Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20-01-2024 06:15
Static task
static1
General
-
Target
latestrocki.exe
-
Size
6.5MB
-
MD5
0518d9c6db9a614769bf43fbff180167
-
SHA1
928084a70bffb6eb474658dcf062d74f5ca84f68
-
SHA256
6369f6e4a8398cccbbebef2ae7078834d3f92d499257a59b4f9142bd5b079057
-
SHA512
a3a9ae62006133d5e6e7d74527732d6f245c7bfbb8770fba371e877c56b47b61fd5e809eac7e462013c811ab4e49c1162ce16eec7dd15db76530ea09c2a0cbf1
-
SSDEEP
196608:21qELhrUIpNiSF4B3ri+e7UDV2BnIuaR:shRpNPcrrDVgnIH
Malware Config
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
fabookie
http://app.alie3ksgaa.com/check/safe
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdpo
-
offline_id
Bn3q97hwLouKbhkQRNO4SeV07gjdEQVm8NKhg0t1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-FCWSCsjEWS Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0844OSkw
Extracted
risepro
193.233.132.62:50500
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral1/memory/2860-176-0x00000000037B0000-0x00000000038E0000-memory.dmp family_fabookie behavioral1/memory/2860-279-0x00000000037B0000-0x00000000038E0000-memory.dmp family_fabookie -
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/2984-495-0x0000000000240000-0x000000000026B000-memory.dmp family_vidar_v6 behavioral1/memory/984-497-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 behavioral1/memory/984-1591-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 -
Detect ZGRat V1 2 IoCs
resource yara_rule behavioral1/memory/1972-635-0x000000001BC30000-0x000000001BD62000-memory.dmp family_zgrat_v1 behavioral1/memory/1972-1585-0x0000000000880000-0x0000000000900000-memory.dmp family_zgrat_v1 -
Detected Djvu ransomware 13 IoCs
resource yara_rule behavioral1/memory/1248-387-0x00000000006D0000-0x00000000007EB000-memory.dmp family_djvu behavioral1/memory/888-386-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/888-391-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/888-393-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/888-420-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2804-430-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2804-432-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2804-450-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2804-451-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2804-464-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2804-463-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2804-461-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2804-1157-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 10 IoCs
resource yara_rule behavioral1/memory/2716-51-0x00000000029C0000-0x00000000032AB000-memory.dmp family_glupteba behavioral1/memory/2716-52-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2716-161-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2716-164-0x00000000029C0000-0x00000000032AB000-memory.dmp family_glupteba behavioral1/memory/2480-169-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2480-207-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2480-229-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2872-244-0x0000000002980000-0x000000000326B000-memory.dmp family_glupteba behavioral1/memory/2872-245-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2872-431-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Modifies boot configuration data using bcdedit 14 IoCs
pid Process 3000 bcdedit.exe 2416 bcdedit.exe 956 bcdedit.exe 832 bcdedit.exe 2064 bcdedit.exe 1844 bcdedit.exe 2756 bcdedit.exe 1284 bcdedit.exe 2780 bcdedit.exe 1224 bcdedit.exe 2608 bcdedit.exe 3012 bcdedit.exe 2888 bcdedit.exe 2528 bcdedit.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\Winmon.sys csrss.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2472 netsh.exe -
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE 39 IoCs
pid Process 2676 InstallSetup7.exe 2712 toolspub1.exe 2716 31839b57a4f11171d6abc8bbc4451ee4.exe 2860 rty25.exe 2752 BroomSetup.exe 588 nsi453D.tmp 2480 31839b57a4f11171d6abc8bbc4451ee4.exe 2872 csrss.exe 2896 A41C.exe 1916 patch.exe 2012 injector.exe 1248 BD86.exe 888 BD86.exe 1704 BD86.exe 2804 BD86.exe 1676 D4ED.exe 2984 build2.exe 984 build2.exe 1600 EAEE.exe 1972 EAEE.exe 1736 build3.exe 1404 EAEE.exe 2056 EAEE.exe 1644 EAEE.exe 1280 EAEE.exe 572 EAEE.exe 580 EAEE.exe 2852 EAEE.exe 1380 EAEE.exe 1600 EAEE.exe 2700 EAEE.exe 2404 dsefix.exe 2696 5E79.exe 2708 windefender.exe 628 windefender.exe 2824 mstsca.exe 2712 mstsca.exe 1344 mstsca.exe 1788 mstsca.exe -
Loads dropped DLL 49 IoCs
pid Process 2528 bcdedit.exe 2528 bcdedit.exe 2528 bcdedit.exe 2528 bcdedit.exe 2528 bcdedit.exe 2528 bcdedit.exe 2676 InstallSetup7.exe 2676 InstallSetup7.exe 2676 InstallSetup7.exe 2676 InstallSetup7.exe 2676 InstallSetup7.exe 2480 31839b57a4f11171d6abc8bbc4451ee4.exe 2480 31839b57a4f11171d6abc8bbc4451ee4.exe 848 Process not Found 1916 patch.exe 1916 patch.exe 1916 patch.exe 1916 patch.exe 1916 patch.exe 2872 csrss.exe 588 nsi453D.tmp 588 nsi453D.tmp 1248 BD86.exe 888 BD86.exe 888 BD86.exe 1704 BD86.exe 2804 BD86.exe 2804 BD86.exe 2804 BD86.exe 2804 BD86.exe 1204 Process not Found 1040 WerFault.exe 1040 WerFault.exe 1040 WerFault.exe 1040 WerFault.exe 1972 EAEE.exe 1972 EAEE.exe 1972 EAEE.exe 1972 EAEE.exe 1972 EAEE.exe 1972 EAEE.exe 1972 EAEE.exe 1972 EAEE.exe 1972 EAEE.exe 1972 EAEE.exe 1916 patch.exe 1916 patch.exe 1916 patch.exe 2872 csrss.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2864 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\39bde40d-8da7-42bd-aeea-fef50408022d\\BD86.exe\" --AutoStart" BD86.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMon driver. 1 IoCs
Roottkits write to WinMon to hide PIDs from being detected.
description ioc Process File opened for modification \??\WinMon csrss.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 1248 set thread context of 888 1248 BD86.exe 59 PID 1704 set thread context of 2804 1704 BD86.exe 65 PID 2984 set thread context of 984 2984 build2.exe 71 PID 1600 set thread context of 1736 1600 EAEE.exe 76 PID 2696 set thread context of 2164 2696 5E79.exe 121 PID 2824 set thread context of 2712 2824 mstsca.exe 133 PID 1344 set thread context of 1788 1344 mstsca.exe 138 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\Logs\CBS\CbsPersist_20240120061538.cab makecab.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2768 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1040 984 WerFault.exe 71 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A41C.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A41C.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A41C.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsi453D.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nsi453D.tmp -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2928 schtasks.exe 2476 schtasks.exe 2304 schtasks.exe 2632 schtasks.exe 3012 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2868 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-871 = "Pakistan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-562 = "SE Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-82 = "Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-551 = "North Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-572 = "China Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-492 = "India Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-161 = "Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-100 = "RD Gateway Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-671 = "AUS Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-742 = "New Zealand Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-4 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-341 = "Egypt Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-681 = "E. Australia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-911 = "Mauritius Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-132 = "US Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-262 = "GMT Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-21 = "Cape Verde Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 rty25.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a42000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 BD86.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 BD86.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 BD86.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 0f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c1320000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 rty25.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2712 toolspub1.exe 2712 toolspub1.exe 2716 31839b57a4f11171d6abc8bbc4451ee4.exe 588 nsi453D.tmp 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 2480 31839b57a4f11171d6abc8bbc4451ee4.exe 2480 31839b57a4f11171d6abc8bbc4451ee4.exe 2480 31839b57a4f11171d6abc8bbc4451ee4.exe 2480 31839b57a4f11171d6abc8bbc4451ee4.exe 2480 31839b57a4f11171d6abc8bbc4451ee4.exe 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2712 mstsca.exe 2896 A41C.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2716 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 2716 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeShutdownPrivilege 1204 Process not Found Token: SeSystemEnvironmentPrivilege 2872 csrss.exe Token: SeShutdownPrivilege 1204 Process not Found Token: SeDebugPrivilege 1972 EAEE.exe Token: SeSecurityPrivilege 2768 sc.exe Token: SeSecurityPrivilege 2768 sc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2752 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2676 2528 bcdedit.exe 32 PID 2528 wrote to memory of 2676 2528 bcdedit.exe 32 PID 2528 wrote to memory of 2676 2528 bcdedit.exe 32 PID 2528 wrote to memory of 2676 2528 bcdedit.exe 32 PID 2528 wrote to memory of 2676 2528 bcdedit.exe 32 PID 2528 wrote to memory of 2676 2528 bcdedit.exe 32 PID 2528 wrote to memory of 2676 2528 bcdedit.exe 32 PID 2528 wrote to memory of 2712 2528 bcdedit.exe 31 PID 2528 wrote to memory of 2712 2528 bcdedit.exe 31 PID 2528 wrote to memory of 2712 2528 bcdedit.exe 31 PID 2528 wrote to memory of 2712 2528 bcdedit.exe 31 PID 2528 wrote to memory of 2716 2528 bcdedit.exe 28 PID 2528 wrote to memory of 2716 2528 bcdedit.exe 28 PID 2528 wrote to memory of 2716 2528 bcdedit.exe 28 PID 2528 wrote to memory of 2716 2528 bcdedit.exe 28 PID 2528 wrote to memory of 2860 2528 bcdedit.exe 30 PID 2528 wrote to memory of 2860 2528 bcdedit.exe 30 PID 2528 wrote to memory of 2860 2528 bcdedit.exe 30 PID 2528 wrote to memory of 2860 2528 bcdedit.exe 30 PID 2676 wrote to memory of 2752 2676 InstallSetup7.exe 29 PID 2676 wrote to memory of 2752 2676 InstallSetup7.exe 29 PID 2676 wrote to memory of 2752 2676 InstallSetup7.exe 29 PID 2676 wrote to memory of 2752 2676 InstallSetup7.exe 29 PID 2676 wrote to memory of 2752 2676 InstallSetup7.exe 29 PID 2676 wrote to memory of 2752 2676 InstallSetup7.exe 29 PID 2676 wrote to memory of 2752 2676 InstallSetup7.exe 29 PID 2676 wrote to memory of 588 2676 InstallSetup7.exe 37 PID 2676 wrote to memory of 588 2676 InstallSetup7.exe 37 PID 2676 wrote to memory of 588 2676 InstallSetup7.exe 37 PID 2676 wrote to memory of 588 2676 InstallSetup7.exe 37 PID 2480 wrote to memory of 1864 2480 31839b57a4f11171d6abc8bbc4451ee4.exe 40 PID 2480 wrote to memory of 1864 2480 31839b57a4f11171d6abc8bbc4451ee4.exe 40 PID 2480 wrote to memory of 1864 2480 31839b57a4f11171d6abc8bbc4451ee4.exe 40 PID 2480 wrote to memory of 1864 2480 31839b57a4f11171d6abc8bbc4451ee4.exe 40 PID 1864 wrote to memory of 2472 1864 cmd.exe 42 PID 1864 wrote to memory of 2472 1864 cmd.exe 42 PID 1864 wrote to memory of 2472 1864 cmd.exe 42 PID 2480 wrote to memory of 2872 2480 31839b57a4f11171d6abc8bbc4451ee4.exe 43 PID 2480 wrote to memory of 2872 2480 31839b57a4f11171d6abc8bbc4451ee4.exe 43 PID 2480 wrote to memory of 2872 2480 31839b57a4f11171d6abc8bbc4451ee4.exe 43 PID 2480 wrote to memory of 2872 2480 31839b57a4f11171d6abc8bbc4451ee4.exe 43 PID 2752 wrote to memory of 2940 2752 BroomSetup.exe 47 PID 2752 wrote to memory of 2940 2752 BroomSetup.exe 47 PID 2752 wrote to memory of 2940 2752 BroomSetup.exe 47 PID 2752 wrote to memory of 2940 2752 BroomSetup.exe 47 PID 2940 wrote to memory of 2596 2940 cmd.exe 45 PID 2940 wrote to memory of 2596 2940 cmd.exe 45 PID 2940 wrote to memory of 2596 2940 cmd.exe 45 PID 2940 wrote to memory of 2596 2940 cmd.exe 45 PID 2940 wrote to memory of 2304 2940 cmd.exe 46 PID 2940 wrote to memory of 2304 2940 cmd.exe 46 PID 2940 wrote to memory of 2304 2940 cmd.exe 46 PID 2940 wrote to memory of 2304 2940 cmd.exe 46 PID 1204 wrote to memory of 2896 1204 Process not Found 53 PID 1204 wrote to memory of 2896 1204 Process not Found 53 PID 1204 wrote to memory of 2896 1204 Process not Found 53 PID 1204 wrote to memory of 2896 1204 Process not Found 53 PID 2872 wrote to memory of 2012 2872 csrss.exe 56 PID 2872 wrote to memory of 2012 2872 csrss.exe 56 PID 2872 wrote to memory of 2012 2872 csrss.exe 56 PID 2872 wrote to memory of 2012 2872 csrss.exe 56 PID 1204 wrote to memory of 1248 1204 Process not Found 58 PID 1204 wrote to memory of 1248 1204 Process not Found 58 PID 1204 wrote to memory of 1248 1204 Process not Found 58 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\latestrocki.exe"C:\Users\Admin\AppData\Local\Temp\latestrocki.exe"1⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2472
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Manipulates WinMon driver.
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:2632
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:584
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:1916 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER6⤵
- Modifies boot configuration data using bcdedit
PID:3000
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:6⤵
- Modifies boot configuration data using bcdedit
PID:2416
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:6⤵
- Modifies boot configuration data using bcdedit
PID:956
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe6⤵
- Modifies boot configuration data using bcdedit
PID:832
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 06⤵
- Modifies boot configuration data using bcdedit
PID:2064
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe6⤵
- Modifies boot configuration data using bcdedit
PID:1844
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 16⤵
- Modifies boot configuration data using bcdedit
PID:2756
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}6⤵
- Modifies boot configuration data using bcdedit
PID:1284
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 06⤵
- Modifies boot configuration data using bcdedit
PID:2780
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast6⤵
- Modifies boot configuration data using bcdedit
PID:1224
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}6⤵
- Modifies boot configuration data using bcdedit
PID:2608
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn6⤵
- Modifies boot configuration data using bcdedit
PID:3012
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows6⤵
- Modifies boot configuration data using bcdedit
PID:2888
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe5⤵
- Executes dropped EXE
PID:2404
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v5⤵
- Modifies boot configuration data using bcdedit
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2528
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:2928
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:2708 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:2156
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\nsi453D.tmpC:\Users\Admin\AppData\Local\Temp\nsi453D.tmp3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:588 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nsi453D.tmp" & del "C:\ProgramData\*.dll"" & exit4⤵PID:2448
-
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- Delays execution with timeout.exe
PID:2868
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2940
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240120061538.log C:\Windows\Logs\CBS\CbsPersist_20240120061538.cab1⤵
- Drops file in Windows directory
PID:1268
-
C:\Windows\SysWOW64\chcp.comchcp 12511⤵PID:2596
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F1⤵
- Creates scheduled task(s)
PID:2304
-
C:\Users\Admin\AppData\Local\Temp\A41C.exeC:\Users\Admin\AppData\Local\Temp\A41C.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2896
-
C:\Users\Admin\AppData\Local\Temp\BD86.exeC:\Users\Admin\AppData\Local\Temp\BD86.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\BD86.exeC:\Users\Admin\AppData\Local\Temp\BD86.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies system certificate store
PID:888 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\39bde40d-8da7-42bd-aeea-fef50408022d" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\BD86.exe"C:\Users\Admin\AppData\Local\Temp\BD86.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\BD86.exe"C:\Users\Admin\AppData\Local\Temp\BD86.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2804 -
C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build2.exe"C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2984 -
C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build2.exe"C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build2.exe"6⤵
- Executes dropped EXE
- Modifies system certificate store
PID:984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 984 -s 14727⤵
- Loads dropped DLL
- Program crash
PID:1040
-
-
-
-
C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build3.exe"C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build3.exe"5⤵PID:1600
-
C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build3.exe"C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build3.exe"6⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:3012
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D4ED.exeC:\Users\Admin\AppData\Local\Temp\D4ED.exe1⤵
- Executes dropped EXE
PID:1676
-
C:\Users\Admin\AppData\Local\Temp\EAEE.exeC:\Users\Admin\AppData\Local\Temp\EAEE.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\EAEE.exeC:\Users\Admin\AppData\Local\Temp\EAEE.exe2⤵
- Executes dropped EXE
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\EAEE.exeC:\Users\Admin\AppData\Local\Temp\EAEE.exe2⤵
- Executes dropped EXE
PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\EAEE.exeC:\Users\Admin\AppData\Local\Temp\EAEE.exe2⤵
- Executes dropped EXE
PID:580
-
-
C:\Users\Admin\AppData\Local\Temp\EAEE.exeC:\Users\Admin\AppData\Local\Temp\EAEE.exe2⤵
- Executes dropped EXE
PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\EAEE.exeC:\Users\Admin\AppData\Local\Temp\EAEE.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\EAEE.exeC:\Users\Admin\AppData\Local\Temp\EAEE.exe2⤵
- Executes dropped EXE
PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\EAEE.exeC:\Users\Admin\AppData\Local\Temp\EAEE.exe2⤵
- Executes dropped EXE
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\EAEE.exeC:\Users\Admin\AppData\Local\Temp\EAEE.exe2⤵
- Executes dropped EXE
PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\EAEE.exeC:\Users\Admin\AppData\Local\Temp\EAEE.exe2⤵
- Executes dropped EXE
PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\EAEE.exeC:\Users\Admin\AppData\Local\Temp\EAEE.exe2⤵
- Executes dropped EXE
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\5E79.exeC:\Users\Admin\AppData\Local\Temp\5E79.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2112
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2164
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2492
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:628
-
C:\Windows\system32\taskeng.exetaskeng.exe {CBF64218-D11A-4DF7-8355-0E74B663B7D2} S-1-5-21-1268429524-3929314613-1992311491-1000:XBTLDBHN\Admin:Interactive:[1]1⤵PID:688
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2824 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
PID:2712 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"4⤵
- Creates scheduled task(s)
PID:2476
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1344 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:1788
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
3Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5e31a2a18a6a4690a4055dd16e5d940d9
SHA1068b665c7ecad288aa47a5b49fca2bb835007529
SHA2565864fe5f730abef927b53ccd842790a30a281b1aaca7f7311087947a960d5c62
SHA512ad759fc658e9af123064040088394baffa5fb0ad02932879ddc91c93644740a5d86738008f224ab111cfaed17e6a93adbd2f5bf4902356fbb2d8d12940a835d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5945744cb5097b07721fdf90833e935cc
SHA1b05b5855fa0034c196492f5c85e10c4c66736735
SHA2561867f60479991d3e21a76a0873c34bf0e32ed1f04529ab3da637af78ab12185e
SHA51273525b044d2a7cc736629117516947b98b2d47cdbc0e0c53482b79804e4930cf218f1eb4a6a681453ac1a9fd167e485ce623b73f7db086c2455801df216e170a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc9f8019b5e302ba02a58ba6d300e5c1
SHA1c51e263f8db785d91ffe85370c26e5b9b02613ad
SHA256b7d9c49df0d4fee2b749eb4e4b82e47a34618610883f3fbe1efb1148ae4b483b
SHA512367b0ee582d1de26e8893f5450d2d85cad60fa0f82821138f67422d4bf5254398d5e4f789e41f1d802077be7bf9047ae99ed2a42b818c2c109448313959e40e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4b02740262a25b6393d2d1f8270e325
SHA1a0eb8695b9ec800ebfae79007b1cb6b639459204
SHA256fa03c9cc87283dbf959befadd3e8898a59a8f9644e5dd59b624f3499546aff85
SHA5124ab0e689a11edd16960ba30b485992fa2063c02c2913c46d96d368c781bfc50dbb1dbdac2e886eb2462d6e8671c3e2fe2b19780e13f569db230151521d0c9948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acaafbbd6bc6c4b51b04ec9d3d25ed92
SHA189743da161cfd1af619f4af11404e88c5294da2b
SHA2564bc3fdbeea5f316118124c5a657cf751f2d13e231bc588c2164b04f384e801b6
SHA512689d11eb4ca95b3be733c1b9f0ae526f11ea74abb2c82be477a72b01fac32a30ac2732c8e021386eb33c120cf81c8a74a24d115e1bc28d5cba4e78f33f1749af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da1451247939af869f4d8a3244d2bd03
SHA1ec6e3b4bf55ab431105c5dd56f0ea7f3d250ed8e
SHA256b77d95c853809334e571a1dffc784a741cfd03a67e7f799d7e7f50e4d23025f5
SHA51285c06fdda80fd4f7b7e50ea960e94c554b1b94cc5908495c59536b11c8a1615b2b28a0d9421ac2e0a8d0bd856d6898544d1352a826f0fbc606ecfc9c1d89c427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD51dc24de042b099b2273590be2f9cedf1
SHA1572f1528a943b88966dab18326849deb6a6a6768
SHA256f06c1d2d3d4479aa0adc1d66b3e0b698c07ca1093d593a3a464999194ebf4b9f
SHA5128b81a8e3f6b565e76ee3e06efe2506e670f5c96465802dd3e752fb5f3bfe740ae7f88bf119777e50a3638d60d68c42a110e85a6b49dbcc72dd8d3b44c56ea036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD569bfef1bb3605e5bd0b3545cbd16b324
SHA1d694aac520cbdf7597bf277fdeeafffb9f9be106
SHA256024d82fc97309007ba63c4fcb3dc37547480ebaf1693770ed38623b75c641777
SHA5126474ba719638adf8ecac804cc8d75932a5701dd6dc384955effcccc1f2b10c700d556bc20464c6d835330bc8776dc35355b36fbc2f8d9401cfb81832ee048d8a
-
Filesize
221KB
MD5c31c3fc6bc03444d91357d8c5d19dcae
SHA14687c72b5d18ba3814b99288fc0eef268c2062e7
SHA25656ce34eecf44380fff927676814edc5d72c2ae24511b98e0d0f6b019c6d96b5a
SHA51258bd1265318b964e3ef2b7a2ccdc2080084e5291bd5c6ee91f4a3afb37bdde2adcb1d8d5b9c9d8e24511f248808017459fae835393dd360fde62d597586d0139
-
Filesize
54KB
MD5e147b3f61b9169454add3cdcd7be60f8
SHA15960e8f3d080d50c77cdd6baf20199cc61e98b80
SHA256eae3fbd826491921e7035bac6dfed716683d25b5f6c8ab7feecef8240a1e4e4e
SHA5126ea6de36983137636d7015adc841b595f62d7c2dbcddc86378fb37d1080e962d82d5e52516198aca4fdc84100cc4c684d9ea69731c5e5750c08c87daec8aaf1b
-
Filesize
73KB
MD57d970de164e32779860adffa61246032
SHA11fc178dda3336133121a0181bada8d5a04231f7d
SHA256cca893cd1dc62d5c8b3dd2d8750b71f4637dcfe4f199b646cc2e8ea82ea6aec2
SHA5126793cf9a1b357e605c5c6b3533807323212205b0b7e8a8a515e5a7ead46c3bdb6febd59fe7477527706249af9c47b405bafb6aab0e3bfa52059fc4be9cbcfa88
-
Filesize
271KB
MD51a3fe0fddbef939b4b335bfa376a0a4d
SHA13bbe562ada3a67a0c7f82f502638927573f92255
SHA256d558320e1a18b4b34b7cf7f9c185e7781d5ef4b87c11fd95611aa1c70a1bcef8
SHA512813422d81e2745c6068e5bcb1114217091bdba940ab9518c7649385e52dbb8f6a74c18cbf5119cfc2fe0b49d4ddf990cace0729475cc22b678bf616ca7d0c78c
-
Filesize
211KB
MD58c8ef958678c9862a03985f2214c2a4f
SHA1ad0bdc4a219a70a02d98b23687bd352271dda7b9
SHA256b1387fecc8b84654eb44daf5089298da8f180bdca61d520d946bbed5df76e8aa
SHA5123452252ab86d628873a2acc2b992d96ef2422af31136549f329d1573bc70169b74af6e3caa25a1e64dfb769e8dd66dd170968ce7a3b57228055b8e0ed7d2f8be
-
Filesize
39KB
MD5f7fd0353d278c71dfcc1fa3a0e589a7e
SHA1127e62008c3dbbb17e37710d6aae7492279d6f49
SHA25630fc1516238d244bfb849f4cdf568adfdd06463cf8c026e1515739d818d75cb8
SHA5122e697c3dd55339875e644bd00f9d11ff5e4acf544c17f65f68a2111c9f7d0cf43c00b6a78799ef82a6a3dfab143a8b25ac8df4e1aee6017ff8f0ccefbcad72ce
-
Filesize
49KB
MD55cdee2bcac81e93d2c46b08a692c23e0
SHA1eec982a7dfb0cf1bb974ad318f18882422beaeb0
SHA256880d770a8b423d4fe43025cb72997eb5955e91299e876b4ab8e4545965a2902b
SHA512164220a5326815f0900bfdbb661d03c8adbb5440513142935b052ada1b3909c7247a1c53841fa934dcc7530936c253d310b923289efddd3d674c09f308e9a798
-
Filesize
178KB
MD50242ede093b0ee8530678a18eebe85a3
SHA1dba34bc661bc8f3b2b09dc3fe271598508f1a3fb
SHA2563bbeedf4c945e313c31f42d4516a81b2e9deb9f5a93625d67ff14fca3beb293e
SHA512befbfa1da9e5e3b77548b5b762a383a7234adad5aa9fb05cdeb732a181b804db90574b9dfe52f7140ccac4ddbbeabff5db7b96e3d218381bf0234e53cc0e4708
-
Filesize
222KB
MD5fff46bc537f30c2d67734515e2ab6a12
SHA1a032c8d16ce85ec37d295d3d83a43984872eb87a
SHA256d109b598568a7bca1584ecc54ad41e42f5963512bdb58f9abd7e17565aaeb736
SHA5129c664122414150451afd99cb4a941a2300eafe39ed883e53a29350ea308cb6a9ef6a9a950a26392e6ba399367b3d6cdb8dbcacb920b3d47f83d1d2156b759ffe
-
Filesize
149KB
MD5a76bac50ced9a3a8858d579caf92e46a
SHA1701b1a84e07824d1be0a49e6cb915a7349e254f7
SHA256ddc378af7b9b5b4df621b6e4b363ef843b3b94da48cc7837d320c35a561bd64c
SHA51275e29bdec5e53bbfc4116b80e8613663e3fd468d4da6ff25d9a17ba876a1b658bd1d61106e4cc28230749f4391eda3f16ad5cfb2d920bc707cb274002fb27efa
-
Filesize
84KB
MD56cfb9a5af72c695621556494523cadbd
SHA1e3b9fab19a37a0efc6990a4bdd2b6bfd5db28917
SHA256649ccb5880ac3b8451df48e95520943f954d81595457b16cf3aa236e426eeb5f
SHA512e8654eae04e828deb0b7402f369b5822746e20be9b1f8fbd09758bea38781927052ad954faf5b1459fb015da36470d9116ebfedeb51b787c0709c51e0266b6c0
-
Filesize
18KB
MD574a78d6a29ca26b8b97b948e8484d481
SHA151f704688c965ad757fa338d7f6d3c0ef043c39d
SHA25664831b51f8f715945234e3d577372f984377e0f2503c235a12fc385bca0eda15
SHA5126d918ea9f9350fe4f8e89fa71e40ab99c6b4199d6b77584a9be3eedcd60ab8f99c5edbfea4e60dd85d5466f4d058a1eb91c63a9e53e7f2e0fc75d10b301ac1e7
-
Filesize
25KB
MD5789531a86149a875efea569e723b592f
SHA1860da5e5a8cfaea449d497f4057d9019a5cd0b07
SHA256e70240f4ce05643f9ca4e89b9c6c01109c206b8cb3182b55399a807db68c0728
SHA512fc0d717c07d162cc81b330cb5aa36b5a83b88b3818777e8ba6c612938e27e480dc67bf858f54ba6829c4f4b8f9533be6079b097fc2228c135d50016d30fb180b
-
Filesize
71KB
MD542affe8aff1029d15614468ad410c987
SHA1806dbb3e2e7e8ca98e32461031378872dd29ac6b
SHA25696c05043dc15f3d084a5b26dcc05608333a67d8af2c4a91fdba625673ad3cfcf
SHA5126311059fad5e2fa99244df61cefbb08ceb8793045819dc4d69630a066dfb4011e6538e0ffc261033b3c85b5bb18052b506ec4876e0549aa8801569ba22253d69
-
Filesize
56KB
MD55a3a361ff0d108216ea07973dd080b0b
SHA18c612c53306241318dc48577500942d37d351f94
SHA256105baaeb65fa0ba450f55621e5a60068a80ec87f143a640530317d0db6174798
SHA512b15cfd2fca31c6a0576f9da22d5b79b78b64fd91cda9070900bb04535e0a4fbbc9b2c53d2cd8a6bcc660930d1a36a252c31cdcab9ae61a5f6e82dc2bea95e7b2
-
Filesize
108KB
MD5d565143e66798994cffbd5cafb4e481b
SHA1e293bb1d4345b8344491cefca423d12b77f0b240
SHA256010dc2a897f3caa663c58177b87ec466173908ea457d9acb629bbe243b7c3169
SHA51288b39724960ba0dde02dff9be665177219f17d85c15631660650d0cd27a305d4b18beff94eb33f27f16ab32ab07ccabd3b1c45894eb60ec31459bac412b117a2
-
Filesize
146KB
MD5ac8d5197dd35d0566c076b7ee07213be
SHA149e8b98ae2ced200a8b45f1e17e9abb2fc404f22
SHA256f76ec1f31a11f8012e11206366f1ffd31bd223e6ffcadb56ad9604b8918f1c6e
SHA512d121e61456102a4a33f6b5aa31ee89b9171b575efde6e3470837a961847689ec43d3f3e941d7c3d77456187ab8a7e215141f44247395263182fce8f5e25ddd89
-
Filesize
99KB
MD5eb34799b7abf687438ccfca3369f2fed
SHA18f87b592598b164f243ac3cb96a6865ba7abf745
SHA2565827cd343cc86fd5723668b242a839ca2dc627a66bd921e0a62c3fc15c68f38e
SHA5124344d01173ea58e5081f0ffecb10c6c44b78f31a4e5641d860aec89105a9af180d30fcfa8fe793e68d524f4c4c85c597a8e97279980a1984b47bbee0c98c4539
-
Filesize
223KB
MD5d441912e4cb709d202c227c31c4c1163
SHA1dd0cc67dc2cd2cdc175c16d1cc74825772ae883d
SHA25628f95229475e8063952fd512deb56cb4376c3ac804cbe242d1e625d9ff14f1db
SHA512703c70030654af4c3b4ed009b2bbe250d811da7c22bf076879634739505b7cf8a371a59f183b0e5f6c18b7da1a526afc05d3aa4b7bd12c8d0f2ea9840f335783
-
C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
Filesize340KB
MD53f3be193c393c8aacbc5f5c3ec95447e
SHA16961d31ffaf20c339d4e36f8f4d74d8ca7e3cec0
SHA2567beeb71894cadd566845bcd7caebeab0cd440f6e192a1de95f210108883d9c7f
SHA5121cfb26840185a3a70c97b2c570c9ab80b1908349aced40f55e99abe1f9830d26e16f5dcc0dc757166c0ff49efc4d345f539807b8274d08cde5ce631b56b99928
-
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
Filesize116KB
MD5e9dbfea520ffec43c43b979383ff9f8d
SHA1714835d67329e75a508167361fb0b3753be345d3
SHA25678abad1d49b6bac60559519e5ae5e4e09263f7700c595de0da0cd312645077a9
SHA512152e118ad3dbf9b3693370d87cb02f36d64c60b41fc2c961488e86229479b000d27a4c365145a0c0653bbebfe1ddb745c3c5f02ac3c66a7f6cfa9471874a5025
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
133KB
MD556b06701e253181e2b207437651d4a3a
SHA186beb17b81c720413b2107925e06bfb0783eb08a
SHA2560ecc4dfc36b054d290babdd5bdda7cfd4c8beac533c137c47156d346ebea17a7
SHA51203600a5ac2d6a50266fc0604f913f4a2d476e0c974a2ba1731c97505ffbc02cd10fd734515209ba8f1f52e5018b0854338a66c9dfa13e2bd351ae01a3f475547
-
Filesize
196KB
MD5efa7a8c48ff1e82c0e0cbac946e021e1
SHA1631db6e0effad3dd5d0b8c1b76caeb6257e28682
SHA25681544d768e7096b6260e74c7d64b9dd0ebad19530ede077d801c386ffac4a21a
SHA51250070237c45e807923b9a9e706fb4f48cbe5fb67a5bba71f140cd2ec9261267eb6b72cbbc773073b454b241e2864bd4ddc0c8851c57b29c210162d1e2a49e91a
-
Filesize
238KB
MD57af1a7f0c5d750567bb6c9db170ad76c
SHA1756389a0e84646853c77c496c1e5144e83cfd280
SHA2560523d96352c2028dd22fe5591db75e08c6d8ad76afd0baf2c0b5ce04ae850439
SHA5122095bc5ab45ab4351be4dec9243cf242eab15667c46a4070aa9ec35aba6b8d74c0367153f430d5f4eb40c3e0d6f6a2cc2a68cac06d9c5384a1ccb41f8d232756
-
Filesize
223KB
MD5a09a0e0c28718628b75487e8bb670ffe
SHA1dafaf1ebfb3ff95e0ec9dd08709aaeca770a9048
SHA256baaf0767ead10a85f6ff1a2f80d6dcdcf80c565325b8bdc242592911a34a7ec0
SHA5129d5f6d27579bd91877cdafd022f8b6102872229648510be0aa6e696f4f175f5bcbf45109ed22fe2d90f9fbf077f4c40b00f395242caadb7e9ac976b1c129973e
-
Filesize
319KB
MD55ba4cd253bae89a7d50aa8edfcbaccba
SHA11817e012776273d220e4d2fd2be1a5612e84d155
SHA256ab1ee990adcd621798bc1687c83d820c2800e4029a463ef1eb08ff88fd7c3c65
SHA512a32a40c6232f29ebcbb24c820c11daf42bea88d7ae613706611aaa35c3742b9b44150b4fcb2b6be163624938c7a0ba546de84db4ca940159ea4ac2ed4f506a79
-
Filesize
15KB
MD52f57777fea07eccd4abaab153e1ead02
SHA17699d95f0e88836c4f0bbf1f27f86d4fb9955452
SHA2562079d2c488b9b9fe4a10b1e0facd5a4a3729ae0baa55d92f40e5fe23bd8baadb
SHA5120ec910aa98ed97dd3a895926eac6d7cb6888e6538a35b13097ef2dc2565bec72dfffbb9e88f601b26b16d2ca232f67485243ffbe62d181ea4579aee82c82b112
-
Filesize
272KB
MD543c66bb7924057abaf91e8ac6cc54072
SHA1d05479ac2b8016f9435a75c5ec9506ff42b56563
SHA25635852b3d65c820d9d95c4b5105b5f8ace19a951932111c8b6929b0651591288c
SHA51269b9b5d98e2d098cd48c645bd0dab4dbeadac1614a9e3e373c03c4c171a676188a2874524b2231404b18c742d144d1f4f7722f44daeb4da733eafd42c17d1f62
-
Filesize
154KB
MD598f376d0ed10defb21bba9bd337af15c
SHA12b62605849c714cfefc2b8b0cd430bc9ff5cd38a
SHA256819752d00232816c88a69e88530ae87e69eac52a7bd33920e421c998bf255264
SHA51254ab5e682908259447bc0c3d116c8c104aa45f837edca55dfe2d10d1a24ba4515f17407316734956cd72d21b84abdba961ad82f399601f0d256ad70f8f40d67b
-
Filesize
226KB
MD5a48ecbec3e4a6aeecda7f9ca54b5f195
SHA16f1032b536542de51b2a69418c46892753665403
SHA256ede93338b0676fac72bbff8be1a90900f9b4762055abe699519d5a163c43740d
SHA512cfedfa9725c51a054a4f538c33da0b10ddfc0a595a1b846734ec8782f23bd63921119d049351f5ba9d210be4fe734af5aa98c00810e1fc883706a60bf09ded65
-
Filesize
194KB
MD5fabb9d8b71a30a9fbd380208851f3672
SHA15d71224663589173bba59641f46c9f17422fd937
SHA256eab4f1b17f202fb4c29af2a572caf0c087da63e3268a6c394d80bed1e333b81d
SHA5122ed9df1473ef38fc0750c67d510d2792ace50dced98131588976c9dadbd0e2a1253636d8b687baa4788b70d47af883a7ed54a05f50a3ba61eb1f2ef772533742
-
Filesize
82KB
MD586a7a5f25a656b29662235e00e0ed445
SHA19dab8da79bf1c393395c7179c4efe934c294f335
SHA256a142e896cab350c05587093b356256e32df445ff19aa2d684bd319d6e9184432
SHA5123e1e2043a3eaff24c1ad37f4578a13ff3b2746d921e5fc8237a6fead3b28d290463d3afd45e79f8d145f2d39015a45cbfea5616c8f21c9053d90fe75be78eda0
-
Filesize
119KB
MD534b3f1020aefd334370707eab741aede
SHA15a49ae20e427403a2d86dc8eb187d8f730726fe3
SHA25624a1e711280df35108606316ff7547841875209df5e0aaede829714e0bc644b7
SHA512eb36878b8234ebd114539ac4d88ec5d93efc9cb428f31e395defcbaa39a169538bb2244f05023d4115eb05559b5db3bbb5212b7a0fff9fbdf55132b88150224b
-
Filesize
41KB
MD5a77373195d6e83ac13ce87d72eb01e1d
SHA1416389daeadbb7fce58c5384070edb86856aad8f
SHA256983da97ba5d8b04d46aec6a83f0e7d1dcbc14ad8f1f26afbffeda226875bbaeb
SHA512dc18461226a73fb0db6f66cace010b69e66b7519a6413be8fade38d9c0b99c507c31ba2a3f4d924384ee941684cb46027c1660db703527abccf34bac7174c06b
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
242KB
MD53495674efea726c41d4bb4d3d9d0bade
SHA1e7defa64bc161e6587c84282161cd20900270336
SHA2562a0113ff06def13831ae4ca863285655df03339e06026d41482d11364b660b2f
SHA51276f635368b8766411aeef037017237f7b516a6338503fecb46918b8785b603a8fd06d256a8838dacfa8c9592906ed335f17950690688d5a713b52fae9476efd6
-
Filesize
383KB
MD50a72d5a40212d2a40780af837d6052e7
SHA11a670028eab7bcfd8ef3ed677c5c01899f478a91
SHA256d1a56c417dca9c8501a1e6f6d47351e3cd78b4e62038b13aeffdb7931abfeb06
SHA5120a95959062cacfe34f323070cc29e8f6bf8847ff7ec0211efc53e054dd507b47878367ee7ade003461cfc8ba9d98cac070b119f4c64061f3eaf0bc6db583cf3f
-
Filesize
53KB
MD5342b265ebb7371d82c889d108bc75794
SHA156d024d6f0c6cba5cd2fd0e468a7054cc5ef73b3
SHA2563573509f187145905c67851e9ae4fd3f9b5699810031d3feef7f904bf62af1f5
SHA512e3ad7217ae728470f7b92addc8cfbd5d51322ab59d997f0f557809be13df5f71c5a879b298b4487bc2d57fc4aa17cac6149115cbc15368bb274d450ecfac8a5f
-
Filesize
49KB
MD5709dd6aef34c6acc3bb862488c378a8b
SHA1ee7a39404dc47c7f0d3b283c170bc13d3dc75364
SHA256edca95c4f4c991aa5922ab5647bee89584b0d9f16e4d1e260d0f7468df7c53e9
SHA512971a9de46c64c4c9c523fa6eb7b2466b748a6d40f81b20ee517dd46cc6941ca141c74fd8a4b63dd0bf946d52cdb698ec96d7f3d96c19c9dc491f623eab013a57
-
Filesize
68KB
MD5008023555d4dc578465fd981b0f51110
SHA15ef75d2406bf67917abac68986eef37287bf4cc0
SHA256d7725b84fa91b81f6cc3bff4f605547f0ace62848bf0982ba4c6d0c06bc519f5
SHA512111f63962956c45028a3b6c41431491d6b83e2dec608acee60b5325e577371709ac3404d7960b9fcc906c079d5d07b55a5a4560c0f423e12e0759cdfec5040fd
-
Filesize
370KB
MD5bf1f4bdfae7fde93a0794597a720ed84
SHA1f36adc13744fecd2343cb9be6a426badbdde62ab
SHA256409da3c8df03e0fe50f4b9ae5cafef7dfefea35bc5dc6547681bf6787d3a0f1a
SHA512d1f8984057e336fa7a330ecad1c7587dde84fbdbfb337e307cdadcfb7e83d29041c69695b4dbf0eb9f85617a4e40ad75a17fc95641d3ac14a4697ee3de6c6469
-
Filesize
183KB
MD51d6e2961e4b296f189c0327c33a199d4
SHA1e0459ceaef4dbc8c2d3cb378036434c273f064c6
SHA25663f3e8ae1b8071e5dd4e4f3ab7a83c9dd9d24813f30b0486588b0967ddcc3604
SHA5122d26ee688f6088588282c2d09caa58495c6d2820fa64fd86f6c929bb92ac3a028bb6a58d9a79c49a558c7261bdcfab07b339027c5907b2e275c8ed3676a14d65
-
Filesize
71KB
MD596405c278652284fa77269240e869d12
SHA1383d91660723098de7fa53104b85fb6c85819ba8
SHA256a59749df0d186cd535ef400b36156eadfb158de8c4f3c558cb970dbba5b5d5a0
SHA5121f42de3327d6f9d528bb76d69921b88d4b3d97598ac665407253903904a317e03120112c988ccdcb935c1d1d4b466c113608293269f6cf2ed7ef1e65a7b0f04e
-
Filesize
118KB
MD56e87605a53db38b1931b4a254236805a
SHA1565e8f171a99aa4070aae02cb2a8e1b45b73e9bf
SHA2562d8c94a169f0be03e5c6097c8d94766e7ef5381dd8ef01989b64c7f99bcaf4c9
SHA5129b22cce349fb06e9df984c3a6eba62ad2db57e096f8c246e35e5a0c7647d7143f0fec2d593d31a01608ad7c5a275d864920131162fad567ec84897b467684061
-
Filesize
41KB
MD5ac558b0b4d51c492237cbc8000650c04
SHA1e4d23191ab26c7ba37476cf13e6ad5f3fb8dda0d
SHA256386fdf65fbaef2b60968934357d45c45fac13c745f818b724e58c0c70342b9df
SHA5127e2421be8008f36c870a05de5033de7bd4164be063ac122c6521852bb68beaa885956fb0f6c6537246e8b70ecbadaf3f41ec4c677328e3013cf389793142666a
-
Filesize
7KB
MD5d765ae3fb4188ced3bb1809df0ad8343
SHA14f6994acf00ead1ea499a3e9bf861c960168d944
SHA256ddef8f70611b69694e0e6062203c6929d234651fd33b43420013d2399e99ff7f
SHA5129c079aae09f313bdf30039ec054a4ecf6c22e7b434b59491af8360161e5c22e4c3325f5a9ae88f76a3826d423d92a75e896355711c0c3d6fffd50a6b0bf64c2d
-
Filesize
217KB
MD589c20d363a0eb6ac321045776e00ba29
SHA1c525f5df7ff003730d27bf7ca58a1f2e20ef3cc3
SHA256bcc674eec928930d1e45f95c33740d3943a2166aad6f88d4d36a1c994a321d0a
SHA5128214756f955bdf60022012e2429dada6155efaf54d8dc3d15abd48551782d63bbd98fb16dfba0a6b0e4e8e1397f529401053882f56eb46ac8097210ee31df1ca
-
Filesize
64KB
MD5a0ab2251d3ceb1349776ff3642e807bb
SHA13a3c78a26b87b9cfc0b9605e94e03eccb288426d
SHA2565b1fffd5f6d7e45458ced266a096de2d1b9af84f71c0bc97b0d2b64a317ae391
SHA512bb11a89847dc5e9c874453df71dfc8089bbe46c2f7b5079543eb0a686fd4c3dcf468a0aba4f156d6fe193d15552a55b9d1cba58fa82cb59e863c4cda82159ea2
-
Filesize
1KB
MD514899bb280b156e4ca42a95df5724e36
SHA147dc380d86b9b6b654f0c5dd25ac363e62fa6147
SHA25648c72dd6c6350a8cc7b7e8b690718240b701c44b77a82e8af8a1dd0550ed314d
SHA512b1fc5b75e4ab585f4c9d611aa515e15dedb9aebf6edfc2980dcd9801d9a2ba5a1923761a344ca141bc4fd6c20be247d0f48cfcbf6aaec52319695362853ff644
-
Filesize
1KB
MD5121cc42a218fe1856f3dd72720d3386e
SHA16a5ebba8c315f2ab12e349b2ca58008a2d4ddf25
SHA25666174927bc4cb02b6139eb3e50b75a8e056c4682b2dbc2d8733ff7ff64b7b044
SHA512f3ee67c55c254803b950f41beecd00587368624d0ccc8c33f24861e09fd12a1ca3d6189c7b8f168deb759b6765c865d36485470122fd05445dddfee42ca0a5fe
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
230KB
MD5d11bde69bcd2adcd294216d4aa5a2668
SHA1ca5d8e24e9fb064ae5f35dc8694200fe7d38091f
SHA25677d2e160bdd239a28cc33ae08d91d4bead676331798827454309b9a7f4d4f736
SHA5120c92b6773c8bd29acf1a55e18310b198b168af8fdb82436a3cd7d557e559077dda0c0ce26aa5aa1ff055587f97a26b26216e3273ab17e4a1f52788467c2b0765
-
Filesize
228KB
MD584556cd7f13f54eeb877db56a1e595f4
SHA1f2de3ced1b367ce6bca58b16a080151f3b25098f
SHA2565fb366dc9eec23c7b6ba0819aee813e83c6023132e145528e052051157f6a5ef
SHA5125cf3d25a6165e1666d08729b6ecbbb214e9d84ee6c8a3fe3a05227065e188dc9eacb1c6cdcc82f0cd017d04244ad0769d0fe699686360acb95268c5c0a4996ee
-
Filesize
109KB
MD58c228594babc73cdc4db0a4c7e4f33b4
SHA1d87fbb7b5860db1b37fa5a7e02d6e14a40325d30
SHA2564f39d4f2a7b910ee42a28f08e533e023f5701e6c0af8ff3a682232dcc59d29a0
SHA51229b767d176da6a8d59a3ec2cb9ba9ec83b6aea4b132d4f8773757d9b3265a478d66220903608e7c6ea6197915ddaa16bb8a9da0c23f34ce1a9da80a915dbd0ec
-
Filesize
184KB
MD5b1759eb0f304dd0a93cd3755f2a6c514
SHA13cbda053661dc142c7988af14cc6992083fda906
SHA256b7126b8b1d70f97d59413d03f569df597a648428f8410eafc097da642809847d
SHA512177a064b00d684fcee6bfac29f7fff70d1f6bbfc56dccf3582752af6a10cac83b7406fe3436eb725bd4346e1080185faf6858636a76517d5d4992034c3988413
-
Filesize
164KB
MD5e0546e3f0b0e52df523794856e6c758c
SHA1f90c66c616e7aef1a9ea05247f3eefeb46fd934f
SHA2560cbc86b09391056b432f7b51eac8ed09fca873b379e424a785599d8d690e01ba
SHA512464e5abd800b947a52d6c0f3c11f3872897280a7e0bdfc533d86cab9112fb0f7f90a584801708e49f9155b8ce9b46de36256cc49044ced0e922f8745ca720796
-
Filesize
2KB
MD558c13da03b15336b2f36bebc22c894e5
SHA1fb2c7597f605c17f081778518fd40a45dcac4441
SHA256870bfef18b2a9ea05c21379736e0d2fd9c076f8510fc7c533cb20680f741609a
SHA512bf06d9454080cf00942fe21f460773819c632ca918dcd51ec1eeb7f23d9cec7051b4856e1b26f6a4a64aebdc2a1890cbc7ec0580810f8cdb14130826e9108d53
-
Filesize
245KB
MD50b1d6a1554d3fd636a3b2ccd839a1849
SHA1e45b2df5d972a0f3b40fe7e9006440b0a70b5fab
SHA25640ccfd9288050dc64a7573e60cf3128c12829359ea57be8c70d596966859b643
SHA5120008ab9a62eb8fdb9063ec32de8a8be047c7790b9a3458b48ff74771e80e922c9b3a5521f0fd9cfcc7e9c05a473d48c26ea018164c443befa8d73a7c51ead0b9
-
Filesize
278KB
MD5d04d2f1ecbe2f4491d811c8b9afc477e
SHA19ce75cc8c7de520cb07767ad429223fa9ad23f6e
SHA256e3d16f3f69fa0857f966022387ee6f9408385ddf389d09ffe7dc44acc8ac1ad5
SHA512357322814852a60e7ebb7ff9d2bbbb346d52c7fd6b1f1fc43a265b229fe683f0403e1963d7ad054ced2cec3ddc3bf986ba997c9827d0f513f188b6e80d4673b4
-
Filesize
123KB
MD55b4647cd122b353265ce0cd6e54886a3
SHA116ee6d5844a2cd83fb40286ed7a349adfcf9fd14
SHA2569a901ff36e878e1fcc1f66e2dbf8b6904d3598a72934f6f6c97040af3f188036
SHA51237640702899cf45d012904dfd1b0808afd11059441768fff07ea427083daa6276f11d9c29ff9d6747db0c18c9379f4857624c86894de0a12b5026224486e33e8
-
Filesize
435KB
MD5e12237f748f5c12dbe11f31775a98bae
SHA1f27523e9d8f6ffdb330f11a7d594bd66de2077e8
SHA2561d787cdb685015c25092c4e5e720907eb06e22c87a4d57700614f36be625c234
SHA512753886bc99e19abe9e12eaa864a3e1e8382aeba7505b6a96e263ee22acc8e011ca3c8c8c7262ff558a9ad1b33807007362905313cd43356cd746529be93ad62a
-
Filesize
274KB
MD52bb2adeba52ca868f98739de247fbb6b
SHA1436e1018d5e6875583ffb70ef99bfa55f0a73890
SHA2565d71766b7dda256592d4d03133bf604ee3311396fca6c6ead6eefaa833abb49b
SHA5123b0878d2361b9b8768415cee700bd0460d8aa5bb50f8ebb5a906549517cf96ed6277a99053a8ecd945db9ed86283da11416cb68c2fcc2586edcb43c246a107c7