote to memory of 1956 1644 31839b57a4f11171d6abc8bbc4451ee4.exe 47 PID 1644 wrote to memory of 1956 1644 31839b57a4f11171d6abc8bbc4451ee4.exe 47 PID 1644 wrote to memory of 1956 1644 31839b57a4f11171d6abc8bbc4451ee4.exe 47 PID 1956 wrote to memory of 1268 1956 csrss.exe 55 PID 1956 wrote to memory of 1268 1956 csrss.exe 55 PID 1956 wrote to memory of 1268 1956 csrss.exe 55 PID 1956 wrote to memory of 1268 1956 csrss.exe 55 PID 1616 wrote to memory of 1876 1616 nsy210B.tmp 102 PID 1616 wrote to memory of 1876 1616 nsy210B.tmp 102 PID 1616 wrote to memory of 1876 1616 nsy210B.tmp 102 PID 1616 wrote to memory of 1876 1616 nsy210B.tmp 102 PID 1876 wrote to memory of 2108 1876 icacls.exe 56 PID 1876 wrote to memory of 2108 1876 icacls.exe 56 PID 1876 wrote to memory of 2108 1876 icacls.exe 56 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\latestrocki.exe"C:\Users\Admin\AppData\Local\Temp\latestrocki.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F5⤵
- DcRat
- Creates scheduled task(s)
PID:1304
-
-
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:2120
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsy210B.tmpC:\Users\Admin\AppData\Local\Temp\nsy210B.tmp3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nsy210B.tmp" & del "C:\ProgramData\*.dll"" & exit4⤵PID:1876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- DcRat
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:1988
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- DcRat
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Manipulates WinMon driver.
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:2352
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:2764 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER6⤵
- Modifies boot configuration data using bcdedit
PID:1500
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 16⤵
- Modifies boot configuration data using bcdedit
PID:1648
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}6⤵
- Modifies boot configuration data using bcdedit
PID:2820
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 06⤵
- Modifies boot configuration data using bcdedit
PID:1508
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast6⤵
- Modifies boot configuration data using bcdedit
PID:3060
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}6⤵
- Modifies boot configuration data using bcdedit
PID:2836
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn6⤵
- Modifies boot configuration data using bcdedit
PID:1064
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 06⤵
- Modifies boot configuration data using bcdedit
PID:1664
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe6⤵
- Modifies boot configuration data using bcdedit
PID:1264
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe6⤵
- Modifies boot configuration data using bcdedit
PID:2176
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows6⤵
- Modifies boot configuration data using bcdedit
PID:1628
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:6⤵
- Modifies boot configuration data using bcdedit
PID:804
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:6⤵
- Modifies boot configuration data using bcdedit
PID:2840
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe5⤵
- Executes dropped EXE
PID:2624
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v5⤵
- Modifies boot configuration data using bcdedit
PID:1056
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:2376
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:2660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2388
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240120061217.log C:\Windows\Logs\CBS\CbsPersist_20240120061217.cab1⤵
- Drops file in Windows directory
PID:1084
-
C:\Windows\SysWOW64\timeout.exetimeout /t 51⤵
- Delays execution with timeout.exe
PID:2108
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1471020041-1346142119-783232187-1177023488959151123939468422062154138-273377773"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵PID:2128
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)2⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2436
-
C:\Users\Admin\AppData\Local\Temp\CC54.exeC:\Users\Admin\AppData\Local\Temp\CC54.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1588
-
C:\Users\Admin\AppData\Local\Temp\F3B3.exeC:\Users\Admin\AppData\Local\Temp\F3B3.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\F3B3.exeC:\Users\Admin\AppData\Local\Temp\F3B3.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2284 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\e4a6ce50-26e3-43e2-8865-cce745508619" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
- Suspicious use of WriteProcessMemory
PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\F3B3.exe"C:\Users\Admin\AppData\Local\Temp\F3B3.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\F3B3.exe"C:\Users\Admin\AppData\Local\Temp\F3B3.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2996 -
C:\Users\Admin\AppData\Local\98c547b8-a14d-44fb-9878-42c4f90c26e9\build2.exe"C:\Users\Admin\AppData\Local\98c547b8-a14d-44fb-9878-42c4f90c26e9\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2468 -
C:\Users\Admin\AppData\Local\98c547b8-a14d-44fb-9878-42c4f90c26e9\build2.exe"C:\Users\Admin\AppData\Local\98c547b8-a14d-44fb-9878-42c4f90c26e9\build2.exe"6⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 14607⤵
- Program crash
PID:2716
-
-
-
-
C:\Users\Admin\AppData\Local\98c547b8-a14d-44fb-9878-42c4f90c26e9\build3.exe"C:\Users\Admin\AppData\Local\98c547b8-a14d-44fb-9878-42c4f90c26e9\build3.exe"5⤵
- Executes dropped EXE
PID:2356 -
C:\Users\Admin\AppData\Local\98c547b8-a14d-44fb-9878-42c4f90c26e9\build3.exe"C:\Users\Admin\AppData\Local\98c547b8-a14d-44fb-9878-42c4f90c26e9\build3.exe"6⤵PID:1068
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- DcRat
- Creates scheduled task(s)
PID:2592
-
-
-
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\5B8A.exeC:\Users\Admin\AppData\Local\Temp\5B8A.exe1⤵
- Executes dropped EXE
PID:1200
-
C:\Users\Admin\AppData\Local\Temp\8A29.exeC:\Users\Admin\AppData\Local\Temp\8A29.exe1⤵PID:2680
-
C:\Windows\system32\taskeng.exetaskeng.exe {ED3C3870-A004-488E-A6A3-3CA57F781113} S-1-5-21-3818056530-936619650-3554021955-1000:SFVRQGEO\Admin:Interactive:[1]1⤵PID:2672
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\122E.exeC:\Users\Admin\AppData\Local\Temp\122E.exe1⤵PID:2900
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
3Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5e31a2a18a6a4690a4055dd16e5d940d9
SHA1068b665c7ecad288aa47a5b49fca2bb835007529
SHA2565864fe5f730abef927b53ccd842790a30a281b1aaca7f7311087947a960d5c62
SHA512ad759fc658e9af123064040088394baffa5fb0ad02932879ddc91c93644740a5d86738008f224ab111cfaed17e6a93adbd2f5bf4902356fbb2d8d12940a835d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5261884fb394069224636255a9de98591
SHA15a5f5978e7e531ae08a7e8f3881e0b3fee7122a2
SHA256a06f7f3a9d28328113ea17bc1d1e9af7cd9da0699e9566da66483dbc77cc58b9
SHA5127bdb130ef128313b191b5cd3d0f523c8d9d0a299de913ad975b56e98988955d38b74d9e91d66eed6fe0639898eaca21e2fc45309dcd6c37ec8d84cd39c744b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cab970d468fdf0362a9a5ba423ded28f
SHA1265d538a76436a76c489863b3c03d8518830cd14
SHA25609f696f73337e9f1b967e83ce2a3785e8a3ff567f74fe3314d6fe2cece88678b
SHA512c511c32f9f7d7ba41f390a7ba04b1e6262da65590a15ca8cd89ca4d8fc0f8c0fbcc3fade89a875a929109c0b2fef2e23473addc6366fcd9ad1271720d4719b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5551169c4baba34d79f40f9749575f6cd
SHA1a0e8df880a6e8474f901796eb63ccf1f90d98560
SHA256cb2119c38ce54a33c7f52aaf299f698b12f722b954283e3affbfdf24c941d51b
SHA512007cdef00062b7312fd67cb77ab740611fead7c7f980f7c1288479da1612ff2fd7bf630943ea0d234f802aa88e64cfcdf70f1afee0f9628a9a1e128478df07e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecf257ec57b996ca39efcf6d48f2bf5e
SHA11f9bf1c8623b71edcb580cf29b276c379c48dbe8
SHA2567d852bc8be1497812174b69d08aa02ed7ae2a97d73e976b2311472f8d240159d
SHA5129f244ce10f59ffb1c10a55391b7ee016adce07b5a5c1987be2edfa82a6130a670e6923270bbda02de0c5d02819cb890805de4be13fb2d0978789f38bba3be04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511332f561a9cfd0c00ca90b3be55e16e
SHA1e027501b3b77e1089581f139320dfa0d913b8ce1
SHA256916ed7d6b472590bcf71ad461d3036707bc8ca17bc113c8ee5e2fd054091b5d2
SHA512f11ee0981ac53eea63e83bf0e4c93ddeb82e0c1e1b6ddeaa52ce6c612765a48a2b18c8cd7308721f674ae74c9876e92247fc83569c983c4066c84ed41be2f090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5a32b11f8e22d25f5e4f2932016dfafeb
SHA1f644357c4d098b9cfab4a30f7f84d4787281250d
SHA256c677452489c1eb7f281f74b5208a42fadc6d800bad05438c0945e62f6057e454
SHA51254ce2d273b5f13f389263284ffabd42c54f2fd9252d892b17e5f1e9c2594211098f98b36c4b975aa3de03ffa3c236aca61b01c65d70e2d220ce4cc4effb80bc4
-
Filesize
278KB
MD5d04d2f1ecbe2f4491d811c8b9afc477e
SHA19ce75cc8c7de520cb07767ad429223fa9ad23f6e
SHA256e3d16f3f69fa0857f966022387ee6f9408385ddf389d09ffe7dc44acc8ac1ad5
SHA512357322814852a60e7ebb7ff9d2bbbb346d52c7fd6b1f1fc43a265b229fe683f0403e1963d7ad054ced2cec3ddc3bf986ba997c9827d0f513f188b6e80d4673b4
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
Filesize
253KB
MD5089afe1baed999059389c95fc970328e
SHA13799bca14b83f124797422d85ffb2d6cde68d7f8
SHA256ec21b5f85947ba332017df0bd9afc9d6659702c3bcc3991680b71518d15f3f05
SHA512eafb1ece81b5f01ad0ea3eb0a5ff5fce6114f9ae3b1f62b389466ded2bc7070e6da61d078f74ad785cea6cca730d2378004050c2e7756ef8b34c78e388c0a988
-
Filesize
709KB
MD50d014e91f76b6bd951a3d258957db711
SHA1d4226b76390d41460f21e94a384702f0d693b201
SHA256ab0f58e0633c541ddc2df9f4910da9a33d9ba2a468e22ff780fcc9cbb094a6fa
SHA512fdc6589c52eae06da64eae819a6ce202a4bac475e6899c444014ebd95fcd12e3bb0a432680e51fd98a3b5907fb71f4b71464568966d7bbb23d830aaa32ea91b4
-
Filesize
740KB
MD5eb4ef59bcd64885eec1f3f9a157435b6
SHA1d062b90c7507463775f51557d094947bbf117a04
SHA25626b26c88ff079e87475b83aa6b65d06cdd5cf7c286abd80c19750d549e977c40
SHA5123e355592122e3102ba9799ca3d581fbf7f1e8e12a6c413529e6124432895a6a07bbe7c038aff2be5fe93847bdc6a7e79c353cec43571e31f022e9258a5e260f0
-
Filesize
72KB
MD54e2c5b06dc9e2d01d7acdc67aa2df584
SHA1a7bc74270bbd71fc1d30f6b3d4fdde4dd1c661d4
SHA2568bcddeb6a0308a9332f3efd5facf1341c80f764c9c2436be4a657b3c658b3c14
SHA512eea15384dfe9c545ca84c4f71c9f8a76cd3a1480ac82c78996b70e4fe67f4ed2c57a9c15bfad0096fd5055071edcc37bc0fac1f9b8c987e487c487f8a01c4443
-
Filesize
505KB
MD55bf1f1e1dc05c15d5181b9c1802faf29
SHA152943d79986049b465917bdbec8990701397f5de
SHA256e5361f9880bbff2fb9065db2b9a8d71fad8475811742c2947f653f19a24cafe9
SHA512aed4653250331edfe1fe0d7e1f9718c9379d8f88bbd044fb20e9985b9c6e4161e379ca326501e4615f1ce811c0a0894902a53726072a0c52b709c27a9e68c673
-
Filesize
237KB
MD571f8c64c8401696c1b9ac019a41a5560
SHA16a3eb92403f38de5092d1e20649cc0e23cc1d651
SHA2566207b75fcdf5bc8bcc175059439eddddb37fe1c2e40b73a680a4374b8a495e9b
SHA512947f3d6121a5ea54f5d3dde3c07b7147da5dce1e20a244fbfdf198a789a2ee642f82840e7cde7ce25f015371b49494a6232db6c9b7c4f21aa2aaf055c6a8b296
-
Filesize
225KB
MD5d84e50595add661db0a322f0e385266d
SHA13c625dd986c56b164c996e96782257f6a5d770f9
SHA256d076936926f224fa902e2a28874cc1f75c22ea1a65a9cd16dd9bdb74902874c1
SHA512a6775e2ab999aad27dbd286c7a47735c937128255fe314055e2fa0ade9d0ac2ed5c441227565e0957899ba7d43796b202ee1e8b10b8da9d74a358ede72cb0aa0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
278KB
MD50a56ee5ce1a769cac0c4c00e4e175d73
SHA169980f211442690294bcb5edb3d44e26f72e70b2
SHA2562496fb25f48594bc944ba1f083155c307ffac5f554b2324a7b7a77b729c5054b
SHA512b399677353e88e144f30dc78485ea14e346ceb3bfbcb7f21e3adb4eb997bfa3b0e24379096b77c017f2c3c69410644963ae545b84237cd4a30d0a2877f6483ef
-
Filesize
209KB
MD5b7bdca55ae4b78a69dbb6d98bbda1edd
SHA15cd0086ac0b756e33caa5fa3f4bb57593b88fe7d
SHA2565676b80f3cac9261fd7dbff413dc834d031c5f22b9291d40300dffb886793bb1
SHA512ba3e315033084ea1e5f824360634451d5d72dab45ab71cb8937b3910b71ec7efa7703ace3f7d42b1b1d209f4677f30cb4067405f2b37900d5e247bfb038e09b1
-
Filesize
405KB
MD546736bf069eb5423ee980e3693f37d03
SHA1a97afde1f6faaf2c09df0001d1559d71b8b2c8b4
SHA25626130e039f35634699ab462a7cb1d6314253f2408aefe541f4d8f3a3a35a07c8
SHA512a992f9394b95a65c08e981160acdda5e5bd156152a1358fdf596a690cd0bd8f9eec119910fb027193d072c3653e812d79354e2aa2c1a5d06fe8ce28580162a90
-
Filesize
267KB
MD524ab2045b8af2b008e9c9547c0f81da5
SHA1d5d0e663e58cdd0f652c630a3962a0dd0fb485cf
SHA25663a4eeb14613e5b2f2f834c78ff495716f230d8e73497ff13df3b529e0fcd60f
SHA51227a4dae3b639e5d125523dcc3bdf3d215787a9d77bd3e0e8b2c2a47c825c479d808c099861b1a4a863c3aea4dbea7ffb2e1600b76248d9e6bc1a1cff0b9716a0
-
Filesize
769KB
MD56b3c3b621f4964f232d23c7b32a2e486
SHA1dc7a1111a7fa4380b42dfa8e6d1b22b338aa10fc
SHA2565e19952acedb1da68215069d44ce1f3d48da10491151003148f1cceab03f1073
SHA51278b0b893295e5c8c811618638bfb9fcca2daef20b209ef4f0aeb400372b9827ff8b01325427ee41091dfb9d6b3c334510a6f2b4cccf407970cf72adb0bb2b293
-
Filesize
635KB
MD5b784976d84234379349c50123c382e86
SHA14f54e9e258ff34b3713eca7a100d336e47854f77
SHA25621a5f0dd07871372fd31f7b3aa56324a52a2ff728c1a0150d12d5b0d8a83e253
SHA5126db3b2b461cdbac8a93cc04f92b9fbaa0fb786028fcb1174097ee8065c076e01a4868799a5a2c12e7e4e591710a2fad5443a1bdc587bb14dd64b52c3d9ff8d68
-
Filesize
616KB
MD51de2e7547a514d17297bc73b5ce8f294
SHA12a34f03f9906390cd828170928234d723bb5e93d
SHA256992306dd2e53b5a561ee08ec5dd4193d7b70b26f2d9f7a176e1ae784b901b8a5
SHA51226b6958a30b095cf3acff94df3929ba9b26d61685b67af798f84628bead1b3d403d773db1c20078560b4f3c5279a7266fb21ba231fe2790058a9dad8757deecc
-
C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
Filesize136KB
MD5ab14ae5114ee254ab076a637ef307ec6
SHA14486f8d6186a2d012c8e05261e0f5c0c50501611
SHA2561cbebe1eb2f9d7483a2891212eca184171008d5b9bd345064e190ba8fbabaee0
SHA5129160209aa793f796685c217051569fc238a92d3916d4155ede951fbd0d7ccf8addeb5ff48c73cc010f295e4c6deba4cc2a94dc9219c45a8e677a139df8befa36
-
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
Filesize241KB
MD50197e5443eee7369a5b1ed11490285fa
SHA18884f2d6016e267b438d3b6bfe7c5637d8c2366f
SHA256e5b401964061b76fd1be7eb2c17e2002bdd9b6424867451ad0c2c2463957cd4a
SHA512f8dcccb55906a96446159db3eccc3d66879dbc77dba36dca4d6efa1b23965fcbf8bf98d796f6f69a7778548d24f2cb14b5d7dd94dd799305521a20abe263cb86
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
44KB
MD5b528aca99f6784d17622a8cc8d7d65ea
SHA12acffb3bdcaedd9e5a97a15657b73be0b9c91a96
SHA2564b76ba202181976c88d40396c50dec29a7b3e6a3fa074f135998fb76fb95e75d
SHA51288de5062ca74812767e5e11701a8b11642d4c95adad499ba3d7aa61e7cfddd5f396d407b1e4620b190ea34453e63591c9943c846f17c3e7155891f299e27e396
-
Filesize
31KB
MD5cbd9afdc2e8794fba10bbf09fd339b01
SHA1d4513119876edeb5cd91961e6631cfbbbf47e437
SHA25673ff550ffff10d8a7ddcaea4b5adb0e803160f79f41961249c3626edfe5df1da
SHA5124c12d19b08b59af5bc3ade39c99966aba43e27d150b4f772bdf4ffd439612f6c1445372c85094e7000582eff3a62c1bd2b0bf73093e4e0aab403deda6df7307d
-
Filesize
49KB
MD5fd04b292d5a371d7b386379c07effbc6
SHA184f3636c290e83ea0a2d95bf6cb909fbd9ebf455
SHA25688a52207a46168f3e2c0b3c490f740825ebe92b483561c846b4910d6c438049a
SHA512eab791e1c3fb11b924164e86c276927e62450497997e672151d95c4681ecfef74100dfbdf6ea4ef51a75b17941996791418e2a87f598f61f95a397adfab5b1ec
-
Filesize
45KB
MD5ecb419d0e56c120d2f087de92ebfc00f
SHA1138226c64b70062bc2d709951716011efe3b6cf6
SHA256f7eb8d0e51c3128a1c9a3444f618d23ffd358834e118f23ffa8535be33c58c36
SHA512773ea82ea1921329571f63c7812f5611ca01cb812a7a27eebc49982b68b9109337369976efa749e0e7b6bf804ff1c798ec7c56163696f61bebcc8f4d23391f60
-
Filesize
134KB
MD5b45ad85aa50e0790368459ffb109dbff
SHA190f241e1b01fbd82717909f3062f38fe37975897
SHA256e05e3c2b9c03c7784f70cd458d094b2e5ce65cf56ef39092a681b3fe079ac253
SHA512d9a058f5708001ac44a331ec11774ff57474bc759a597a9edf675dabb1c9bcaf7b9c122fdb72f5b4619cb095fb5b077e0c9d5c5109c78a00eb15a81b086151de
-
Filesize
182KB
MD52ad4f551e7dba30131e68b50f554216f
SHA1a40ff47af1c7231d910f0f1afb7f71362fc15f22
SHA25602b2f8c8ac0f7664f73f91650213c7c25578cf00e2e8cf34db726250e4b9da6f
SHA5125508c982f20923f7c03c7300f4c91f1771a4e7f459aefb49a14411f3439b2231527154188fab939082da59b16f7befdcc4c8700bed68240c9d11792777b1dd45
-
Filesize
67KB
MD530e40b118b62dc58eed7aa7451589679
SHA1142f44262cfd39214e08ecdd7e35352c22ef6a9d
SHA25655004e7f27cf0e708934efe1a8ab9f483e8a67f89ab74ca86d21d1aa6e87a8fd
SHA512c390a21c6119898017c555cba0f61b0fdd95cb1934f5987fab866d369eccce1a46b0bc75f36517715e3b7b5d1980a489ecc37c97eb6f4b940b78577cc52d50c9
-
Filesize
200KB
MD5c1efc6e631610be2bf77685da576f75e
SHA1f409260658c063914379e45ad3f496f30f5c3bea
SHA256331ef7e3d4932df7f9f90a373bdac74fd76f016920214c00e4e19dea4fffb41b
SHA512f04ed1e1b68d5959bbaea93febf9c2a437cb0bd7867722ed1b8f9b864814a61a902583d329e1e11d764d03490c6c914c303d469dec88a34c21c8e4aa4f4ed15b
-
Filesize
313KB
MD5be5dd8b7ee665c298c372c4883c3c15e
SHA1f996f23d5a9d9702e564b94a658dddba4e185660
SHA256ecc729d531520e7efb7fc1f228032466412c913df6bba13bdab252813dd01098
SHA5126cf239a6c29ce95def999c786d5b3836e7355f56fe7fc3210f6e1123e83d97a3badc5a5e1afe7b1718195bfd4d0a7223f2fa9af6214e2af5a0922532d5078930
-
Filesize
96KB
MD5a6062ac8942ca9055e5358fcf833d538
SHA1d98f1f43ef9c332dcc8f52cae52802dc83ab158c
SHA256826d889778069482e247c343f55881f736fe659b1d109bef3f72ad2766b434d8
SHA512cbc4c6c1e61899d7123a5a9a37bb67059aecc0659918d851d1741df3b224be75dcccee4783cc775432f41adbc35be5ed5fb618f32a33bcb8b9572a7b663215bf
-
Filesize
126KB
MD5d2e9ea16b76548f0324af1c25e3c2f67
SHA16785c7ccc60084e918b86532f2d074476e687ac5
SHA256527a8c08ad778e2d87065daa4e86110a4e0fd5323f05ea0fe7612b8994199c29
SHA512b60f08beb1bcf93ba3688c2bf90d1b261d9c4866ae40ca35828b63cfa558cf1ac1cdc185978af6f6ea8245dc870d4a364ef7d85940ac227f0718ec64e837f4b5
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
104KB
MD5c4bfe9057fd60b888bdc54e3c6079e2e
SHA1813e7a6e8562ef1477a27f6037c3d637ae4cd064
SHA2560d95addd91c4465e9e47cf89c43db07fd97dba0db01d140a18d4ae568ab921d9
SHA512753e984ff9c3e6a0abf67c73ae33182a855aef717172e2237d1461f78ed65f0f92f9976f9bc8eefd0ae83044fbcf853f8d84f987e27b0a6648abf80b8a10ae04
-
Filesize
232KB
MD53e7a4779aa32eb1310c91a2c6725f4aa
SHA16079ec118994380414471d2e8271b675f6f66365
SHA25638102f6164afb9d53f030679d6dde4788d6c37c0610f4352dc0cfaafd551b9b6
SHA512aca0233ec5106d62b8ead57206eb39c225a5741ad9130ffe2b73694cd27198b5636d9ecd91dca8e60732b6fe734ee3a663ade4a8d2daa4196bdf4ad43f3c1d0a
-
Filesize
262KB
MD55cda8ecff9ddc4b4f41558060ffd8ff7
SHA1632352e1acd873bef06eb239ae3925dfcf4dc4ad
SHA256d9062bf510a6cb1b09f0550eb5e6ef44fb8ca7e0392ba6ff5429900b4119f491
SHA512e289aee0fa97d723107a36a48ea316ec2e8f2d2abb8714c7262225c5b6b3efced3817c5552e46b8e98acb88a08451a5ef6775b500494ccdb0f019aa044f2583b
-
Filesize
225KB
MD52edfb0b0091f7a2a760b09a62660351a
SHA15f916fcd42d369690a942c9f495b16eacdea6fa8
SHA256276a285fc03ad62fc9359e24a3da86bccbce3622ed4fc2dfd1bb268f1bda1f75
SHA5122ea921c0ebc143c1e489e6f96d973ba48bf95d959fae18f0dc4388927efbd38c5f8aeed45ab06b910272c6a9ef01ba2a984be2534dbec35b5f99a3e52f8e46d6
-
Filesize
291KB
MD55bbc1862fd7fb90ab58e13cf6aeed2ee
SHA1ecaaeaa67147deadafd6f19e2ddb9c652f359373
SHA2564a3456a91265fcc0eb93c4d81a85bd6afbc8cc4c1bef855ce4fb03a5fe1c92c9
SHA512853dd8bd80e03df5a68dfe54cc895e8cb6fe08f4e72b9f2353599130ed11995728a692a49b5ef7996e2f303c5f6f72cbe1d9e869aba6f7043a68d7f5fb056329
-
Filesize
79KB
MD5a80e536bdbe21bc787a9c69218d29b04
SHA16d469759f2cb614ba2c7e1ed4aaa5e354b06e5bf
SHA256c5790c8eb46b257d83e755fec8687815109c35653add2636b238db5a9d1299bf
SHA512545ef081ee21db1e148f396df091d7c6805cc75e6a5f96b78f143a0dd98b3d40a1295b1d4cd0a8e1fcd43033e0199f28f7b68a954003ba0de3ac25e8d42501b8
-
Filesize
167KB
MD5f9d260ee869a39203652f1816ece3905
SHA15f5e6579a00ebcc43ef1d9fd2b3bb3eaeceba37d
SHA256b0d2c26987e4d99f85ae720d788454f0deaf840b850b88f125943dd294c39865
SHA51295ff1a8a46b18abe35cbc464b7b40b0bc959eb115da0b57c970a446b34dc655ba6d7a2943de060162fb0dc7a2cb1e9883ad867b6b97e4a04ed8af5520269a901
-
Filesize
801KB
MD59808b22db9707c31aee4f4d63d93d0b3
SHA1d35940130dd37b0e15d6ee0d5e79c256ec2a59f0
SHA256656cbbe1c8aeeed455d7cccd3285fb9489f412acf14ea0b2b6fc746f46ccfa05
SHA512334d203a129a7b2e1492d10e7f4bbfc1bad25e3337adcec13740f313312ba248f9de187af66d71f897ad1a4480037db8e47b83ae06682c22434f4416b791d902
-
Filesize
540KB
MD545385f7b95e5f6f9fccb530b6922ac70
SHA1aa71754967d957060ee0f3b01643d249d9d416ee
SHA2563f48c8692ca81f36ba76cc72982cf11b6ef260e4aa907fe4798eae7a1be14730
SHA5120b529d57b139eb465bdce467a7a658cc31b6bc8a268034d66345befb8b6df165df35ee62e6fc76ee7bd5e09b3ee430c6135288ceb47291fd4a84d9f5db42aad6
-
Filesize
683KB
MD5236e8e6e5458d601147d6a73d804c780
SHA18556eaa67fde8479e972b06d9cac78175afa9116
SHA256aa872b54b2b6ed6c995ef51aa065da1a3b716a30bfaa79a70598e674b78e95ee
SHA512fc9881a81be30702071e25689591c10d55f5a1b108310c90ce93943b665e88786a2290136cdef547bf02d260c1f78ef56457906c49f9f2c884e618d3df7a278d
-
Filesize
328KB
MD5582713baa5af5d84f6497839a879f745
SHA124f266d747aca6e55a28ff76dd7febfa90617d8a
SHA256df2eaf98a3b19fcd427d9b2402c5189ba18843a808892eadab48d3a201f0864e
SHA512a28e8544ecdb611a5901c1e42ca298c1b8e5edf00df3c536ebdee2909c2e5c269099ad4e0b4bc183a08266528191ef841fc467c403aa2fdaf5264cbb84f50eea
-
Filesize
64KB
MD597444a36ac9e05d00083fbd9d6080b26
SHA1ea55ec2a11263895472dd148203c6b8360a35035
SHA2569999651b868b55429d84f9d92b1475cbc92e97dfe7849182dde23868cdd330c6
SHA51285c646f8778785f3ed5c8838f2fc3e3163275c2f58a490bfd66f1f3aae3f6f3b5b3fdb830450f1a12622061392f7c383d5bde6f318bb71e419b1e3677166afb1
-
Filesize
998KB
MD5a73677e753f1b0d4895eb2df1eeecbea
SHA18f84707c13d5af3a7b6fc15b39a35e730af8d22b
SHA2561157ef75f87573266b4c2f78874bb78aa9ec7f9a4b5eb8f65c75db2ae84c0f19
SHA51259f34dcaa90307b53a07c93b8f5b3f088d401f709b9f8cff7b14aa1e4cc6297c3bb58c719b5581ab358b46b128e5ad8d30a627754f0bc3cb594aead23d8717b8
-
Filesize
94KB
MD5d98e78fd57db58a11f880b45bb659767
SHA1ab70c0d3bd9103c07632eeecee9f51d198ed0e76
SHA256414035cc96d8bcc87ed173852a839ffbb45882a98c7a6f7b821e1668891deef0
SHA512aafbd3eee102d0b682c4c854d69d50bac077e48f7f0dd8a5f913c6c73027aed7231d99fc9d716511759800da8c4f0f394b318821e9e47f6e62e436c8725a7831
-
Filesize
14KB
MD5fa6c0be83c67da5104b75e002f5e501e
SHA17d19175333426059de172935e9bb848dc54d46a6
SHA2565aa48f654788251715dba50afaba07fdea3e37804ba4fa7ce9188af772952998
SHA5122e4329ba6b75644a70046525deeed069ce547f6a8a2ec6ede99353b1fe743bf35713aa04375e2646e24a74a393a3984b8723506dcea19feaea722888f9936638
-
Filesize
81KB
MD51533877621cc9288b6311b2057eed774
SHA1db163da5432138563cc20b867b172a9b71e5abea
SHA2569a0e244b41c9a5cd46bcada7c83f3f97cd3c97dde7b15fd7b5ecd382a8e8eab8
SHA512e2e77ae727aca03e0b448a3405436a0f7273cb9b391d4fc3d4463a61b5883ed754a8ef975d8713bc3db8a79aa8ce628740ce211b02c381e94360aacfda1244ff
-
Filesize
125KB
MD5646cbfdb49d4e5df7d4c6c1b1470fca1
SHA112ca69929014025164c67d8306d94b6588f3aa87
SHA256aa6593ae57b60d872b902145d75aaaf58c38a0f27a4cd71764181e532984548c
SHA512ea0ddd8c8537d93d07d2b9654d4400aa5016d21b94da2a25924a8a589f32f15757a4314415b56b6dd859fe4a0e050451c808f8282310417d045aa23e784fc2dd
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
172KB
MD5c4a9cab4b10716866597e574b2731cd0
SHA1a84d8a27e99e7ba4d82f599a15123d9067f02304
SHA256b98cebf91fc7176cc34277c6281ff45c442153522d011d15857f873bb2b4a99e
SHA512dd5536d766929a7c9650737d23cbcc5a89c73d1b3043a68658f9dc2a25563e1ea422b3c0c870d684876d5c35d2050c72398d014d20b334e174e36518ad26109e
-
Filesize
84KB
MD59e4a732a98236cadbdaa4eb493710d7e
SHA155bf5a0e438452c460d9767003dee94eb08cb8b4
SHA256360fc5ab4c36320f0a12bfa77b9fcaf445729dcf202aeed62c71d8c8c6a698ab
SHA5120ddef284f686949511865d91a3086279d7dc100bbedd35c7d3180b089095118225c32173978193858cc436cc257dcdb6407a736af233fbdfef5cb7a3dbf16966
-
Filesize
64KB
MD503e03703fe5fc79e7f1d5e44e3c27b1e
SHA18f25ba10b5e479ae63c4c3867475502e1a6499fa
SHA256504111bf8fb1386663a5f92bab46dc7b1171fb9c9a8b8cd100945a6c6bde311e
SHA5121926c83c1f301800c289b16458ae30bc0927b231a5b11b12663d8a608c5ded27d8d73987ec6af46011e2f2b4e7e4c65fa7cfd50e5370d00e47784982874b88fa
-
Filesize
100KB
MD5eefb8035297fc0120d30755d8e7e398c
SHA120c025fdc5a735ad5b96013021f578b218af1bf9
SHA2566f52522b2835ef20d270a453ca9deb8c9e1ae4c941302565b2b75238169a4cfc
SHA512ff2e4af0110eb3ec9e47c20c45788fcc1b9fc782d16cb6b4be2c3dfddac0e9b0f72f1ac6503da9aadd5a2989702b69c9f1e8d31f92fbe2463c9dfc6c90827c7a
-
Filesize
132KB
MD5055e94096e558f34a0e0867f01f90e80
SHA1fd2816c97495050300abfa300840579297c23910
SHA25666359a4fff22c00221c235ebc7256d948e641f6dc7331106e2a005af80437575
SHA512602103b778a7ea39c0513f2ee388d70957716ee112d49e90839754de47879b02c99019f596c619eb1251252e3d94711c44ac6cc6057adcbb8078eb71685b4384
-
Filesize
182KB
MD5e782c238ee0cd27b0528fb65ed202f12
SHA12bb45aa5b7193d12938af8d390592d8965e4fdab
SHA2566792dfef6d76994621137251fcc8d76421a9ba4154d08599fc9fd6396ab99a75
SHA51290e1a81491922129bfb8f14c0f6d51eb106525bfbc7f543e39bdfaa4de5c316585fc4641c04ca309d0fa8697370fc35e8c9ea6672170a2eb149ffa2156675f0c
-
Filesize
94KB
MD517439ed3258ab02127f0d640ca960fe0
SHA13058f712f2fcf207bc7b21610cdd6a8c3422055d
SHA25663343fcd0b6681ec3093086f3290616dcf8526bb7918cebcadbe3fac94c38084
SHA51268fb94c431fcce0c7d7d289e6c1a5289fa45e789041da3e1094547c0b67cb9bf9b24b34043a4df7fc6798604d37b63c33be4f388f451900f4677d0cdede5e57c
-
Filesize
136KB
MD5f525e848da48bdeb34c95260f7bbcded
SHA172a5adb584d7a60034c62d33593cdbf6352b658e
SHA25615f389f00a1844693eca6dad2c8e035d15d712186acc62ce4bffc6fcc355cbd1
SHA512735a3bd5d3c4c724637fd4e084a70e499a5d030cb76cbef275dfdbbe4352c2762deb732f230a8f0b10f5b95ce87c0a9de8563b0f965da7b58288ef132a59165a
-
Filesize
120KB
MD5007b9d8292bcc6e7c53fb5919f4a0905
SHA114a2cdb68d078482d673c3b9525e278d45c207eb
SHA2561e9add4b1ef22942864adfdc174d2fed439fbe646f518f08207e72b83b7bc4ad
SHA512bb9095b50a6e326c3568dcf3a3e3ff958907f7581b2d15a4390e765be71a77917216a3013e0bb2383bbc2c24fe6da1896902fd8cec91fbb9dfa145132b184d5f
-
Filesize
272KB
MD543c66bb7924057abaf91e8ac6cc54072
SHA1d05479ac2b8016f9435a75c5ec9506ff42b56563
SHA25635852b3d65c820d9d95c4b5105b5f8ace19a951932111c8b6929b0651591288c
SHA51269b9b5d98e2d098cd48c645bd0dab4dbeadac1614a9e3e373c03c4c171a676188a2874524b2231404b18c742d144d1f4f7722f44daeb4da733eafd42c17d1f62
-
Filesize
125KB
MD559adb69c51951f0f181b4a6e56620ce4
SHA17cc3c0092dc74522c7d41938f7dcf6eda03a4c26
SHA2564578fd9e448db0aa989e376636ce6ab13210e10ae54ffbad36fca8de670b829c
SHA5121bbd11aaf8356b88baaf299f1dde28a90aa1ea191de03f459e53c02bdfea16b6eef1f1e4b7d6cf4353e98e56afb54fc52c8faf2e6fa367249f5c9b9104b9398d
-
Filesize
160KB
MD5693ba5ae901d98f88160b017dc60ca75
SHA190b83add30ea9a1cbb2cdd8d5f79225dea1e4399
SHA256bf0daf0cac027f55844a03bca86c084bd57198b7e2c3abe7d0d14bb1a27a2814
SHA512cd47fa20f105715eb87040a790e1f09c0825ec32962621321b30420584d6c5a2dbeef02427b9d937040142b7b244a0a27d19b5ef7bb108ce2557153e57f3d287