Analysis
-
max time kernel
75s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2024 02:06
Static task
static1
General
-
Target
amer.exe
-
Size
791KB
-
MD5
0b6cc42e0e7dbac5b14d8272cf9a10dc
-
SHA1
50cd32af636a9f7361076dec109e1304bdccab35
-
SHA256
ff3c3e7ea41955ee1ce503a05dd815a60f9f3d8765f117113212125154aa6136
-
SHA512
3b5e1918121d85d1a34096becfae18c96f02307aec87b964e82323c94542097b8466561d80e4e024e0a778765299b6b76f02977c23d0086414c12d01fa1ec766
-
SSDEEP
12288:gIvcEqXn0o7YNQz1F85ZwKd89BcFniz72PbZFbmqMrUAxvvvWs:+ntwQpyEvOnivQbnbmNrUgvp
Malware Config
Extracted
amadey
4.15
http://185.215.113.68
-
install_dir
d887ceb89d
-
install_file
explorhe.exe
-
strings_key
7cadc181267fafff9df8503e730d60e1
-
url_paths
/theme/index.php
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
fabookie
http://app.alie3ksgaa.com/check/safe
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdpo
-
offline_id
Bn3q97hwLouKbhkQRNO4SeV07gjdEQVm8NKhg0t1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-FCWSCsjEWS Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0844OSkw
Signatures
-
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral2/memory/5072-258-0x0000000002FE0000-0x0000000003110000-memory.dmp family_fabookie -
Detected Djvu ransomware 3 IoCs
resource yara_rule behavioral2/memory/3228-609-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3228-611-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3228-606-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 9 IoCs
resource yara_rule behavioral2/memory/448-192-0x0000000002D20000-0x000000000360B000-memory.dmp family_glupteba behavioral2/memory/448-193-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/448-262-0x0000000002D20000-0x000000000360B000-memory.dmp family_glupteba behavioral2/memory/448-292-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/448-295-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4788-297-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4788-437-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/932-551-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/932-588-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 53 396 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1584 netsh.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation amer.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation explorhe.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation latestrocki.exe -
Executes dropped EXE 12 IoCs
pid Process 4976 explorhe.exe 4644 latestrocki.exe 5012 explorhe.exe 3872 InstallSetup7.exe 1516 toolspub1.exe 448 31839b57a4f11171d6abc8bbc4451ee4.exe 5072 rty25.exe 2556 BroomSetup.exe 1756 Conhost.exe 408 nsr6168.tmp 4788 31839b57a4f11171d6abc8bbc4451ee4.exe 932 csrss.exe -
Loads dropped DLL 3 IoCs
pid Process 396 rundll32.exe 3872 InstallSetup7.exe 3872 InstallSetup7.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4240 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0008000000000711-577.dat upx behavioral2/files/0x0008000000000711-576.dat upx behavioral2/files/0x0008000000000711-579.dat upx behavioral2/memory/2548-580-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 108 api.2ip.ua 109 api.2ip.ua -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Conhost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log Conhost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4976 explorhe.exe 4976 explorhe.exe 4976 explorhe.exe 4976 explorhe.exe 4976 explorhe.exe 4976 explorhe.exe 4976 explorhe.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1756 set thread context of 408 1756 Conhost.exe 109 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 116 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1512 2076 WerFault.exe 156 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsr6168.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nsr6168.tmp -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1524 schtasks.exe 3696 schtasks.exe 3076 schtasks.exe 3000 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2032 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs Conhost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 csrss.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1516 toolspub1.exe 1516 toolspub1.exe 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 932 csrss.exe 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 408 nsr6168.tmp 408 nsr6168.tmp 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 932 csrss.exe 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1516 toolspub1.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeDebugPrivilege 932 csrss.exe Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeDebugPrivilege 448 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 448 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeDebugPrivilege 4132 Conhost.exe Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeDebugPrivilege 5004 powershell.exe Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeDebugPrivilege 4508 powershell.exe Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeDebugPrivilege 4876 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 amer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2876 amer.exe 4976 explorhe.exe 5012 explorhe.exe 2556 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2876 wrote to memory of 4976 2876 amer.exe 88 PID 2876 wrote to memory of 4976 2876 amer.exe 88 PID 2876 wrote to memory of 4976 2876 amer.exe 88 PID 4976 wrote to memory of 1524 4976 explorhe.exe 89 PID 4976 wrote to memory of 1524 4976 explorhe.exe 89 PID 4976 wrote to memory of 1524 4976 explorhe.exe 89 PID 4976 wrote to memory of 396 4976 explorhe.exe 100 PID 4976 wrote to memory of 396 4976 explorhe.exe 100 PID 4976 wrote to memory of 396 4976 explorhe.exe 100 PID 4976 wrote to memory of 4644 4976 explorhe.exe 101 PID 4976 wrote to memory of 4644 4976 explorhe.exe 101 PID 4976 wrote to memory of 4644 4976 explorhe.exe 101 PID 4644 wrote to memory of 3872 4644 latestrocki.exe 103 PID 4644 wrote to memory of 3872 4644 latestrocki.exe 103 PID 4644 wrote to memory of 3872 4644 latestrocki.exe 103 PID 4644 wrote to memory of 1516 4644 latestrocki.exe 104 PID 4644 wrote to memory of 1516 4644 latestrocki.exe 104 PID 4644 wrote to memory of 1516 4644 latestrocki.exe 104 PID 4644 wrote to memory of 448 4644 latestrocki.exe 107 PID 4644 wrote to memory of 448 4644 latestrocki.exe 107 PID 4644 wrote to memory of 448 4644 latestrocki.exe 107 PID 4644 wrote to memory of 5072 4644 latestrocki.exe 105 PID 4644 wrote to memory of 5072 4644 latestrocki.exe 105 PID 3872 wrote to memory of 2556 3872 InstallSetup7.exe 106 PID 3872 wrote to memory of 2556 3872 InstallSetup7.exe 106 PID 3872 wrote to memory of 2556 3872 InstallSetup7.exe 106 PID 3872 wrote to memory of 1756 3872 InstallSetup7.exe 131 PID 3872 wrote to memory of 1756 3872 InstallSetup7.exe 131 PID 3872 wrote to memory of 1756 3872 InstallSetup7.exe 131 PID 1756 wrote to memory of 408 1756 Conhost.exe 109 PID 1756 wrote to memory of 408 1756 Conhost.exe 109 PID 1756 wrote to memory of 408 1756 Conhost.exe 109 PID 1756 wrote to memory of 408 1756 Conhost.exe 109 PID 1756 wrote to memory of 408 1756 Conhost.exe 109 PID 1756 wrote to memory of 408 1756 Conhost.exe 109 PID 1756 wrote to memory of 408 1756 Conhost.exe 109 PID 1756 wrote to memory of 408 1756 Conhost.exe 109 PID 1756 wrote to memory of 408 1756 Conhost.exe 109 PID 448 wrote to memory of 932 448 31839b57a4f11171d6abc8bbc4451ee4.exe 127 PID 448 wrote to memory of 932 448 31839b57a4f11171d6abc8bbc4451ee4.exe 127 PID 448 wrote to memory of 932 448 31839b57a4f11171d6abc8bbc4451ee4.exe 127 PID 2556 wrote to memory of 2032 2556 BroomSetup.exe 152 PID 2556 wrote to memory of 2032 2556 BroomSetup.exe 152 PID 2556 wrote to memory of 2032 2556 BroomSetup.exe 152 PID 2032 wrote to memory of 1912 2032 timeout.exe 113 PID 2032 wrote to memory of 1912 2032 timeout.exe 113 PID 2032 wrote to memory of 1912 2032 timeout.exe 113 PID 2032 wrote to memory of 3696 2032 timeout.exe 114 PID 2032 wrote to memory of 3696 2032 timeout.exe 114 PID 2032 wrote to memory of 3696 2032 timeout.exe 114 PID 4788 wrote to memory of 4132 4788 31839b57a4f11171d6abc8bbc4451ee4.exe 130 PID 4788 wrote to memory of 4132 4788 31839b57a4f11171d6abc8bbc4451ee4.exe 130 PID 4788 wrote to memory of 4132 4788 31839b57a4f11171d6abc8bbc4451ee4.exe 130 PID 4788 wrote to memory of 4996 4788 31839b57a4f11171d6abc8bbc4451ee4.exe 122 PID 4788 wrote to memory of 4996 4788 31839b57a4f11171d6abc8bbc4451ee4.exe 122 PID 4996 wrote to memory of 1584 4996 cmd.exe 121 PID 4996 wrote to memory of 1584 4996 cmd.exe 121 PID 4788 wrote to memory of 5004 4788 31839b57a4f11171d6abc8bbc4451ee4.exe 123 PID 4788 wrote to memory of 5004 4788 31839b57a4f11171d6abc8bbc4451ee4.exe 123 PID 4788 wrote to memory of 5004 4788 31839b57a4f11171d6abc8bbc4451ee4.exe 123 PID 4788 wrote to memory of 4508 4788 31839b57a4f11171d6abc8bbc4451ee4.exe 125 PID 4788 wrote to memory of 4508 4788 31839b57a4f11171d6abc8bbc4451ee4.exe 125 PID 4788 wrote to memory of 4508 4788 31839b57a4f11171d6abc8bbc4451ee4.exe 125 PID 4788 wrote to memory of 932 4788 31839b57a4f11171d6abc8bbc4451ee4.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\amer.exe"C:\Users\Admin\AppData\Local\Temp\amer.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe"C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explorhe.exe /TR "C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe" /F3⤵
- Creates scheduled task(s)
PID:1524
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:396
-
-
C:\Users\Admin\AppData\Local\Temp\1000493001\latestrocki.exe"C:\Users\Admin\AppData\Local\Temp\1000493001\latestrocki.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "6⤵PID:2032
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsr6168.tmpC:\Users\Admin\AppData\Local\Temp\nsr6168.tmp5⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\nsr6168.tmpC:\Users\Admin\AppData\Local\Temp\nsr6168.tmp6⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:408 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nsr6168.tmp" & del "C:\ProgramData\*.dll"" & exit7⤵PID:2320
-
C:\Windows\SysWOW64\timeout.exetimeout /t 58⤵
- Delays execution with timeout.exe
- Suspicious use of WriteProcessMemory
PID:2032
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"4⤵
- Executes dropped EXE
PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:4132
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵
- Suspicious use of WriteProcessMemory
PID:4996
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:4152
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵PID:1680
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:3076
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll7⤵PID:1140
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:3000
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"7⤵PID:2548
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵PID:1096
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)9⤵
- Launches sc.exe
PID:116
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000495001\SetupPowerGREPDemo.exe"C:\Users\Admin\AppData\Local\Temp\1000495001\SetupPowerGREPDemo.exe"3⤵PID:460
-
C:\Windows\SysWOW64\auditpol.exeC:\Windows\SysWOW64\auditpol.exe4⤵PID:2524
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000498001\zonak.exe"C:\Users\Admin\AppData\Local\Temp\1000498001\zonak.exe"3⤵PID:840
-
-
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5012
-
C:\Windows\SysWOW64\chcp.comchcp 12511⤵PID:1912
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F1⤵
- Creates scheduled task(s)
PID:3696
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:1584
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1756
-
C:\Users\Admin\AppData\Local\Temp\C743.exeC:\Users\Admin\AppData\Local\Temp\C743.exe1⤵PID:4036
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\1EF9.exeC:\Users\Admin\AppData\Local\Temp\1EF9.exe1⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\1EF9.exeC:\Users\Admin\AppData\Local\Temp\1EF9.exe2⤵PID:3228
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\b64ba33d-1694-41c5-b227-d7221aa10a99" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:4240
-
-
C:\Users\Admin\AppData\Local\Temp\1EF9.exe"C:\Users\Admin\AppData\Local\Temp\1EF9.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\1EF9.exe"C:\Users\Admin\AppData\Local\Temp\1EF9.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 5685⤵
- Program crash
PID:1512
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2076 -ip 20761⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\A38B.exeC:\Users\Admin\AppData\Local\Temp\A38B.exe1⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\BF04.exeC:\Users\Admin\AppData\Local\Temp\BF04.exe1⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\BF04.exeC:\Users\Admin\AppData\Local\Temp\BF04.exe2⤵PID:1044
-
-
C:\Users\Admin\AppData\Local\Temp\CFAE.exeC:\Users\Admin\AppData\Local\Temp\CFAE.exe1⤵PID:4008
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
432KB
MD55f906f66548eb23c1174e117a0511739
SHA1832c1552e0d573585d9da2e07aa6b05033fa07b2
SHA2563e8af01e40800d5267164418ff336cffc9c64b6f227b74da3c3b2b840763e165
SHA512ac71cd07f37cf867a3606cebb569aa345417ab5f5d362e8edac08fba9bc5a5425fd589874944db3b7a6c22f198735cd9760af39e284906c4ba54e9a84bb24a36
-
Filesize
15KB
MD51378ffd89413bdb486b092a0fc1bc523
SHA1f93d85610a5ed7675b52696f8770c5868a03723d
SHA2568f73e7f9fc37f7af7df964ad889d9d2f9c9ab7dcdb9815ffbc349dc9b77199e0
SHA512833cb3414ed3c0c7e4429ccd5f7d69b2e0a683315698a220d067e28eb88486b9dfb702e84e2436ef5472b92140baffea9b18691f643305adb890d58c3e0d3c32
-
Filesize
1KB
MD59f5d0107d96d176b1ffcd5c7e7a42dc9
SHA1de83788e2f18629555c42a3e6fada12f70457141
SHA256d0630b8466cebaaf92533826f6547b6f36a3c480848dc38d650acd52b522a097
SHA51286cfaa3327b59a976ddd4a5915f3fe8c938481344fcbd10e7533b4c5003673d078756e62435940471658a03504c3bc30603204d6a133727a3f36c96d08714c61
-
Filesize
1KB
MD58825f50827c9fe03ae6b2730a1d747c1
SHA140596015e7e8f937c40736de707ccaf9de5b8f75
SHA2569b57642d469116a6ee942b03a41d254cd3fabb6f9b80f8d21cb9f84795aae9fc
SHA5121c234a22258f711606b73024c48a1915bd19835cb2e80d2c6fca63d4239dd0b3de037a2116128284b77756896303b78c896e8af8df0abd1cd331cb53ed9af916
-
Filesize
1KB
MD5c8d0893a6075733c2bf519c6b62799c5
SHA10ab8c971762a2ef3b75a7ad76b23a94b6c57c6cd
SHA256f348535a236cb9dfb5850e80f142322aa5a2da3af203b51ae219cba9efc37a14
SHA512955ac664a9e5f4d3bcde5ba251fbd458910e0c2f9b60a170d0a1e3ae29f671e719c28dc6b117e97cd3d93e11b0bcfa6a9f835fce6a3c86b0a219e69a7225a345
-
Filesize
1KB
MD5cd9161f00e777bd4498ea4e7e9c49b86
SHA11292890e0cd6c4bea3428a1db20d1fb3ec73b415
SHA2564e8406931a8112b71c823b4d5d2e0a5fa5935e5cc4463fe273380f8527694738
SHA51292de1c6ae489fa1033d1d87dca4b07d7b36c909aafc20fe5bb6ce9ad1ca85e742d0fc0539116c1da0f1ecbbb645d64925392dfd55fa3d64cd74f01ee4f59a672
-
Filesize
1KB
MD5fb4cf7a6366892834bd5ec09bc994342
SHA1bf9a7ebe93b51fbe7123a1686d0c6cc3f44bcd43
SHA256e91524384ee96bd273d5189fefa5114329208e295740ad9ce7c68c490b2a50a6
SHA512236641e0e1a4bb0001c0fb663616c648a2bbf132b94f6dd2b32f2f84d6735cc6adc15a585710cca48516b0ac325b718c8867c625f2ebf27c3567f89c87da45df
-
Filesize
1KB
MD5d2615f7d9cfbbd58faad693640f4a060
SHA10c828ce67bf495721ec5d8a634681f8156b78ef9
SHA256068e81af1292be44d38d894767bd209c3f1c004af355633e0b51bceb01c59745
SHA512cabd97d6437216d7d29ef22a0b94949b3e52f3074d95fd7ec2a7a7ae6f5a6c5e00932f2b3574c8a3ef2de856e625d2f028b2d7675bc5dbb189ddb1f9d2876c29
-
Filesize
1KB
MD55c8a705dba8ec657aba5b3a995905a1f
SHA1b0eb6f736399543d4f2651b123c4fe2d3071658f
SHA256d94c9f3d8924896873a883a70314109979d08ac87b4e8e3e1717f9fedf9d00ea
SHA51289d1dc759dea1ed3c1db24d7e972c8727b5886e9a7c497583d0e3e8d3878b7baa7cfe27d79bfaa2ca1dcfe52d8a3c4fb934c5f9ad84e8f133c486e48195561e8
-
Filesize
1KB
MD52d6b5b9b04d55edf323f1e6fc398252e
SHA13011dcf7a0a5b666f50f93d185ada7e1fc9abfcc
SHA256b5f6303952be2cf44f19b9c7e650c2d12e50d083e5dc0a71fec762858fa4a3c7
SHA512d3feed447339e596de4f48f64dc9d354e680ede4797d9eeadf4f90435dfc9a90499ceba9ca133d3738bf4f048ff18d7481d78c01edf76797b4484e66b9e7124e
-
Filesize
6.5MB
MD50518d9c6db9a614769bf43fbff180167
SHA1928084a70bffb6eb474658dcf062d74f5ca84f68
SHA2566369f6e4a8398cccbbebef2ae7078834d3f92d499257a59b4f9142bd5b079057
SHA512a3a9ae62006133d5e6e7d74527732d6f245c7bfbb8770fba371e877c56b47b61fd5e809eac7e462013c811ab4e49c1162ce16eec7dd15db76530ea09c2a0cbf1
-
Filesize
2.5MB
MD54dff43b589cbab10ac3976e59bf010e3
SHA1efea7b1ae2229ee38f8bad11fa4713c39b940afc
SHA256c5a1027afc024aa25b558e2ee0da404b136bf3043ca1ba113cd1560f71563c32
SHA512e335071c6af08922d64069210dcae08a4aaa3b3f64586ea5fd9a0929292bab91527b2ed42ebd33469b9c85df4e53cda79f296c46fc2619d1497ab6d6410c83c7
-
Filesize
2.1MB
MD5fa9103cb2e6c10c002c5089671d4bfdd
SHA16dec88e34fb7e3338dffe461de4d9bfdd529a8e5
SHA2561847a401f3f791605cda2e346596e9e93a0b0b7f2ddd67493ce7d7629cea4c2e
SHA51298b4e2c34b5716b1a66ff7fd0224faea75a732e4cef442e1dea136f5e920302a1388efbf85eb31405e1314420f4264db69dd1fefe5cc7207370178b4fc5e6e87
-
Filesize
1KB
MD5f6633d74f61b56b09c75ea68160b01aa
SHA14a4de6734bba3341a93255ee663e49a2e52ecfb0
SHA2566cff2cc985a1d6c2b477f438fef7e775158988986892089f6737259b1b05c4db
SHA512c6362507f31bc60f350c11008f92fc6d971964614871acb5a00c292db92090836d0df52b257fd29a86a40ffe4d7ea39c6ec78443ace17c850735597eed7ee842
-
Filesize
3.6MB
MD527f7b1107b303ea590b4ede5e967a01f
SHA12183fc58bde144ea6c3cc86e265a8f1a28fddcf3
SHA256565eaf98605750802771342d90860b20bfdeff462f61d4e4f081bdf2fe1a2ff7
SHA512c2dee0e94e50f43eb925eb157c1af2c4baba30872a1dd945af74d3405c58e963e0cd4df820f3cc4c8acba96f8ed2e16b4da6d4f608656afd0989399c23b12f69
-
Filesize
1.1MB
MD50e37a31bb7ce703aee70e644c7d66fa0
SHA1d767776d8ce4149b9e363e6461d2061b5be39121
SHA2560b4390820a73191c617a2b1f7012d707d1f6a3780f44a5c494ccd0e62805a364
SHA512d86702749eac877b79b186dbe2abdecdc796de14140dbcb5a4f3395bf7bbca4353e1e6fab526a0f467e8c7a0eff078c6c8b6dad36d55d59ea959ebbb13f9e8b7
-
Filesize
1.0MB
MD5e97b387853ecd4d2eda4a3212cb51a24
SHA1f776add7b3c5f6e0505bfb8d43ee56e899fe2e6b
SHA2566e41a65a3ee2d6e7164ad0ba62d8085d60fc931f75475f0f04483407f38e86fe
SHA512f786afd5acb7605475434ea463e9e9f0e16d53c038bad730bbca6bb97c4809d7a10744b2df323b501a1ac82a166d9a43e5cbf2b9f51a0a7b569202ab456d109a
-
Filesize
1KB
MD527cde8f2a3b3d0261797bfc5cfe99f55
SHA1dcc1f77576b08bf13eabeecde13ccce359463bab
SHA256e124de651b3584637eca4dac33b1e0211e0892be88ac2eb2a43a2a2103f41fee
SHA5125c874a6ea928154fa5cf1d6e7cf71f00b7e56894e52f964527b9978201f58153395a4e6f2ab793ac4796bd817b781abe5846a35b59dd7333c46bc25e16db0b8b
-
Filesize
1KB
MD5be1cd5ea30ad8d1bb5105e68df85817a
SHA143f26e7772910b87c2ae4e4be0bee53cc85346dc
SHA2567d9afe809109b11586c34586db9de0121979051e3846cfc66619bec87bea2f17
SHA512645667fee3c2e923f04eef1803bf26b3cd98a5639b3b7eabb02ea7bd6021e8dfd69ccd6a20992cccc8e84dea5a6d4193ba8469ddec5ff964cf949dc5243d5b0f
-
Filesize
1012KB
MD51800cf30c97c27bd7b61abfbfda17a07
SHA1c35b83c2f2b0bae3b7a13280a63170a11b6ffd74
SHA256de9d87147bba28fcafa783d3b8fe46e77519c15d1d39e1fe91316855c4b046c6
SHA5121a399fddfc639f554900b38da4c5ea6987e5445ab9a65857f61c09a005be5f5144358264ab3d9dcfc86928c4b038a6ea518c7a8577861b39377e963d4ebcc178
-
Filesize
721KB
MD589df5ef24fd7d51809591f5252c4e13c
SHA14a20c8e23427917bd9b11211c33446a555ebbafd
SHA256f30da794cf92919c6600e8eba06d9da45c188b929321feee0f2d2e17d00fbeb5
SHA512cb7ed7cab34675a3f55238b4278f7e42552808b26444828bbeabd292da91e38dea5f12cd96cc91b25f986d823b5bf0279c83c04b6217c2892baff52976d7b45d
-
Filesize
763KB
MD5b208d35f3ba800af420f238744f3b011
SHA10ea808f93b7bc646f55448e832d000a37aa84897
SHA256fbef83daf71466f0584842da1ea6f78d12fa3d4e5f14028ce87823a745a94d9a
SHA5122c2c4bcd76a7efbb462a1b6d933322ba799a07d5f71a430780c186f82197e5f6c023335d010314526a1f1079e119a924a03090a495c60605b5189bfd52fea1d0
-
Filesize
1KB
MD523ed7ea61e6d895eff77879c432154c9
SHA1980c753918c98fa435304acb4ab999e12956a0db
SHA256f28f5c449233602302662b8aa6452879aac72753d1c0d1ce393d92a89e63e0e6
SHA512fbf97dd42865f67604597c70ecf9a4f2a1bee043b18a0bbb1af4028ba2a74c69a9051f0ad6dde78760ec585156caabd573fbcb32835858554b547aaebf0d0d3b
-
Filesize
769KB
MD56b3c3b621f4964f232d23c7b32a2e486
SHA1dc7a1111a7fa4380b42dfa8e6d1b22b338aa10fc
SHA2565e19952acedb1da68215069d44ce1f3d48da10491151003148f1cceab03f1073
SHA51278b0b893295e5c8c811618638bfb9fcca2daef20b209ef4f0aeb400372b9827ff8b01325427ee41091dfb9d6b3c334510a6f2b4cccf407970cf72adb0bb2b293
-
Filesize
545KB
MD51c37dc7bf6f85e2b893d191d4c6be2e1
SHA1d78d919a3fa9e1be12777079a70cf393e93268cd
SHA256364f91e6fcc3d0d6e9afe361df070d2878f2cb709f4eaa102851e2752ec86af1
SHA5126ecd37cb9e1371c513d1bb6c6c8ba7d6087af6dbe1a6c5d914a4572a5c4b4affc09896ed17cf1fb9843c82c32c8d412aef3c10d36f541e2ef31005af7ece4edb
-
Filesize
433KB
MD5c8f3df042eab701b89fa2cd3b5c939ac
SHA1ec6dde589b2b3eba17580656fce0062ed29fbd74
SHA2560953ee1bc5479e0434face28b693a465a9f8c2aff15ab7a4eca8e9d53e8d5a1b
SHA512166bdf4407a5d01f9eb38842f9e98845b5dfa69f9d1ee4b1591d6bf1a21b3602b67643f84c9d89c943111ed44e908a831a4e1fdc78c56400e5766bf36f2b0f92
-
Filesize
539KB
MD50574a04faeaa91ab94dff3b811a12f54
SHA1555d5676ef539ce18fe56c8f6d5e5a841842e374
SHA2561ad3cb874c3dc00063ef26744c16775645a3a55acde6a227fd39f272bf3f632d
SHA5124c19d529d91cb86d46b0c18e635d94bd4c6fae4db077cc7a0b39f42e564e329126c190369a78758dfd45b10d70ffca44eaac36b66f328c9decef87dd8f816e4e
-
Filesize
146KB
MD5c344cbf0523fdf291a51b6a35e90b6ed
SHA130a93e58a884580aadd7a59b9cb9981acf528067
SHA256a538fbe384d06a9303baefa702d1fafad721b018b0b2b9c4bac14729fc349102
SHA512e96319da788b2e6b0c87cc98b1245250bb55c220b0f76ad12e974a529ecd52259a58aa8bd88edca81373785db36e39f728822dff8824e3e0026c27e2672085fd
-
Filesize
2.8MB
MD5e09670a91419555fed8c0b689d253c65
SHA18c352200ddd0744a58a4c5a638ec96e6f554df44
SHA2564e9ab60a6372a2719b36854c0276817d82dbee5a774290dde2acd3853e12abd1
SHA5122f123beedacd95f4144c28241763ae7f7c9a04add782c11430126a1a74b6feba59d57f960114aace6507c8f4fd12fa09b1541222de951b98833efc6336bf61f4
-
Filesize
1.6MB
MD5638e4884e1bd49899fe08356f2b0b280
SHA180aee6f0c2e68a0ff771e3aad9f250896cde55ef
SHA2568f8cd52dd8d8fdd9535c789cee0cd2b2e4a8fec8ba343c70fe70dd0bf57d6157
SHA5122add873ccf1dad860fbbc816aa92f261c1c01d156cba42a5ebd0f016c8ed3c422972d24a98d277dc3872a6a226058b3a74a72c3d0818efb926349cd99a4a8eed
-
Filesize
1.5MB
MD5b3c9e1e36ec66ac0c73f24f81f231526
SHA1c6c551d3e11adadadca86e36755e2ffaba9a7903
SHA256892058240bc6a2ed5877e406fd7e4e8e8ed7df1c2a89a82f5ffa9f62824730a5
SHA5129359d087a0e9724fe961e14e23e57fde90e88633399f038d38e4546e5967bc1ffd421600d3d6e75d821e6e1875cfe875e7aaec657556f2e614c345a043019ddb
-
Filesize
158KB
MD5c1dd55fe165c58c62ac117e785ae5e03
SHA1d0350cbe25bbb1bb317b12be1884d1eb26b9d257
SHA2567373abd7f6f0f1955bcfa30355a0d7eb6e30ace5c485596f02e557e9c11210fc
SHA512c84ae6425326246bd7bacb11bb3f430be5f0d6f266df6d2a123b17e26764fd8198ab816a9c6ad44e833b71fe3c2d8e7252ebd97822a563132c016f40865f23e5
-
Filesize
64KB
MD589b53106f08a3bdb65ca3dc4271f9541
SHA13299a688b08536d1ddbdd1de4a4abbb6a41adf09
SHA256a9cb12de21fa353716204f3571a0171a4318d8a9f543a88221f9324a32838c40
SHA5120a61e0bc18d2127abdc20be9488005ac59ddfc16e6313e588f95c910c3f022ac4d70e4060b083b9a7e2ee8ddecf29b083161010df08a5cf4bace158e39754b1a
-
Filesize
169KB
MD5a8f0ee65eb6cda46b35b741af2f32190
SHA18abf07146832424bac78c5588f3cdd6a7a1e0aa1
SHA25698f53ee077d6ffc5cabcdd8e8fbcd7049ea74391a828d5dfc755acd3cd84fee2
SHA51263e4a736bec41afd8892f0a88a1e917e683f0eb33ecbe1c3cb6a22d942521eb2ef33fac6c417952ff970d33a62502d9755a294dbbfc502450b924610692c364c
-
Filesize
341KB
MD52ce0ea34614b1c045893ffcf2ca33ca7
SHA1085a0de6ca5d92a78618c4e7b08c5aec2621cd2b
SHA2569b102f2285c92fdb90472887b18b96b50e6f4382e27f39bbb708afdf08b11d6b
SHA51245b5430f081889f95f3fb41f17e31223ba5ce5101fcc097c91afe788e429fe78959e3c08f26343e69c8eeb2a5d698ce7599e0571640a332ea7276163992c2e73
-
Filesize
337KB
MD58aede347c95291c12ebe7d62ec24cb75
SHA15d1248ddc2316ff08e54b8de36fb1f42b8d4b519
SHA2562f085ad39426eb76bae5552d0bfecd63fece5daf10b4a565d873db09924947d0
SHA512ac4ccc8309a94c8ddfc6538d73c6db3b756631c9419e4977e3e268104e65a963244af7c8e386767d53dc7292d25be9b75b115b5c56b16b8eb1d560f226397fdc
-
Filesize
192KB
MD5e41b55d09c8bcd556f5c16cea4e61d30
SHA1ec626ccd669229786b97e1d0e6c87ead875b775c
SHA25613b155e69e840fa4813a37503d4f4077db25d6d78214c81034a64e2c2b9501d3
SHA51255885036c7b9d610640763269720e747c97a204df6fce55d7ecb0af63dc16f2f46b3aa377b6742bac76ae5388339571d5e21d1531d24bf476b54553e565b53f5
-
Filesize
64KB
MD5af5378f5bfc5300b59a3c52b51fd151f
SHA16d59d16d09ba9868e70ecc78965c3aabf8c992ee
SHA256efdb5133f78f0f5239f2fff7fb00944a0867e6b41b8c64306e40414e97f04ed0
SHA5128db2cf6cac9b88fdd945f95e722308152be1d7c8088579d95ed8207c0beb21e34fc0188b995d00bae9dc3c896a3c6fede2d2d433e1044d9e9ba931e04f4568b5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
172KB
MD5c8e13f8c94a684be8c3a815077ce5ee5
SHA18b5a7f5461ea801e1d7b6a02e243dd6825f470e4
SHA2569e6b74709f73afa9502a3e86bae8a3a0bd4cf009fec6956e37de8eaa7eeabfbf
SHA512ed81bb3d102bac0e46affabf24e0ad6d32cc735c6903d0eb639e6fe23edda7b030b840a07672e25653b85a75d47f02b4f8243446c3731bd822f601913bb0b7be
-
Filesize
130KB
MD5b600e72c991b85ce095942207ddd7732
SHA1518f1f2e1357094fb386235d7841de8f98771be5
SHA256e921c3499603c45e2725df97fcc06d2c2baadfce6935f59f8a097cdf21b88b10
SHA512704b05ee8958cdd91dbe443c11e16d475975d1459f096a85ce2b65fa23cb7d478d2bb22f9ebd1d79ab52b36ab05873f7d2b759e81880e096b77b1a7836f04c47
-
Filesize
791KB
MD50b6cc42e0e7dbac5b14d8272cf9a10dc
SHA150cd32af636a9f7361076dec109e1304bdccab35
SHA256ff3c3e7ea41955ee1ce503a05dd815a60f9f3d8765f117113212125154aa6136
SHA5123b5e1918121d85d1a34096becfae18c96f02307aec87b964e82323c94542097b8466561d80e4e024e0a778765299b6b76f02977c23d0086414c12d01fa1ec766
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
230KB
MD5556bcc07d119b54c0416768a7037eac7
SHA12d1cad0906753e017ed8494617c0184e751219f1
SHA256a20e4c11c4761572b1ae83ff068a7aae4da7f804e7ad14353a2cc28ebe2cca32
SHA512d1f1f10bbc36a9d2a923f7cf9043cc407ec649b2c9763785d1142191e21d653a0caa2db391745c48feda365540705f14ca5bab1fbb7789698188a02dfbf78550
-
Filesize
196KB
MD5d7d6555f8658841605179ae77b9925fc
SHA1ed799e4d562a1d4de563182d65053dfa5fe504b3
SHA256df101e0dd050eacf76f56798278fd4fc447ab28b180bc5a4087ee138e5cd6fe4
SHA5127ea09d20ed9ecfea17adbd13823533dc1fb6a609ff1a3c427c1423ce96592d7d8f3f20740fbcd2738dd34b23ffdc037ff6fb10ec3fc524f36412d564d43b05a0
-
Filesize
313KB
MD5be5dd8b7ee665c298c372c4883c3c15e
SHA1f996f23d5a9d9702e564b94a658dddba4e185660
SHA256ecc729d531520e7efb7fc1f228032466412c913df6bba13bdab252813dd01098
SHA5126cf239a6c29ce95def999c786d5b3836e7355f56fe7fc3210f6e1123e83d97a3badc5a5e1afe7b1718195bfd4d0a7223f2fa9af6214e2af5a0922532d5078930
-
Filesize
145KB
MD56fd2dd78b8ed6acd1b7c1630426bd8ab
SHA197d2bfd9f93bc6bcb933fe997e10966ebb634355
SHA256ca0f2d6767946d03dfec2116bb6f03846cc7841aa74fbc178abaf447cf37c446
SHA512ad3dc6037b396a82b2676fb5e2d81117117c76e7d3f989089b4a0389cbb56b4e710330153bbc71451c9bd264d644ad2d011084d5d287a4f208784e510d51f64c
-
Filesize
32KB
MD5a2888fdc5eda3adf375b51f22d5705d8
SHA1ebe2e8e11691ac533a553fd13cc895eeb8f6d2bc
SHA25643b545d26cbd960a5be834909e83571ae1ebc5129aa34533a61504f90385956e
SHA5128b9ff4784053c73c8189fbbd64ae43c0ba60fc3d8278fc04c169928cd443b5a58d5ce40f87552dd698418465f73c912606f5e666628519cc920453336e5026b7
-
Filesize
74KB
MD5f6a7664f3640b1d4feb804fcc25c43e2
SHA10af613b807da7101a651409caa6692f0f0946d21
SHA256542d93c8ff706da72ad1e5add4d6ec915ce7d98c617aaab95a42f835f2d93ce6
SHA5129142b97da49bc5ec4cfb581a610f7432fd505c9fbedb1a5b82e554dc79a9fe321806336028e60e8b098388d0f4c68aca2524afae4ded6430588ddcf0cfcaa87f
-
Filesize
720KB
MD5667506927fba2c4f922c2bea71656bd9
SHA11ad5819c36c94aea525d88551c36bff9dd35e12f
SHA2563559091bba1cf58ec92f2a920b82132863ef1e57fd443e6b19a80df074db5ff5
SHA5122423e65e084a4ce5302a0788f8a00fcf12498a76093f63543cc5b4984e1155bedbc418a1549c9c1f2dacb16ccb1bc5dba093a897836befdc6fc6013b098a39cc
-
Filesize
102KB
MD585af6c99d918757171d2d280e5ac61ef
SHA1ba1426d0ecf89825f690adad0a9f3c8c528ed48e
SHA256150fb1285c252e2b79dea84efb28722cc22d370328ceb46fb9553de1479e001e
SHA51212c061d8ff87cdd3b1f26b84748396e4f56fc1429152e418988e042bc5362df96a2f2c17bcf826d17a8bae9045ee3ba0c063fb565d75c604e47009ff442e8c8e
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize16KB
MD5465487bce8a9cbcc8d29d3aab912a0b9
SHA1137f62cffc6a654efa9f43bf8547866c97d0f7e0
SHA256db6326ceefdc9c454d16400412daa32ef7c7a3e04df241e92dfcbf9b858c3344
SHA512fa8696ac87d4997ad48e851ac66838060dd0183e18fbaab9ed67ce36651aae3931752b4e3cf3b816c334d41b6605ea872231510aa4bb70a603975cd914b86bd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d3d01301c5e82e7d02cb1d9c1b201fe3
SHA113b8031de86e6211f6842859c57061c83d19e152
SHA256ea7959d92918116b2ac444c27ea882ce5802e6bac605c1895734f7609364d575
SHA5126bf759f69d635ea41eaa4ac13b0dc77336a439d25f28597854c8c729b58a88a20342b5264aa9b3a11b57f0ef8cff30314a6bc6ca748bfddd2f2e15e29bb9248a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b0642172c8494caeacfe9e93ddf9e604
SHA168a2c20d174afae787ee8ba67aa4f17754ed425c
SHA256cbda494dd0428d6d800bb9084dc5e17cf25aac269f85c6a89f067b1327041f29
SHA512b6c0721952e7ba5bce62e18dc0c061aaaa130711099e4b1ae17a51f32249c8ee6b606bb9bd882b8fc3aa71cd242716876c1d18fb298ca0bdccacab6019a4d3ca
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize13KB
MD54c8431b10f93609a7db428de68c78a86
SHA155b4dfc667f0d6dff76502bc3794022c55592d20
SHA25654836b78c279682a93bd0cc1a44828eff77f63348a777a0da3ed67211484329a
SHA51209752c7b47d2adf1858a2a14a6083bc7658d0d5753a60a02f2c4f1c2842a5c4af6e440590230c7eb2539bac6fc539ede85fefeaedc2996e121989da79630b2e7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56336e8cdad1b54ac736d1a817ff22c9f
SHA13e3f1f2c2c7b4dc6efa2d0141766b1abe8366861
SHA2568084923cdb7da98e8c0e22b3717e74d7870c04e4a66c3ad51686f0bf28579075
SHA512307527508eaaaea4d7751eff710003257e562a37e60cd393367e192a9cc329235eec0dbd493ff2e9743049bcb1ddc9ceaab94d0545db162ab4538cc817ed2598
-
Filesize
287KB
MD53ba4575da338b77f18f516ca5ca01491
SHA1fb7f8e51066baf24ca173df18d912f307dfec370
SHA2565ec5272617a9c3f0db55ce6470025db0107fee62cf196d1f33edde0839b467d6
SHA512f16f4ce5cfdda09071e878bee6ff81f75400fb2a0bb741d7a2a217c70981a5b374ed18f0c1077e73df03f2fde1908b26a86412e03b783a1a8ba89a32cfef0de9
-
Filesize
383KB
MD565083ad4bdcb4a1430a660d5d3cddb94
SHA1cad60729f8204529ead1f13d45d1ef9db0f8adba
SHA25682c65f070845a674749fc75e8f1fd701e6d130fa498856d980547c26a4fa9404
SHA5120293c9430e4a34117e5231838b0e850511c4ba5df4705e416053a0676077adced4d43447a693ecc7cd83cb807596eeb3e1ee7e3a9ca783b3c1e3f5df67c3516b
-
Filesize
346KB
MD57d05614890e94295a20883d60babe20d
SHA165ceba3d1e0556d858d711204187f5861701b82c
SHA2568a5dd095db5a385bc9e9c0d24ec2677bd6e5c3a1190efd000b55addc36453c13
SHA5126391cbb4d4cf3f361069d101324df860bc966fec7e2ee01b5fb066c05d6adbaeb570f265473c3de978c84e9269d0ac6666399e14877ec7d52100acc261fd7874
-
Filesize
449KB
MD5f1fb5934d07b4cfb9e0223d3e70ef002
SHA1424a3a14a7e043435752ba39ac2b82f44fcbf575
SHA2564e3ef457b1d42259bf9638d516ac32a14e4ceaa2dfa182494e44ece65b9f32d4
SHA51239a79050193bb0baeb56dab0bdebe99b23b594c421c56392fb736a0ac3efbe654d1dc82d051c9ee53f92c5d75d5de88a93a4b86167181b353775a2b13ae5afa9
-
Filesize
532KB
MD54d28eb79a17e163215d886ddb3657a83
SHA181f652dd59d3b39a6199a78ab86ae75140123e1f
SHA2569958927349ea6d7cf54e5286e17a3bcd863487fbe00ab7bfe48f0a31bc859f45
SHA51263f016992d4b7fd5e1c589b64bb097769b6e1622f3c155a428e6ed2b7da03e9f9dd929720a6750c125e064459659009760f146dc0c235bdd40ad20a283427b0e
-
Filesize
14B
MD58c36cdedb21883bff86e082a57ed1639
SHA15114ce74a63ca7f5c381786fa19b51d4b6de2e78
SHA2560c46fd38bdae3cf9f5bc062173966770e843001d337b94af5c2cc7b20c61de77
SHA512ed83f24476a17213a4e1147cde59885e55c1b593ed237aa7d2354d2485873edd87c3dca4177686630764be594b13dbaabdd659a65357f5f5854fdba1b16bb1fa