Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 02:02
Static task
static1
Behavioral task
behavioral1
Sample
toolspub1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
toolspub1.exe
Resource
win10v2004-20231215-en
General
-
Target
toolspub1.exe
-
Size
237KB
-
MD5
fbba6e587d5700e84b4badbd6fcb3123
-
SHA1
6f4c4e6b88e7cbf87dc70427513a39725ee3110d
-
SHA256
0f4d1e6a36a2f6fc4e29b9134a49a081b305501bb6394367f2f48a0387b02c68
-
SHA512
d76e5b8adb3c01c85b1dd297f53518a47f90668aa73759461d94cf957f6b73a132fa57eac0b0feda4d6a2187e7c1b11ec5ccd662505e3b91f0e57cfa047a732b
-
SSDEEP
3072:ctBS+BisPLWLi80S9pikUD0I54tP1frogEO1u5Nwinh0/b9r:4LMi80+p5UH54N18g4winh
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdpo
-
offline_id
Bn3q97hwLouKbhkQRNO4SeV07gjdEQVm8NKhg0t1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-FCWSCsjEWS Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0844OSkw
Signatures
-
Detect Vidar Stealer 7 IoCs
resource yara_rule behavioral1/memory/2796-129-0x0000000000450000-0x000000000047C000-memory.dmp family_vidar_v6 behavioral1/memory/1696-132-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 behavioral1/memory/1696-131-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 behavioral1/memory/1696-126-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 behavioral1/memory/1696-290-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 behavioral1/memory/2796-292-0x0000000000280000-0x0000000000380000-memory.dmp family_vidar_v6 behavioral1/memory/1772-329-0x0000000000900000-0x0000000000A00000-memory.dmp family_vidar_v6 -
Detected Djvu ransomware 13 IoCs
resource yara_rule behavioral1/memory/2608-41-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2608-42-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2608-37-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2772-32-0x00000000043C0000-0x00000000044DB000-memory.dmp family_djvu behavioral1/memory/2608-65-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2540-76-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2540-92-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2540-91-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2540-110-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2540-109-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2540-107-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2540-133-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2540-242-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 1216 Process not Found -
Executes dropped EXE 14 IoCs
pid Process 2784 692F.exe 2772 7E64.exe 2608 7E64.exe 2912 7E64.exe 2540 7E64.exe 1752 9F9B.exe 2796 build2.exe 1696 build2.exe 896 build3.exe 2696 build3.exe 2808 mstsca.exe 2804 mstsca.exe 1772 mstsca.exe 1208 mstsca.exe -
Loads dropped DLL 12 IoCs
pid Process 2772 7E64.exe 2608 7E64.exe 2608 7E64.exe 2912 7E64.exe 2540 7E64.exe 2540 7E64.exe 2540 7E64.exe 2540 7E64.exe 2876 WerFault.exe 2876 WerFault.exe 2876 WerFault.exe 2876 WerFault.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2916 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\c6cd7f68-d86f-49f0-bcca-41200075afea\\7E64.exe\" --AutoStart" 7E64.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 api.2ip.ua 10 api.2ip.ua 16 api.2ip.ua -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2772 set thread context of 2608 2772 7E64.exe 31 PID 2912 set thread context of 2540 2912 7E64.exe 34 PID 2796 set thread context of 1696 2796 build2.exe 37 PID 896 set thread context of 2696 896 build3.exe 44 PID 2808 set thread context of 2804 2808 mstsca.exe 51 PID 1772 set thread context of 1208 1772 mstsca.exe 53 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2876 1696 WerFault.exe 37 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 692F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 692F.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 692F.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2684 schtasks.exe 2836 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a build2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2668 toolspub1.exe 2668 toolspub1.exe 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2668 toolspub1.exe 2784 692F.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1216 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2784 1216 Process not Found 28 PID 1216 wrote to memory of 2784 1216 Process not Found 28 PID 1216 wrote to memory of 2784 1216 Process not Found 28 PID 1216 wrote to memory of 2784 1216 Process not Found 28 PID 1216 wrote to memory of 2772 1216 Process not Found 29 PID 1216 wrote to memory of 2772 1216 Process not Found 29 PID 1216 wrote to memory of 2772 1216 Process not Found 29 PID 1216 wrote to memory of 2772 1216 Process not Found 29 PID 2772 wrote to memory of 2608 2772 7E64.exe 31 PID 2772 wrote to memory of 2608 2772 7E64.exe 31 PID 2772 wrote to memory of 2608 2772 7E64.exe 31 PID 2772 wrote to memory of 2608 2772 7E64.exe 31 PID 2772 wrote to memory of 2608 2772 7E64.exe 31 PID 2772 wrote to memory of 2608 2772 7E64.exe 31 PID 2772 wrote to memory of 2608 2772 7E64.exe 31 PID 2772 wrote to memory of 2608 2772 7E64.exe 31 PID 2772 wrote to memory of 2608 2772 7E64.exe 31 PID 2772 wrote to memory of 2608 2772 7E64.exe 31 PID 2772 wrote to memory of 2608 2772 7E64.exe 31 PID 2608 wrote to memory of 2916 2608 7E64.exe 32 PID 2608 wrote to memory of 2916 2608 7E64.exe 32 PID 2608 wrote to memory of 2916 2608 7E64.exe 32 PID 2608 wrote to memory of 2916 2608 7E64.exe 32 PID 2608 wrote to memory of 2912 2608 7E64.exe 33 PID 2608 wrote to memory of 2912 2608 7E64.exe 33 PID 2608 wrote to memory of 2912 2608 7E64.exe 33 PID 2608 wrote to memory of 2912 2608 7E64.exe 33 PID 2912 wrote to memory of 2540 2912 7E64.exe 34 PID 2912 wrote to memory of 2540 2912 7E64.exe 34 PID 2912 wrote to memory of 2540 2912 7E64.exe 34 PID 2912 wrote to memory of 2540 2912 7E64.exe 34 PID 2912 wrote to memory of 2540 2912 7E64.exe 34 PID 2912 wrote to memory of 2540 2912 7E64.exe 34 PID 2912 wrote to memory of 2540 2912 7E64.exe 34 PID 2912 wrote to memory of 2540 2912 7E64.exe 34 PID 2912 wrote to memory of 2540 2912 7E64.exe 34 PID 2912 wrote to memory of 2540 2912 7E64.exe 34 PID 2912 wrote to memory of 2540 2912 7E64.exe 34 PID 1216 wrote to memory of 1752 1216 Process not Found 35 PID 1216 wrote to memory of 1752 1216 Process not Found 35 PID 1216 wrote to memory of 1752 1216 Process not Found 35 PID 1216 wrote to memory of 1752 1216 Process not Found 35 PID 2540 wrote to memory of 2796 2540 7E64.exe 38 PID 2540 wrote to memory of 2796 2540 7E64.exe 38 PID 2540 wrote to memory of 2796 2540 7E64.exe 38 PID 2540 wrote to memory of 2796 2540 7E64.exe 38 PID 2796 wrote to memory of 1696 2796 build2.exe 37 PID 2796 wrote to memory of 1696 2796 build2.exe 37 PID 2796 wrote to memory of 1696 2796 build2.exe 37 PID 2796 wrote to memory of 1696 2796 build2.exe 37 PID 2796 wrote to memory of 1696 2796 build2.exe 37 PID 2796 wrote to memory of 1696 2796 build2.exe 37 PID 2796 wrote to memory of 1696 2796 build2.exe 37 PID 2796 wrote to memory of 1696 2796 build2.exe 37 PID 2796 wrote to memory of 1696 2796 build2.exe 37 PID 2796 wrote to memory of 1696 2796 build2.exe 37 PID 2796 wrote to memory of 1696 2796 build2.exe 37 PID 2540 wrote to memory of 896 2540 7E64.exe 39 PID 2540 wrote to memory of 896 2540 7E64.exe 39 PID 2540 wrote to memory of 896 2540 7E64.exe 39 PID 2540 wrote to memory of 896 2540 7E64.exe 39 PID 1696 wrote to memory of 2876 1696 build2.exe 41 PID 1696 wrote to memory of 2876 1696 build2.exe 41 PID 1696 wrote to memory of 2876 1696 build2.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2668
-
C:\Users\Admin\AppData\Local\Temp\692F.exeC:\Users\Admin\AppData\Local\Temp\692F.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2784
-
C:\Users\Admin\AppData\Local\Temp\7E64.exeC:\Users\Admin\AppData\Local\Temp\7E64.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\7E64.exeC:\Users\Admin\AppData\Local\Temp\7E64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\c6cd7f68-d86f-49f0-bcca-41200075afea" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\7E64.exe"C:\Users\Admin\AppData\Local\Temp\7E64.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\7E64.exe"C:\Users\Admin\AppData\Local\Temp\7E64.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\4816a03e-277c-41e0-80e5-850b7a4e87b1\build2.exe"C:\Users\Admin\AppData\Local\4816a03e-277c-41e0-80e5-850b7a4e87b1\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2796
-
-
C:\Users\Admin\AppData\Local\4816a03e-277c-41e0-80e5-850b7a4e87b1\build3.exe"C:\Users\Admin\AppData\Local\4816a03e-277c-41e0-80e5-850b7a4e87b1\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:896 -
C:\Users\Admin\AppData\Local\4816a03e-277c-41e0-80e5-850b7a4e87b1\build3.exe"C:\Users\Admin\AppData\Local\4816a03e-277c-41e0-80e5-850b7a4e87b1\build3.exe"6⤵
- Executes dropped EXE
PID:2696
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9F9B.exeC:\Users\Admin\AppData\Local\Temp\9F9B.exe1⤵
- Executes dropped EXE
PID:1752
-
C:\Users\Admin\AppData\Local\4816a03e-277c-41e0-80e5-850b7a4e87b1\build2.exe"C:\Users\Admin\AppData\Local\4816a03e-277c-41e0-80e5-850b7a4e87b1\build2.exe"1⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 14402⤵
- Loads dropped DLL
- Program crash
PID:2876
-
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"1⤵
- Creates scheduled task(s)
PID:2836
-
C:\Windows\system32\taskeng.exetaskeng.exe {98703D41-8646-4CB3-B4E0-783AED402D75} S-1-5-21-3818056530-936619650-3554021955-1000:SFVRQGEO\Admin:Interactive:[1]1⤵PID:2168
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2808 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:2804
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1772 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:1208
-
-
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"1⤵
- Creates scheduled task(s)
PID:2684
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5fc115b2c6fb231b1e7ec152ca261c789
SHA16fac5eefb97a0e0a08e98a4e078cff61e0eba5ce
SHA256ac6007dd9704ec073faa7e21906ab34feee33d0418e96afae081f868d8066977
SHA51273ca74ad031ee3fe09bd04642652f9aa3dc72cb81e0bc5762de7bfe7d73b9aa35c3a0981fa4a22d231bb4d78929709133a39ac533448966280b1f39f1fde8988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD54984ce4ea26cf0e4943ae4edf7bce961
SHA164c02eccbaec5ab1e0257c0656736c02541500a7
SHA25624dd678a65b40e921e4b789db63457120dbdc796cbd1c385df8fb9d925e7bc0e
SHA5127478d5ead9ef43ff54ce78e76b8558d4bebe25bcf715f666a37fbead3592d16651834250f09269dc010161fea2f3b8ab6ebac7e8fd9525316589d5e9973c52d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6acc14f69a118046faea74aaf10a631
SHA14b4081206e71bff6ca496730496a92bf787614f3
SHA2560fafd3bb704a7aaba9dcf9d02356d95b2317952dad568e1fb15765024021a7e3
SHA5128128fc438875723d287e6ea351bfc3d2ff7a265644d72846585e942fbebd62b7663279ad55429e677894d471a239a6ad058d05d46b12d701172cb0390f797bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5555b8fd1ce234af72667f621381b8a68
SHA1b71a05e2ffb217fa9821652e746783840bd46dd3
SHA2567728cee34828397d130bf1b28b009866ab932544606790566700fa01fb4718de
SHA5123a0d2e701f75e8aa67af2d304beb93c4d6f239a49402032cc4c3bf53b360487befa40b78dd08e2d1f8e75b585cddb3d5d1ec14678f5d7c21df4ae78b7330f6da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5922145ca758e3057b95c0349f8b56a19
SHA1ba3c3d5c4ae54b80a56ba5e5013d4a89363621dc
SHA256614763795f1aef8c91238c2b9261b315888b52c604efae2279f0aec3f4994a43
SHA51210dcf97169a00b7a482947f56d1357425e6f1a14c0b0c99a3a25040e4b034b12751e6d297d1944cef913ad2ad2d5f66484793091561ca8c9edd0fe8d8f6df87a
-
Filesize
82KB
MD5d66a3727b314fb3d8d3efc45b2130ce1
SHA145960af1fd3b8cb3b9a38cabd93154d72777e813
SHA25630cb5c26a1fed65b789d5c98374cf24ae6bf2d0f1e64112dfc6a88df9021c86c
SHA512be7dc35fec906cbe9c352abbf3959b0667eebe597bcad6fdb7d1d718e79ff775ed57ff85b10b2d1cbab438e023eb7d6214f264b852295ef2e3690a6c1a7c6ac6
-
Filesize
105KB
MD51bc762cf13a40dfb2ddb8852e3d2977e
SHA1ad876f376a5485480df4d42126881012cca9a453
SHA256af6c0d2f8f96de373d24b382f8638efe7485b03611dbf96fb7ece51f2cbed93f
SHA51295f4ed685a7218c74b39f3b9f2e2c1ad3a21f1e7de9f663de4bb58c6acbcfd932398f0f720b2093c06383f46deee0cc096775571c59dc82e28315dc44f68f994
-
Filesize
83KB
MD5bb0cb3aeae580ca255f4feb35f0ed625
SHA1d8e90ed6a895673b97f9907f6d59b355a35d873a
SHA2562618b65aa6c4f26f0a6e290980ff067f1319461beab6a6c007de1de990c25137
SHA512156af01d4ef651ab04c84f00292bd4bd8ecddc6896ccf55720b0d9e8d66dbe07ec68b48c15c3bbbf80482b8486d3c269143860d09ff74a63e6acbf0e59d27176
-
Filesize
67KB
MD5304effe9bdb09a52112259fc6a8383ab
SHA14956b217648369baf2606769204432de2cbb8b79
SHA256216b5f61614c4ef3a66d5c6abdfc5f3d3655f64d9fd4841d7278919e78751bb6
SHA51262b405d7704ac92207bbb719208940114f0b2a2429caf380ed97ec152a94809a39354ed60462c65a0aa9141bccdc30a886dedab8cc00a0a5414366adfda2eb9d
-
Filesize
244KB
MD5703f33a330ba9e05ec58a9696da18867
SHA132bec84a466cc24a37d36b66950d4827f06d3f67
SHA2567422221b5efc870331ed022370a7358e4d8c0462479c16a28cc0b068c5cfd5a0
SHA51280448bd8e96f2f0b8229a3cb6243b1709f3a7b6647ccf983ff4c13a99e8405c6900491fddf617f0dc6cfb14284dce0db2f8768ca711ea11a0952129472af9fca
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
Filesize
291KB
MD512543127a29c56a01db709cfcc9d6fb6
SHA139148eb10c6dda4f235ac85c3c6b73bd5b1ee252
SHA256a5686244dfef3990b0cb52f7b0d99b48c4a2b8d8e727ab76f361fef642a53328
SHA512e9785b7bbef05df42dfd3c7e2c771b8ab31da3d68a501ee45961cfda496f51f05386601c28765bb9c43d858cad04efd31038ff12187d5c41c5454e9085fd2704
-
Filesize
237KB
MD5fbba6e587d5700e84b4badbd6fcb3123
SHA16f4c4e6b88e7cbf87dc70427513a39725ee3110d
SHA2560f4d1e6a36a2f6fc4e29b9134a49a081b305501bb6394367f2f48a0387b02c68
SHA512d76e5b8adb3c01c85b1dd297f53518a47f90668aa73759461d94cf957f6b73a132fa57eac0b0feda4d6a2187e7c1b11ec5ccd662505e3b91f0e57cfa047a732b
-
Filesize
199KB
MD59653df3c8c68df3a1f93c0c92a6cd8e9
SHA1a31c7b1c4218def939bb2bf3e5b6dda988fc4068
SHA2560655e54616c0f5050ebbf663a6ed0aa13f734275e6d43eb83cbac1f900aaf900
SHA512b3d65ea794e63e7510c67b54f3215bbf77c8877b06e4d81e295d7b28c14dd0c427af120b2dcb20d7ade41a63305de3b2e870224fba4b7e1664f5d851f8731416
-
Filesize
227KB
MD5d5038af3b62b524abca6d518e7f4e424
SHA187fe957a6bd6a9b82f9ebdf18a9fd9519a343a34
SHA256a3e85db4d21d9996a01aa9ab90bd69d7c33d01657c331a1eb1498e0ba82546b8
SHA512f27dc37f1bb22af838893976c458fae559090d3831f4a833cb8e00c171159fbf1d34d75830224c78e2ca24b99902570e2f73107173e2576fb4ec8318d6cd418e
-
Filesize
97KB
MD54951dd6066bf0ba36afaeb767651160e
SHA1cc5284c4be44e0271d3b5d78fa88fa38c90b4c26
SHA256ca7dae942b933c70066487575e6e901bee0b66ee4ebcb583a8e1f5058aabebc4
SHA512ba370991de3780178863729e8300ce472b5c5188df55d40e85ddd3c68995699116f4041e2f50faa7c5f4f4e8ea51941565315240b3fd51d99fd417ac523bb52e
-
Filesize
58KB
MD53eb06b74ccd3ad046a6784459a00dd95
SHA1b6fee7fbf7e292c7fa1a4357361862bb20d97445
SHA2565ef7900b54fe3d5fa804a63e5d3021425a7b2c45d0acbb8e78fd2f8eee659328
SHA5128dfbd5592d55c142a912ea36c78331b31dff960d4230b712cec6abef925e6a302d570df826c7afb06eac32438cd6b5f22fcce81e1be48c265ef69a3ed1839ac3
-
Filesize
204KB
MD5e7f884d3006b9c0eae263603bcc4eabb
SHA12357e143bd83d2b5deb37a4aca42e91a1ec93b62
SHA2566eac0a4dd19c885dd50561e7e8678da33724bb00f2117651b26d0e6583694876
SHA512bc287b7e6d7389b5cf8ded2d05c914e0fde813aebf98c90e5a1576e7a30f22b117171349c2565d4c11d45bce8f342f9a17e96c2c8037f38d940b652b68010407
-
Filesize
227KB
MD56a54b851c3d97a3d521ee1fb890f9883
SHA1171f5cce266f88e5bf9271cba3dd4137fe6ba64b
SHA256c9bca77e297610e090e065434bc042e6f4dd10c04216606f654857ec20a5cd8f
SHA512d9c7ff2f29b709705eb62960f00836f3dceed872f282e1a08e59ec3b38e5f36535e034d254beeca528d29959fe7dc7a33b0e6f2eed157a5f1bf15f898657bd21
-
Filesize
130KB
MD58c5e2a61fe267595a88c66563e5dcda2
SHA11576c7f9e3dea87009a488bb1c554ae35bad1b08
SHA256df815e2589a8559c2f380b2366f32a587c85a849a59e8140e62f74dc079a6459
SHA51290adaae159f3ec130c6b11f7185142f93472adbaa0d743dad00c84a4d16f9dc1ea518b5d1a166629c0fa70df32df83e6d8c3ce91a23a9241cb369fef7fe19822
-
Filesize
209KB
MD5e21c974d9ea145e2e24abf44d0897c5c
SHA1227cb752a69691038dea5302e8dfab775d341855
SHA256cd5600f1e12c334e8928db70984f17fce5b1b2a2ffbcfa630214e2551fccf205
SHA512a37ffeeaecec498421e1cbe6a2b66fbef6212cfe80a1dfd87c0c700bfb018a5ea5ad89ec167f1735f3edfbc049a764c422e5e2084439261b11b20b93315c2de0
-
Filesize
53KB
MD5f6e3a65b427b3caaee8b99a21ba9910f
SHA1ec04cb3f7dd27462e907b944c4e3cc325d4e8e7d
SHA256af1b353e6e23f223f6084247f1e369adca688190b755d23ad367b76e067b27dd
SHA5122099af59ff14fb39aced34341e36f87a1418c3e11ea14ec4bfe1201be32cca6c91235e251700cc9c07bbcced66956bdb804b522c90adb726bced723daeb467f9
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
91KB
MD55c937986f23b77bc1a60bad6ca0849b3
SHA15b016077ed21fa0ef8f65016775959ccf0bff669
SHA25618609fc6948398d445dd7af776c67549dafb3aad8f7354f44591bdd934501870
SHA512ad656700e54de7b3b5c4d5a360b5db6507e16e9f082645cdcc768f72bed5f3b253821299e58cfbd6f4dbab601f251e67d9f140de358194c55cd7fc3adb8bd63b
-
Filesize
250KB
MD5980d44525b669ebb4a8e92de97bf7856
SHA139248dcc2c58fff706cd018e7957efd6fe83521b
SHA25665ad89fbd3dc4803cb125dc1e3c64546eb729fed938b354ef5219bee87cc4a14
SHA51255e15539b46399c53417011e67c853628cceb43d027a7232e25b1a7a8c2634a9e41080cc38008529ecf55e93fedf459dab44ea432b58d625e6ced292424f548f
-
Filesize
189KB
MD54475207aee2077e3eaca08f8d0eadccd
SHA1411dc06e3ab24b6ebd00cccc5207a3db6a17c684
SHA256ec881f7bc651832482ea76d87721c93044acc924e4379511d5d9a0219923208e
SHA5128cef1f4198d248955b41969c6c2984c884935c015d860ea0dd0869f3b0f981576f31162bdcdc363890d6fa39776deac6a05d48fa583f8fa27c3fb605a3cbcde5
-
Filesize
132KB
MD5f5def8b4cc1be2e95d178182ed85ff9c
SHA1938bba11cca32ee4008a0fe99f182a362ed199b8
SHA25629512acb426b8a24cd8a747d9e9bc04715e3b7c873c27e1943a7f9bc63e2a1fe
SHA51250854cb1444fc32fa66bfb70d032a346e113f246e064802c5a86cbe0d2acbd3f6087d0f8e6b1fea2179cfbd593913a646761b3d832e6064b3845781e92212c87
-
Filesize
72KB
MD5785563b0050645e1c248692c5d4ce5ef
SHA131c13307a7298d3b8904db48b185fd675562d846
SHA2562f3254296fefe7cc2c745bad9c282f2078b15bd73a97da11b1ac8242d52687f9
SHA51282f9be6c138d03bc52be2cbf9df8e296b2a669c4efb62757e13fe95b739822f26e085ffd5b823fcd20277159fc96ab0cd7cf81f0fba214bcefb67ce0b7a897b2
-
Filesize
122KB
MD5c25e568ff925a97d80e1be03405232d2
SHA123b5ec6e5acbe48558db7b884bea55fdf05d0685
SHA2565d5d62f43f2901d3772caf9bb111f09a067ee006edacd4bb3138eb1d2214f71c
SHA512af07e4c77f471a502f0b7455b6671c95a219aaac3564e12ed221f56210f8eff5d1103da37a64f02339c9571f4ac22cda77463561a3ed1f6e27ae9023f8c0080e
-
Filesize
102KB
MD593261324a70ed985b73dd44160709f05
SHA113bf330617578e682a3817fbf9b3d08f9e8a4709
SHA25662ff571426f21c2ec261aa29344c52bfdfb4779e632d93f58b8b293c800a7e2c
SHA512144823821708eb6008083f8951e9ff26be6661a6083b87a98529749929ccc2ffc5ff69c059a9c74dfff02c91576c8e976f64850e5d799da98c2fc2e0f412fcf2
-
Filesize
161KB
MD50c136300da8f41f46a175639efdfd03d
SHA10f6b1b3dc0ff64eb262bc856315252b3cee01f6f
SHA25620904d0f3dd1eac28aee99121e6541c20f39df13e0310903e5bdc2a129e98bf1
SHA512fedeeec9e16df4c19d64f9d5b1230bcb51b4bf645924074ea94b29b9995cce1d64f2c8665b6b324ba6c6d40408dabbaa1b220cf7065b56a977edac4dea6f3183
-
Filesize
111KB
MD5d15bbe634d30a8535bb8e82e2b869ac1
SHA166cfcaf4bdf97ebd5f7ddcfefb280bd02ff8ce20
SHA25637fdd6b04646d486f9c535e2878f0458c863401b9a9076bb796257432ee9d43c
SHA512f37a2cdf8accdc22e4b2046fdebe246e5b33983ccbcafa84f25b95b667e21412116a1bcdc47ce879b25efb543ccec2073e0a63d571f52d5b9a0357087ef14bcd
-
Filesize
203KB
MD54943e8c8e41c7a5c4b6461bb06e6026c
SHA13d853ff1b6badfa423997f10b317e724e09985d3
SHA256bc38ac9f56c1399995429db4c80a6563a1481d702fcc9681de687f73f66e24c3
SHA51230cf654640f22259b485392ffb9cb5ce3c9961b2dc9cb4cb9dfc1ff31b70aa8b860d9553d4263d921888c259c66c47d0077253269b10c23845f9b3945513e4fa
-
Filesize
143KB
MD5f3e17f099413255cf2041afde0858147
SHA19d43df5e80277ff53a142adff7450e83e819fe93
SHA2561e2d89074ea876c17b7743d78dd953ae1326206e94f9a490a98282a488266f00
SHA512abb765de1d2b049170ee03db86cb0e9296737953c1a399fd19cd82b50bb2f37ef989b675767dbae3eed9ce6d469f70bec7363bce70a78fe915ff05d2a465152e
-
Filesize
211KB
MD53dd30491b1c387f766e23e61c9a4fed9
SHA10573fc42872f9daaaf29d7bcdf1a591f0f90038c
SHA2569a978ddcc3ac4b3e119ee37bd28b8b653827e884c852067aaa520bf4428fc4ab
SHA512e57b8686230b2290c43e8b0b6a328d78f7916a5e0b724ab56bd26e831ac4904102c304f18a4ac0f2ac6723cef23f3924e3c488e6dcb3ccd1fee176b817aea5a1
-
Filesize
144KB
MD509924576035bde8443e392af1c63c9d9
SHA184f8b0843ff18f8f6abc75a8d44e845ace410e4f
SHA256a2ba8fde3bdced79d06ab775d99fab9c533573826f5786744924527c125aceb6
SHA512cba26bb6ed21ff94956a16888cf860035152e8d5e4d15b2ebff1dd866d84d2c51ca36b5d43c7ca5abbad40f0a4c5d0c60b6cc83dc9971da45872b7cf5e99e9c0
-
Filesize
64KB
MD5471653f47c0c943d9259c88f43a18b56
SHA1c4360462648288990f7b87c8042305cf9a9ba868
SHA256824a560b119aa1f0d9afd7e897b35989ff08d69f300d0c10424565f1c31b86ff
SHA51268a0467981042aa1f381da74ba413e1503a9c7ad2d8fdaf6c1b34fb212edfa62585461815d5ad37432ea5a991a5a5c93276a4563183bdba11d8d02fc50c919ff
-
Filesize
22KB
MD55ddc641e80b4905129b3e2064d5de2e8
SHA1dacb4c74a7b9cd868508b77f76c6a3d5c223ca73
SHA256d0756c512a6f7a96c4361d059ef0877a17ca8b223d54b2350bb833324cdea36f
SHA512896bdb371fc12bfc013b267ab19e2dfdcf47a2dae0b4974c3b999a3d120d02295e45ae9d3a431ae0a333cd7333a460750077062383b552e07e58dd6a6d06ff53
-
Filesize
345KB
MD5258d4444b59496549baa9886dd4d2af7
SHA1d064e3c2045e5b06f0735723418bd1d1a35877c3
SHA256b6f7f40d3df01798534bc75ee367fa0daa35bf264c6f724425e33feba9ac92b9
SHA512d960586419b0a4343ae7a90fa5fbd6f9222a34cbcd3cf7edb717f76a60cfe18c19f4f07b56de6fbdd7ce9c690c2f5637df24ad79b34f55718e9ad388807cdca7