Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe
Resource
win10v2004-20231215-en
General
-
Target
d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe
-
Size
6.3MB
-
MD5
c67cb967230036816fd0cbbfd96959c6
-
SHA1
d2fe988a302dce4bc0f34a1003a623f96a06b250
-
SHA256
d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76
-
SHA512
2f51046e44bdfa470f676071c69da8c05d50d8f79e748748f25ac13ec53d346f1c3988148000fea3ece38623fd629d1b3dcc943006e80b7bee95da7f1f42920c
-
SSDEEP
196608:GHqO3grg0lAc4G+JCJjsP8BXkf/hmzJzFYngA13jvHKvj4:GHzCOc4G+oB0BmdFY31zq
Malware Config
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdcc
-
offline_id
LBxKKiegnAy53rpqH3Pj2j46vwldiEt9kqHSuMt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iVcrVFVRqu Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0846ASdw
Extracted
vidar
7.6
1b9d7ec5a25ab9d78c31777a0016a097
https://t.me/tvrugrats
https://steamcommunity.com/profiles/76561199627279110
-
profile_id_v2
1b9d7ec5a25ab9d78c31777a0016a097
Extracted
risepro
193.233.132.62:50500
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Vidar Stealer 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2940-413-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2940-412-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/1936-411-0x0000000000230000-0x0000000000260000-memory.dmp family_vidar_v7 behavioral1/memory/2940-407-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2940-578-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 -
Detected Djvu ransomware 14 IoCs
Processes:
resource yara_rule behavioral1/memory/1548-311-0x0000000001D60000-0x0000000001E7B000-memory.dmp family_djvu behavioral1/memory/972-315-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/972-314-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/972-310-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1892-369-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1892-370-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/972-359-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1892-384-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1892-383-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1892-391-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1892-390-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1892-388-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1892-414-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1892-563-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2184-43-0x0000000002BA0000-0x000000000348B000-memory.dmp family_glupteba behavioral1/memory/2184-45-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2184-55-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2184-66-0x0000000002BA0000-0x000000000348B000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\d21cbe21e38b385a41a68c5e6dd32f4c.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
CF34.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ CF34.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2908 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
CF34.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CF34.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CF34.exe -
Executes dropped EXE 28 IoCs
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exeInstallSetup9.exetoolspub1.exeBroomSetup.exed21cbe21e38b385a41a68c5e6dd32f4c.exeCF34.execsrss.exepatch.exeinjector.exe6A38.exe8364.exe8364.exe8364.exe8364.exebuild2.exebuild2.exebuild3.exewindefender.exewindefender.exebuild3.exeC718.exeD75F.exeD75F.tmppyobjserialization.exepyobjserialization.exemstsca.exemstsca.exepid process 2184 d21cbe21e38b385a41a68c5e6dd32f4c.exe 1976 InstallSetup9.exe 1468 toolspub1.exe 2612 BroomSetup.exe 2420 d21cbe21e38b385a41a68c5e6dd32f4c.exe 2060 CF34.exe 1884 csrss.exe 2104 patch.exe 2084 injector.exe 2516 6A38.exe 1548 8364.exe 972 8364.exe 2260 8364.exe 1892 8364.exe 1936 build2.exe 2940 build2.exe 848 build3.exe 292 windefender.exe 2956 windefender.exe 2952 build3.exe 1228 C718.exe 2060 CF34.exe 1900 D75F.exe 1888 D75F.tmp 1768 pyobjserialization.exe 2888 pyobjserialization.exe 588 mstsca.exe 900 mstsca.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
CF34.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Wine CF34.exe -
Loads dropped DLL 50 IoCs
Processes:
pyobjserialization.exeInstallSetup9.exed21cbe21e38b385a41a68c5e6dd32f4c.exepatch.execsrss.exeCF34.exe8364.exe8364.exe8364.exe8364.exeWerFault.exeWerFault.exeD75F.exeD75F.tmppid process 2888 pyobjserialization.exe 2888 pyobjserialization.exe 2888 pyobjserialization.exe 2888 pyobjserialization.exe 2888 pyobjserialization.exe 1976 InstallSetup9.exe 1976 InstallSetup9.exe 1976 InstallSetup9.exe 1976 InstallSetup9.exe 1976 InstallSetup9.exe 2420 d21cbe21e38b385a41a68c5e6dd32f4c.exe 2420 d21cbe21e38b385a41a68c5e6dd32f4c.exe 868 2104 patch.exe 2104 patch.exe 2104 patch.exe 2104 patch.exe 2104 patch.exe 1884 csrss.exe 2060 CF34.exe 2060 CF34.exe 1976 InstallSetup9.exe 2104 patch.exe 2104 patch.exe 2104 patch.exe 1548 8364.exe 972 8364.exe 972 8364.exe 2260 8364.exe 1892 8364.exe 1892 8364.exe 1892 8364.exe 1892 8364.exe 2904 WerFault.exe 2904 WerFault.exe 2904 WerFault.exe 2904 WerFault.exe 2904 WerFault.exe 2904 WerFault.exe 2904 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1900 D75F.exe 1888 D75F.tmp 1888 D75F.tmp 1888 D75F.tmp 1888 D75F.tmp -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/292-496-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2956-509-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/292-511-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2956-601-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\d21cbe21e38b385a41a68c5e6dd32f4c.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
csrss.exed21cbe21e38b385a41a68c5e6dd32f4c.exe8364.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\05fa84d6-b2ef-4559-9913-d57853e74288\\8364.exe\" --AutoStart" 8364.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 29 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Modifies boot configuration data using bcdedit 1 IoCs
Processes:
bcdedit.exepid process 3060 bcdedit.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
CF34.exepid process 2060 CF34.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
8364.exe8364.exebuild2.exebuild3.exemstsca.exedescription pid process target process PID 1548 set thread context of 972 1548 8364.exe 8364.exe PID 2260 set thread context of 1892 2260 8364.exe 8364.exe PID 1936 set thread context of 2940 1936 build2.exe build2.exe PID 848 set thread context of 2952 848 build3.exe build3.exe PID 588 set thread context of 900 588 mstsca.exe mstsca.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Drops file in Windows directory 5 IoCs
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exemakecab.execsrss.exedescription ioc process File opened for modification C:\Windows\rss d21cbe21e38b385a41a68c5e6dd32f4c.exe File created C:\Windows\rss\csrss.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe File created C:\Windows\Logs\CBS\CbsPersist_20240203031526.cab makecab.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2056 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2904 2940 WerFault.exe build2.exe 1756 1228 WerFault.exe C718.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
toolspub1.exe6A38.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6A38.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6A38.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6A38.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
CF34.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CF34.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString CF34.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 604 schtasks.exe 2248 schtasks.exe 1000 schtasks.exe 2296 schtasks.exe 1632 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1780 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exenetsh.exewindefender.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-171 = "Central Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-451 = "Caucasus Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-131 = "US Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-81 = "Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-341 = "Egypt Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1042 = "Ulaanbaatar Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-521 = "N. Central Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-571 = "China Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-111 = "Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-422 = "Russian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-82 = "Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-431 = "Iran Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-103 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-472 = "Ekaterinburg Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-152 = "Central America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-552 = "North Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-3 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-201 = "US Mountain Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" windefender.exe -
Processes:
patch.exe8364.execsrss.exebuild2.exe8364.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 8364.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 1400000001000000140000004e2254201895e6e36ee60ffafab912ed06178f39030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a40f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a32000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 8364.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 8364.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 8364.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 8364.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
toolspub1.exed21cbe21e38b385a41a68c5e6dd32f4c.exed21cbe21e38b385a41a68c5e6dd32f4c.exeCF34.exeinjector.exepid process 1468 toolspub1.exe 1468 toolspub1.exe 2184 d21cbe21e38b385a41a68c5e6dd32f4c.exe 2420 d21cbe21e38b385a41a68c5e6dd32f4c.exe 2420 d21cbe21e38b385a41a68c5e6dd32f4c.exe 2420 d21cbe21e38b385a41a68c5e6dd32f4c.exe 2420 d21cbe21e38b385a41a68c5e6dd32f4c.exe 2420 d21cbe21e38b385a41a68c5e6dd32f4c.exe 1384 1384 2060 CF34.exe 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 2084 injector.exe 1384 1384 1384 1384 1384 1384 1384 1384 1384 2084 injector.exe 1384 1384 1384 1384 1384 1384 1384 1384 1384 2084 injector.exe 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 2084 injector.exe 1384 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
toolspub1.exe6A38.exepid process 1468 toolspub1.exe 2516 6A38.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.execsrss.exedescription pid process Token: SeDebugPrivilege 2184 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeImpersonatePrivilege 2184 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeSystemEnvironmentPrivilege 1884 csrss.exe Token: SeShutdownPrivilege 1384 Token: SeShutdownPrivilege 1384 Token: SeShutdownPrivilege 1384 Token: SeShutdownPrivilege 1384 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
D75F.tmppid process 1888 D75F.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
BroomSetup.exepid process 2612 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
pyobjserialization.exeInstallSetup9.exed21cbe21e38b385a41a68c5e6dd32f4c.execmd.exeBroomSetup.execmd.execsrss.exeCF34.execmd.exedescription pid process target process PID 2888 wrote to memory of 2184 2888 pyobjserialization.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe PID 2888 wrote to memory of 2184 2888 pyobjserialization.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe PID 2888 wrote to memory of 2184 2888 pyobjserialization.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe PID 2888 wrote to memory of 2184 2888 pyobjserialization.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe PID 2888 wrote to memory of 1976 2888 pyobjserialization.exe InstallSetup9.exe PID 2888 wrote to memory of 1976 2888 pyobjserialization.exe InstallSetup9.exe PID 2888 wrote to memory of 1976 2888 pyobjserialization.exe InstallSetup9.exe PID 2888 wrote to memory of 1976 2888 pyobjserialization.exe InstallSetup9.exe PID 2888 wrote to memory of 1976 2888 pyobjserialization.exe InstallSetup9.exe PID 2888 wrote to memory of 1976 2888 pyobjserialization.exe InstallSetup9.exe PID 2888 wrote to memory of 1976 2888 pyobjserialization.exe InstallSetup9.exe PID 2888 wrote to memory of 1468 2888 pyobjserialization.exe toolspub1.exe PID 2888 wrote to memory of 1468 2888 pyobjserialization.exe toolspub1.exe PID 2888 wrote to memory of 1468 2888 pyobjserialization.exe toolspub1.exe PID 2888 wrote to memory of 1468 2888 pyobjserialization.exe toolspub1.exe PID 1976 wrote to memory of 2612 1976 InstallSetup9.exe BroomSetup.exe PID 1976 wrote to memory of 2612 1976 InstallSetup9.exe BroomSetup.exe PID 1976 wrote to memory of 2612 1976 InstallSetup9.exe BroomSetup.exe PID 1976 wrote to memory of 2612 1976 InstallSetup9.exe BroomSetup.exe PID 1976 wrote to memory of 2612 1976 InstallSetup9.exe BroomSetup.exe PID 1976 wrote to memory of 2612 1976 InstallSetup9.exe BroomSetup.exe PID 1976 wrote to memory of 2612 1976 InstallSetup9.exe BroomSetup.exe PID 1976 wrote to memory of 2060 1976 InstallSetup9.exe CF34.exe PID 1976 wrote to memory of 2060 1976 InstallSetup9.exe CF34.exe PID 1976 wrote to memory of 2060 1976 InstallSetup9.exe CF34.exe PID 1976 wrote to memory of 2060 1976 InstallSetup9.exe CF34.exe PID 2420 wrote to memory of 1524 2420 d21cbe21e38b385a41a68c5e6dd32f4c.exe cmd.exe PID 2420 wrote to memory of 1524 2420 d21cbe21e38b385a41a68c5e6dd32f4c.exe cmd.exe PID 2420 wrote to memory of 1524 2420 d21cbe21e38b385a41a68c5e6dd32f4c.exe cmd.exe PID 2420 wrote to memory of 1524 2420 d21cbe21e38b385a41a68c5e6dd32f4c.exe cmd.exe PID 1524 wrote to memory of 2908 1524 cmd.exe netsh.exe PID 1524 wrote to memory of 2908 1524 cmd.exe netsh.exe PID 1524 wrote to memory of 2908 1524 cmd.exe netsh.exe PID 2420 wrote to memory of 1884 2420 d21cbe21e38b385a41a68c5e6dd32f4c.exe csrss.exe PID 2420 wrote to memory of 1884 2420 d21cbe21e38b385a41a68c5e6dd32f4c.exe csrss.exe PID 2420 wrote to memory of 1884 2420 d21cbe21e38b385a41a68c5e6dd32f4c.exe csrss.exe PID 2420 wrote to memory of 1884 2420 d21cbe21e38b385a41a68c5e6dd32f4c.exe csrss.exe PID 2612 wrote to memory of 2092 2612 BroomSetup.exe cmd.exe PID 2612 wrote to memory of 2092 2612 BroomSetup.exe cmd.exe PID 2612 wrote to memory of 2092 2612 BroomSetup.exe cmd.exe PID 2612 wrote to memory of 2092 2612 BroomSetup.exe cmd.exe PID 2092 wrote to memory of 596 2092 cmd.exe chcp.com PID 2092 wrote to memory of 596 2092 cmd.exe chcp.com PID 2092 wrote to memory of 596 2092 cmd.exe chcp.com PID 2092 wrote to memory of 596 2092 cmd.exe chcp.com PID 2092 wrote to memory of 604 2092 cmd.exe schtasks.exe PID 2092 wrote to memory of 604 2092 cmd.exe schtasks.exe PID 2092 wrote to memory of 604 2092 cmd.exe schtasks.exe PID 2092 wrote to memory of 604 2092 cmd.exe schtasks.exe PID 1884 wrote to memory of 2084 1884 csrss.exe injector.exe PID 1884 wrote to memory of 2084 1884 csrss.exe injector.exe PID 1884 wrote to memory of 2084 1884 csrss.exe injector.exe PID 1884 wrote to memory of 2084 1884 csrss.exe injector.exe PID 2060 wrote to memory of 2808 2060 CF34.exe cmd.exe PID 2060 wrote to memory of 2808 2060 CF34.exe cmd.exe PID 2060 wrote to memory of 2808 2060 CF34.exe cmd.exe PID 2060 wrote to memory of 2808 2060 CF34.exe cmd.exe PID 2808 wrote to memory of 1780 2808 cmd.exe timeout.exe PID 2808 wrote to memory of 1780 2808 cmd.exe timeout.exe PID 2808 wrote to memory of 1780 2808 cmd.exe timeout.exe PID 2808 wrote to memory of 1780 2808 cmd.exe timeout.exe PID 1384 wrote to memory of 2516 1384 6A38.exe PID 1384 wrote to memory of 2516 1384 6A38.exe PID 1384 wrote to memory of 2516 1384 6A38.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe"C:\Users\Admin\AppData\Local\Temp\d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe"1⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:2092
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsd13C1.tmpC:\Users\Admin\AppData\Local\Temp\nsd13C1.tmp3⤵PID:2060
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nsd13C1.tmp" & del "C:\ProgramData\*.dll"" & exit4⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- Delays execution with timeout.exe
PID:1780
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:1524
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:2104
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:1084
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:2248
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v5⤵
- Modifies boot configuration data using bcdedit
PID:3060
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:1000
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:292 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:1240
-
-
-
-
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240203031526.log C:\Windows\Logs\CBS\CbsPersist_20240203031526.cab1⤵
- Drops file in Windows directory
PID:1332
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2908
-
C:\Windows\SysWOW64\chcp.comchcp 12511⤵PID:596
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F1⤵
- Creates scheduled task(s)
PID:604
-
C:\Users\Admin\AppData\Local\Temp\6A38.exeC:\Users\Admin\AppData\Local\Temp\6A38.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2516
-
C:\Users\Admin\AppData\Local\Temp\8364.exeC:\Users\Admin\AppData\Local\Temp\8364.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\8364.exeC:\Users\Admin\AppData\Local\Temp\8364.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies system certificate store
PID:972 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\05fa84d6-b2ef-4559-9913-d57853e74288" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\8364.exe"C:\Users\Admin\AppData\Local\Temp\8364.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2260
-
-
-
C:\Users\Admin\AppData\Local\Temp\8364.exe"C:\Users\Admin\AppData\Local\Temp\8364.exe" --Admin IsNotAutoStart IsNotTask1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:1892 -
C:\Users\Admin\AppData\Local\51957e33-a6af-4756-a565-a4a8f1fd3fd0\build2.exe"C:\Users\Admin\AppData\Local\51957e33-a6af-4756-a565-a4a8f1fd3fd0\build2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1936 -
C:\Users\Admin\AppData\Local\51957e33-a6af-4756-a565-a4a8f1fd3fd0\build2.exe"C:\Users\Admin\AppData\Local\51957e33-a6af-4756-a565-a4a8f1fd3fd0\build2.exe"3⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 14284⤵
- Loads dropped DLL
- Program crash
PID:2904
-
-
-
-
C:\Users\Admin\AppData\Local\51957e33-a6af-4756-a565-a4a8f1fd3fd0\build3.exe"C:\Users\Admin\AppData\Local\51957e33-a6af-4756-a565-a4a8f1fd3fd0\build3.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:848 -
C:\Users\Admin\AppData\Local\51957e33-a6af-4756-a565-a4a8f1fd3fd0\build3.exe"C:\Users\Admin\AppData\Local\51957e33-a6af-4756-a565-a4a8f1fd3fd0\build3.exe"3⤵
- Executes dropped EXE
PID:2952
-
-
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
PID:2056
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2956
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"1⤵
- Creates scheduled task(s)
PID:2296
-
C:\Users\Admin\AppData\Local\Temp\C718.exeC:\Users\Admin\AppData\Local\Temp\C718.exe1⤵
- Executes dropped EXE
PID:1228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 962⤵
- Loads dropped DLL
- Program crash
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\CF34.exeC:\Users\Admin\AppData\Local\Temp\CF34.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2060
-
C:\Users\Admin\AppData\Local\Temp\D75F.exeC:\Users\Admin\AppData\Local\Temp\D75F.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\is-G2N20.tmp\D75F.tmp"C:\Users\Admin\AppData\Local\Temp\is-G2N20.tmp\D75F.tmp" /SL5="$10226,7448198,54272,C:\Users\Admin\AppData\Local\Temp\D75F.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:1888 -
C:\Users\Admin\AppData\Local\Py Object Serialization\pyobjserialization.exe"C:\Users\Admin\AppData\Local\Py Object Serialization\pyobjserialization.exe" -i3⤵
- Executes dropped EXE
PID:1768
-
-
C:\Users\Admin\AppData\Local\Py Object Serialization\pyobjserialization.exe"C:\Users\Admin\AppData\Local\Py Object Serialization\pyobjserialization.exe" -s3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C20ABDAD-3732-40E3-91FF-39F36CB0CA23} S-1-5-21-3470981204-343661084-3367201002-1000:GLTGRJAG\Admin:Interactive:[1]1⤵PID:328
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:588 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:900
-
-
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"1⤵
- Creates scheduled task(s)
PID:1632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5e7d6b1784c7850b818ebe65217c63205
SHA189e2ad47d654a462dfd711c088db8531c63704a2
SHA2564818338dbfe98d0bc35faa182de7981f0eac2a08efdb786644bdce1f58378a90
SHA512876fd158e9ee7882463ebe9187f22adbb89899912bf0899a8157e50e8a9734e43003161a61947d00f00b6ca004c7807116d407c51ab1cfc55b45a58fdd364168
-
Filesize
60KB
MD5fc7e312a160b2f70f786995db7a28cf3
SHA10b630ba0c9279227e1bb5e36c09d9291d018e312
SHA256a9ad7898629412d417bf4d24247c554b199f95f31a838105cc58a62526550ce1
SHA5123abbf541dbb3ef9d8078ef0559b974481943dcb021835d47d387b6b95425d84c196390b428919583e20035976672bf478c88b0703d53cc5fc0197ca78ff481cb
-
Filesize
13KB
MD5244610748ef6b002aaae9a48c8ea1d70
SHA1853094e7a5098607d5438deb92c81ebbd2817144
SHA256046c532b3b38f852442cf0d648c04a9ebeaeb9ec2cd9278252ccfc4a64ae4894
SHA51288ef1bc009c1259c0666c31f3f5781e6685e77a510ea7078121b502d5959e25dcc2c9b24f6c1d61afe2b06a0cb4bb9a023e62c3789c27d5c79fc8045008f135f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD59b22839d6ca6b0fbdf09c57430924310
SHA14a71d8b43a9db0e98b58969a7f1a46b64f256981
SHA256ac913f69d321c2121b67abbb108cd821091aaf5f811993eb8e51d705dbcf0038
SHA51290b5507321c0dcb4a84b42180cae70b27d1adba8787ff88ce866b47835458081c11437db81d0b55499b182457aae3816662fe7417f63a5bd3a2dc112c5a974b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528be4c3547cf59febeeb980c53bf24cd
SHA1b925130b3c55f6b43704ee68bd40454544f1c97e
SHA256463246cce9daf6b118d95f6e18cbb11f2bbd67a2baa7c5a5597ee164d4311130
SHA512b6d24bdf9751b31cb01b3bfd94e736b10eec2bf1830b9133d954713b518a46356d131bfb430e14b43b4eecda45b2c2d2ad80e8c7da678003c33702cfd2a07812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5258206c4e8458d06d3921067f013211f
SHA13dc48b719192eb7c098ac1a5b510d82856704c23
SHA2564debd999718755ae5075eaf4d42ef0bf00f1a50f31ca2bbe8bc7654d3051f095
SHA512fca0857370e9a9e9ad6d73e7043646b32c9c547af215c08084bcedd4e4a29bf31462e79db5b6a14589ec394f2f9c37c44b94bb9e55649b702f48204c29a1769c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3f51b295f5db1e2b88dd9494edc58ea
SHA1b4e94ee04fd843f951639f49e800558bd7d0b8bd
SHA25667088065e1250d02cd8f319e4f9648f2d7e2f8db7e8861cbd6ce3718a4326878
SHA512b5d828fa6885cfc8b4aa543b2749a3926ba27fb4983b4fa80bebea0e6b8177adc6c9266cab474bba66008ee948a414928f8bf73bb0ff63af4964724e114109e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD57e90596fd131e3c5d0c8dfa3c84595ac
SHA1e6f259bb5232657b998e3ae4c872640f210c6dfb
SHA2561c9df7d3e48934ccb177d8801147721d778e4a09d9f17398e9b01ee85a1f5ad5
SHA512e73db12deebb12eda44d568d852e44a2bb1d4eceb34fea196c9b640a19f2fbff700db6e124c0152c8312d8e08c26917526dd5450920f6da9184856d1254932a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
MD5d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
140KB
MD5011f688e4a9f475444dc63c30794b558
SHA124ad131d0cd8264453b5e67dd96bfdd89bbda421
SHA256e4b6481cec8e916c2843041e06948d6ee82d3b555799fcd9f99a0e50618e32a5
SHA51265e4139144ccd45707f1e75bdcab21d489b33ff7efd052470742690c33ca5eaa6d6505d3d82f69a1a9cd6886752262106c15397a07b6eb0d884ac15737c72638
-
Filesize
105KB
MD520ac45f5074951766eb03c2a1de61d5f
SHA1883acc77a2aa7440e1ae41e9a9ac6e8234f7bbbc
SHA2569c4e15a118a6b6c7e7412274a16d6a3b8040a0b88ab7f580ce280e2cde873482
SHA512ad704f4de6d2c2bb34c3f14016b4dc2c8a119ad0e52f18add16394b19a81700902949bf572513a07e716840d532955482f848a30108eab67a85c116eaaba9f43
-
Filesize
48KB
MD50a3a324ca23cb6b2cf39a76f23d4f973
SHA18d3f548739a82bd248885fb93a066104ab190774
SHA2566b391c1d4b86cd6ba2a685e057007f5fec443e2a54bf88ec0f53366ed7435ce8
SHA512096ace68e568c9d93acf8148ece5d21cb60bd63db4a51952c8a3c7439970b00f5e14c5ae6c99018aa668cd2aeb90ebf3407117cfbe829b37e2f724e2c5e4179e
-
Filesize
115KB
MD5bb4131ce33111b557bab7e383d2a2d90
SHA1356e4802bd48f6db268214d881cde2e180931fe0
SHA25662e1c2710a646cdea2387f0e7c915ab94f743ad6ae3001c3737cf646af3b96e5
SHA512947f46a043c7d4ae87099aacc9d1fe489c47e4925caa1985170100cc8c112c9c75b57bcbbb411d42835c04f2adc6ac9fa03b1be68af8c43fde51af54ab8ba05c
-
Filesize
43KB
MD5118164fd121d2b10530d9def10c9cd59
SHA1db472650af56ea0b23927c3fad7a048a6ead7736
SHA256da7e3ac3ad91bbe27bbcf97127dbf8c571e40c905ca5270c3c3f60302b9610c6
SHA512b6a299d979ad2e873e75da439ad6c20673f63c9c9f70d8e7fd66cb706d4dec196393dc879a3d13dca35630f5eca8e36b87524a3de6d415d3fa3487494b7a31bf
-
Filesize
33KB
MD5781f741df73b6410864e27b13bbc9b97
SHA115f02086f3c97a032775cec01554de2d15656668
SHA2567edda51b4dcafe34641ff3fc7a9eb6368f202f8763f245201478c9fecc48861d
SHA512ead2a7f1510024191f42cff075960b412b39814ce4b878aac20610a2d830a5d7ea58abcf2bcd2ff895597ee71f9098567c41df67618cbc3f142d91292aef4a24
-
Filesize
31KB
MD5f1af265910e87fae0016936e1f3054fc
SHA14d4edab006b208a6b3b723999cd871cdca147037
SHA25606acac0d3367cd2d61b5ee941dd4966afee44bd82699cf2dc36a587911865ec5
SHA5122330114a48a38b552a132aa4375598785c1263703bce3901b59d6b7c55da44ee3ef718cf7ac84933a9ed70f4f82510531efa35c7d7003d8f5518957c2c59be08
-
Filesize
73KB
MD55a77cc18f7a86a806e377d9ea53010aa
SHA17ebd3abedb1c0aae694f69b4a7637919a68531f8
SHA256d4011220dce73a3d05b79f77339bfc72a2a4b7d4912b78b687006529a0785527
SHA5122c6c9906cd7896d2a8467cda313a4e7b4bcf84d151d58f7f0c292f45e5d7c49620be6b8bde67be55bf1ee56274e666564954f0f2b29e56f87305185623169431
-
Filesize
47KB
MD5a1a45fa1912ca1a9c103f195cf24b969
SHA1bc1985f832dab65b47c73c41a8b802e57e385f79
SHA256168c0a6a51fb20cf0657ccfcf6bc1415c898145585474d3c9e4a08c8a4ed7382
SHA51267ca148c04e694d8404695b4305d050512901dd441425f2c72dea8693c349a8361746452350150afd0848a0980b48f73f2433eb3a2f19e41c8aea32a57005fa2
-
Filesize
13KB
MD52a443880ef576360a054f64e9fd0e9fc
SHA111f79dadecf7585ddaeae04728e1a035c85cfcb7
SHA25606ddb4436ac595512ea19ef2ef1784d9b8940d209f2e455eebb0a753932e6081
SHA51231e837d8a2eaa5527a29c41f44eb58ddaa86b0c836326e2f1643ce3e29ce68697854889ba453bade1300e68492e701ce1ac2ab7bb21741b55e336d5498f4637a
-
Filesize
9KB
MD59b49a77b83292a46d5bb99807deaa94a
SHA155918bb094d7eee117e7140b35a78d4e8f460362
SHA2564b419a006c8af3f7419224bbdd73686ba1de07c3d2e9030bd4050e0a60b252d9
SHA512a34dfda682bbb767846085e6b0423547a860dfd6953104042810766e0c2cda388e911cace075f6dbeb6bbe4723c4fa9b8a2143d53bb8ac1346fb9955af9e4bbf
-
Filesize
59KB
MD5e6ceab83ca43adb7e5b5412ec9cdfeda
SHA14d2f71dbf15225902246843dba635cc0c96f88be
SHA25633de85f32625fdb049a80eb9c0926fc5dfe97b7fab8a70ffbf5d125c278a1e5b
SHA512a4cd0a67481ed9ab92a077185b1a1babf0a99930e19fb2a36463daea82aa4af2c9921c12d87ddde7b221ac798dbd7b0946ac8d343ca50bb22c6dad88d5c7016d
-
Filesize
1KB
MD5bcff859fee1061548babda58754e4707
SHA1931153704fc0316eb8571f9f36b5dbf8e757c1b2
SHA2568618e51e0ced34ab11ddea8b3135dde9ff68651ec77053f03762af52cbc6df32
SHA512eacd4d9c4f2e9a7023c71391486a6a3675098c61707cac86db33a25733ee159404197b7fbea5a2643fbbef0103509b6a6f0e44054cb24de4c7ccadb5d0f1b9a8
-
Filesize
75KB
MD5b4b72815e598474d78c69c6748066627
SHA1f44fffc089998bea468ef4826e01412a49e9d17f
SHA256b36d3e33ffd12013ddd3da091110c60e49f37d0782e295d707f5a10fb5e66a15
SHA512fd99e1297199c51a4de1a4875bd40cdf23ff5058cd5e8fc2ca1bc67e47c09f9c0fc7e8d49069821dc6362b21f54bc1bd1ebe589ca437fe196ca53f7a504a8dd3
-
Filesize
154KB
MD5fe1fbde93181b196aa5d8744368a6bc1
SHA16c267e6f5252a3dc8da156862c0ba74b2807d2e4
SHA256501adf1a563da215f273221c9dcb8613bde9f01fa5725d829f39cbfae74f6898
SHA5126e470c162f4303ae75692b7806719325d386e0224017b52e78adbc5b77f7df92b4cba4313bcd2d2fa39d5f4a513469e0d3d274ba3e527603837a1b25395a8039
-
Filesize
146KB
MD548cbc16caddceebe402bfb99742abbbc
SHA13c111308378a44d67ccab041bca50fcb8b40967e
SHA256edfe29f0c41d1be8da0329bbf940d18e3ac6625b671588d53f0103d7c19357c2
SHA51254a4da5ed95325b43f064030520d6c2450bb9af15860152235f30455e771ff0b769fe69adba15cfb7c889eddd3f5bd09644cd1f38bbfb09593d373a8689d259c
-
C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
Filesize77KB
MD5b2812ba012507673d330f076fe0b72b3
SHA1cd265f6a9a5075e7db04d79dd363cadc52f997ec
SHA25673e94f0538109ba31b8a8bac26ab3686c38dbec8979934110fcd18770ffba443
SHA512f8afbd7bf46d895a8ad21f6668520a68b9ea6c5afdcf10f77e34b6e9dee42c74e81fd966f15d4b74b767b9005355b3508e0496fadfee4fbdf32d3a933e7c8247
-
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
Filesize15KB
MD525c476f812e50c55bbfe754c8570e980
SHA19b6a54fa3bd251856f6f8cfe82ef680b98e14805
SHA25661c5211376f2256e8c35d93d8ebd005a94788a644bc1ce572286918b066af065
SHA5122ca8a3613988b75121786147fc4b543a2f617ce9d864c119ca74d48b094088471d762956085cab52872923e4755b1ad7cd9bd468a5811b7c4f225cba5c43f6c2
-
Filesize
28KB
MD5a23b3116dc5bd0a0ac2f5a073da2626e
SHA12d2d84b20986047d57e8ac433425d50b60bf614c
SHA256b9f68aa07f69755fe5c3b2941dd0d10f8b93ebaaafa60949d3a099c73c88b614
SHA5120f7fb08fffc969871cd59bc53be8b44e3a03f341c19c26bb3125d77f311d9f659a721325c4209103f765e720f1d542de797f407430d178623552e48b16928b53
-
Filesize
47KB
MD519b5ea5f5efa2d9ee97502c31c7525c2
SHA1bf1f5621c019ee4344ad9320adbf706ff83088bc
SHA2562cec30141a7a65cf7ec26f2c94b49f8837483430aeaa58ce10c6991ce709902c
SHA512888e4d996bda943eff773c9c1b5bf80f3b1e77219becfd1d5a604b684e4911130a730439ee8973ab2b10b1a2e296bb2c837efb91ce0de40b64862d578bc08b0d
-
Filesize
38KB
MD51ef59e03127bb861452191898d4b7db5
SHA19813ae96bc04d11738bb72c32ea6e92110070f84
SHA2560efcd4e8035de1313745ba618cb6363c5bcc2736edc84d2fbeb16fe8ebff35fd
SHA5121b40fe8da99108d3b7cdf623f88fe058dfb93a7d275d912472e5a2c207d73ba0ae3bf80f2cf30da1c12b928845c3090757406dd41a133ef78a59a33c78c9dbed
-
Filesize
175KB
MD5d660f7031e9195b5a66dedb0109e3e8e
SHA1d43cd3ce92f4133df59e645880406128a95caa18
SHA2562d2facb81c9868de21be28747a7f43e756f33aa01cb8328114806fb614b4d4f6
SHA512ef1dd78f845ab0476963df94efde6366baca4d9fdf2551084fcd475eb999d51bdc2577b89348ad544f7da5e05dc2e2b4a1585345b987cd6aff48ac25391e5f2a
-
Filesize
50KB
MD546a8a770849722585e845c1e7ba4ab80
SHA199909e174a31bd382a0f1d8f5585923540379ba9
SHA256755e60ee976d4a6861463e93141b7151f40e9cdd5989d1627f92902cc3b89bf9
SHA512eb4292fd889f36a5e5514d5da760c292b241e474a31de1546d51c283665187d72e8de2188baded387a5ed6952461ff253bf0ed95bfca1817291d7348372a35e7
-
Filesize
157KB
MD5bad79ed39fef8865ce1fa04d83752cee
SHA1c07636e62874c99c9377e64326eac7d9d058579a
SHA25612b708b70bab1261a640e46feb1fa885da74e6eb0bd2a966c688a9efe9f02871
SHA512bb05e053c7b24e5520092bcf1cc41f5b3213e36c7cbadbf383b86ea6f22ff4a7fdd2c426c1aeadd1c75b0aa6011f1e351d8f4360bbe61d703ce096792c04c9f4
-
Filesize
96KB
MD5074504a16286b865de52bccc96dc59d3
SHA1b22460ef6045614d42cf4cc00088e841e62839ec
SHA2560a635fdb38545cd8f72820ad6729e38b2fd5e0a06628e34e1506713c6df712a8
SHA5126ce4c0b827450698cc459486df4998060fad5fee9b0d5de0a2d2d78d3deb35874726d6649fe8e466a1327c45708efa49e7d027d95e6699bc6287d499c49e768f
-
Filesize
92KB
MD5b19338f7981a47dce079b1cf73f941e7
SHA148e72ca065ea17c93db87606180e608cf7383f18
SHA256e85e7ec3cde4afbc34ea47553535945adcf56125b3bba0faccba2bd01d2dca4e
SHA512337658edc0f0491c3fa47ec7d05f69c6cb88840ff6ec7305e26be3b4139cd52afd042006959ad1102b5b16d0a59745b20792d9c4f06496914fc00d854305e25f
-
Filesize
126KB
MD57062df5dbb746928c723ffe998508bbc
SHA153494e7dd1acd905573971963b783c6e1e6a635e
SHA256e9721f676ff378ebacfe07d90f9218947d73bcb82ebb02dd2bf2fb49b8c93666
SHA51219f3b189093f50fdd1f7fa7f94361c7cf974876bb612c58947eca989629eee5d1731b3c90a17263b4742fcf4b831ed52b52435c920e89dff2a4d5a879e680f30
-
Filesize
219KB
MD553c2202dde37b24eb9ada364ec3764fb
SHA182c81b6da5b8e2c471ff28245f626d4d8ced99b2
SHA256d1e7522d1d82e0b77fd746b4655f6e69e56011879e4d2694722f2be911dfb1db
SHA512c508339f575d26b3876d635d2daf5f6aca06ea713c9bd1c20d110cda5a981f5b199b414dbc99cfc177ef7fc2b7ee1f2d0a760c5545c1f504b695ed893cd2502f
-
Filesize
59KB
MD5de6f2db7cd8e970bbf932707017bfbd8
SHA1cfd46ebcb8196ea1601bf089fd9e2dd055bff2c6
SHA256f20cd87894990d83d9e96bf819492591b842c261286bfe93bca4fdcb8f5a0259
SHA512c32d02d1d0e82b82ef85f94ec7012eafb020e70437038bf77f6f8ac03acaeeca7526aba5dcc2778b86dfa94f39a1cd89fb5f8e471e5282ff20dc5baf0913ff8b
-
Filesize
11KB
MD5e64ada22b8e29e184fb4a4300f1aa0c8
SHA15248ed922962ae11ce75108a7072eb3e0368abe2
SHA256ce6d45ca09bee12ad81b1adf0aa5aae306af7a3e14c5f73efd19155498931da0
SHA512ca72880253e7d7778660e51a4de9e3e9e9e54c946a6ad592c4dcacabed9a54fe20e8fc54b9083f763ff3bb6a7e29191c05a502d86cf17a533a7fd850d86e1743
-
Filesize
136KB
MD5ec9907edc783fcde68651582b4fb9f26
SHA1896835045c1fe14ce07294d7f7aad01b0d81d9f9
SHA256abee2f0ad77f7b2ac8eecc4df3abadb991bbc1e2defe72053dd39ba8f1ae3e87
SHA512342f17f5a29403b189d40e10eed0837ff51f8d6fd8ebec43ffcc2d148e78636d7b3d0b494660bc11a6123cc91c7bee7bf4aef3d58947d3e171a2844a6530fc83
-
Filesize
55KB
MD55f30f578a08d0f97950be510920906ab
SHA14353cb075205fc434bd7087dcd7dd530b2146309
SHA256472fb5bf76e74ccf16523309b19c758d3fd2abb9ac087f1a378fb04a00870952
SHA51269a4350dc8be43649864e6b1ffeee10ee24567a1ae10dc3a81dd9740563d55bec85abd14d2c03f2e5cfef252292f6e409e86795c770c90529b23aa2fb96c9e3c
-
Filesize
131KB
MD57dc910753e3f0f06a26af5753991b223
SHA1a36899a8df0a2bd33ef30a3b174e1b43dfa72be3
SHA256729415db45b8d244c58e61affd33fe65aa8df71196c9c9a38a23f4ed77792d6e
SHA5124e9275f601b4c27caee86ba614759fb3743f3b0d1752cae18cf5af66b75a0fa7fd30ff12ce3234a3c40706114f517b2106134b635b5d6ecd555112f6c2ec60f0
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
45KB
MD565dcbac431307066bbbd9df6304d7647
SHA1a5a89f2f9d65c608a4e5243247f14e74da973146
SHA256262f1887cbc461776047bfba117f9d2c69688ada5901f77a2a31d57ba4371c6a
SHA51294c2d8c48ca47ca9c13a69a6c50022af1ad0a0aa016507439652be6f40b8c3313b5972d491f4a96b5d50cc4a87ef202167005dda70cf872f7a122f1c0c458fe9
-
Filesize
34KB
MD5b3bc0d300d67937306316a150a7c7f95
SHA1694f7a4aa705201057829eaad0bf77d62d8d8b0c
SHA2562374f351cf6e02e6a8e551f8bf2e045d27532e639d15465c8d588ab8438ee963
SHA5124a8f28059064fb3b0b3c7d0780d933a83edce0468d8b6f9b4286f42d063f073290f8b87f9170f320eeea15de3e5acca91d2c25c4895c0f197aa454e10ace0e49
-
Filesize
18KB
MD528469512e7fdaef111d9eaa7edb8de25
SHA1cd81e2bfc3004d70e203164e09b72104947ca32b
SHA256845ddc571aeda1c64277c467d056e4763b806437929f2ce16b47c9bc373c3b2e
SHA512532cd60d1bc9a91fdf1854f4eee85a9f280c185a275b293bee0e1564c2aae7e8e145e840c7bfee6dfff126e72aced9597cb28a2c55846decdd4e2800aa4f726b
-
Filesize
58KB
MD54ba7460497536d45c0425c3a3cb9b1eb
SHA131a2e2785098b237be7b3564e6405c8677cea438
SHA256782e7c8ab2aa3566f908159752d13d75b02ca7700e88da7e116e0dc71974137d
SHA51254c6f5e3c701b35c0483c9f91d006d1403d14fc1caae6dc16f70bae1550fd1a6493c24ad60661955da8bb360512ac2b89ddfcbf0b111991a326a63d36874a311
-
Filesize
44KB
MD5e0db2135423ed10ba514f47ade173707
SHA105be6addd01ffb80cca47fcda263acf69e7cfec1
SHA2566c920cac6693bcf961acd5ad862f40608e4acd045f1806c639ab5d940b1bff65
SHA512a89aef243a6ff642e94e0f3c93009f9d59cdb43ad92c3ddf6d9cd1059cb67e0409b10d5c8d4e463f3155ed79ab1032b85495820b14948e96574b44e236e51b23
-
Filesize
36KB
MD5a86cfaa52352fcfd81b534464b194889
SHA17865e2d7baff404bfc1652c0dc6ffcd340ed1d18
SHA2562a9864c8dbe4f9b2b1cf8ce223d37e3943547df8fc4479f656abd1cae8874445
SHA512995d2035c33f1ce4539015f60b866221f3b14f13a0d2c54b67db8824273a4bb2ab8a39e67595d1583bec675e507520af6c16294d25ac2fdacc3345c50437d178
-
Filesize
15KB
MD5965a447dd00a5c23811795adb24593f8
SHA103953d5dac10286eb2f430c6f1d3bbc633645b0a
SHA256715b05a5d86252933c81db2e74f56cd07545f919753c396e4780465cbe859463
SHA5123263f23a15e5e9454de1f04452c4c5572bac902d2ceeacdc42f5d8e73e847d3a78c58dcaebd1ddab2aa0afefb8660ee4ce0a3b4d7d3df54f7ded88f5cd7b32be
-
Filesize
53KB
MD5ebf8d5e29b92ebac50896d4d370e5d23
SHA186a1cda52ed66579fb24b26279dddaecb15520a7
SHA256223fd85c3a694cc30bb59e3e92958d788b8480df5050374fa849cf86ebc76cfd
SHA5124ac416438ff5670c902d9b7eff0efa0b8878020997ef73aace5ace9cb5861d8ada7a165405dd20aaaae44e236d625108ef3a6134ab3f6e5413e97732f08e99cd
-
Filesize
56KB
MD5c0eec3e6525099b4344f84103560ad42
SHA13eb7ca040e6f752b6b19ef6d2d7db9d0fe08667d
SHA2566f816ee5fa7849591d617e054a1d783ec7f3f40ef853822170861d083527f9e3
SHA51273519d45bb89882ebf95ae80dc0a60f42b812b1ad7505307e80ad6290c12ff9078a556b2b70aca4f29442c73e463ed374c399e42bb030f99598d1ecd46f482d5
-
Filesize
64KB
MD55d5cb1e33a7309fddd2f64dba27f12fe
SHA1006c4767baa85086fd017ab477545f3af43e61b1
SHA256249e1c5c02769b20e552e9929ffd5ef131d4b8102539f041973f2ef167944235
SHA512fc2789d5a0d1bf8087de6fbce5ce22052a3cf49e4f60dcf0b7aa9bed1f5475a1ae5f4e6629849f2511428566f556710a5a1f144487f8f12127339a16ac32d357
-
Filesize
95KB
MD58dfe6467a954d31b441ebc27fc8f33d8
SHA1640ca789e5d23d9a15a6d185f2a2bb7d2b5b913c
SHA25663ccb2d32314603ead7e350c028a17061468e91317c3f0308ab7e3d9d791b9e6
SHA512a3c1a0eaa21f9d47c7011c537dae70301c5d620baf6024a43419ff3182c5576e0fa1f6e102d3091b57ba7855fb6033cdce856a024cfa9f76ffe31c41eb0184ca
-
Filesize
127KB
MD523043cadfecce19dd2caac9b4e85c6db
SHA1dffb38a668e08d0ddef8a155fae3476995979c62
SHA256c937e31436a18ca4e4ce3f064f80feb610db3e64641dd7da9aa1cbe6fe90c63b
SHA512dec643959edba79a56f3a87a7618cee08095669e738df0bb2c783e48673ff561957ac15d7464d774f39994b5a833526cc2898a020df474dbb2402b64eabd8bfa
-
Filesize
100KB
MD5d82ae930eacdec6eb5f8bb560aceca52
SHA1f7b81a705d18b4f541c61c8ff5c3d8e199ea96e6
SHA256ee4f7c6aa96fb24b2af7cf86a24ba034bafb6ab25db7dde0000a97d2422c49a5
SHA51287d80d90cd6895b5d6600f076ca0531264f74b5466ef2126968ec131d31488491c78d3e304d0ce314db7eee1caafb76505b536b29555bfda9fa01b51c95a8241
-
Filesize
63KB
MD5f298dc25057bee7cd9a2aba54da3190d
SHA14a662618349fd600f4eee2d5aee23b5c56d9bfec
SHA2561ce51ea9798a6bba6bcc377b4440313a56ff4718a7fbb617cd28ffd9513468e0
SHA5126448ec7f6608fb15d20a8a9a5a4b3587dc25d52bc3c4e325007c944c59c5a061460855e151f4f3e3aa74b2668c1f10f0ad81c7f4cb541c013547429746f25d46
-
Filesize
147KB
MD58fcc942f98dba21fb4ed07a008a2fe0d
SHA18b86e54c59aaf8444070fa8619aa028e50ada5cb
SHA256855d8da01cc0800068fe083bca129e65c0ff9e5806a16b72c8f7d9d707b945cf
SHA5120111e0ecfe119ada993befba6fd68b6ea9f046d911c81813aa5d132c5cabbd9b52c23c6acca41df577de34bfff1c8f9fd9629b023083dcf977469997be4799b3
-
Filesize
108KB
MD51f0acb59709946ee15449c37819bf9e2
SHA1684606e3fef81d807edf52a09eda270c9df8fb66
SHA256904934eaed6ec9436b7e4ace8706b45bfed231f0fa1ca201a7fe6ecf0bdc3c78
SHA5121548a2df1185970aea233576c362e0c9b31925786c22faf78f0a1b37ca5d53403f814486d4fe286246022daf99896cad63bc50311f64c26abf65ce28c41deb4d
-
Filesize
109KB
MD5690f28d62ff2608fa08c60834e8b91c3
SHA1786cd46d8407d7b7b7c7549aa07abce7ae27b86b
SHA256f93c0b9622dd6a489e575d5cee8c1c47616c710d43ee2a83d72b27fa54660238
SHA51230dce1ed7f35ae34d3835293abeaa7c9435f7442b1f309cdfe6457adf108971cb30ea153d96557c04ae494efbf7fe7a4bf709d835d8638fb935e2a3cad6327f9
-
Filesize
149KB
MD5a5a7afef74eae9622dc59b97e7cadee8
SHA13342b40b4088a630eb73f6da9970a8873f27c421
SHA2568c901d808f295ff400efc572b55affcd22d51f0da63eb513189a0ae589a44f36
SHA512d33562ab9f553e7a01d219502a92f8ddd6fef8943f437161ec2cbe79ccb9822daa6c4a7b053de4a7dec3495b4bce3f7b38f48ac059b225742480a6b97069d3ff
-
Filesize
187KB
MD5ac650c674bcc13f856356d634c9c5d5e
SHA1dffaf1af21ae846084877b2ed9dcd8c1b50602e9
SHA256ea560b1955c678de725903109ba3384f554f7a0836e3c48d648734d0bfb3d381
SHA512ce802ddc0d09a04c883cf1909752ceb19021f441167f29d78ea518c4fc8d38643d5028bfcd3434e1090daed1c650aa3d838e33f4e826b147bde6b2518c839138
-
Filesize
14KB
MD587f91f5a7f78a43618faa5efead0bbcc
SHA17c1501d149e8059df2a6f5624d41512756ada305
SHA256a9b14a23b7ace640191c6421d6e315fdd888f6ecb3c727c3e852e2f7aaa20504
SHA512fc59fb4026c4885a91d5dbcfefcd201e00a769fb4ca249da4f21b2afbc9c7bb050dba756a4708d9437fc7adc3b488d073a17fe1b5cd199cf14c0a4aa0bf61084
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
83KB
MD528533743d7649da30c44024010914e0b
SHA17646f8732108d2c1f6338eea946319d16887ba31
SHA256a879baf5fe6fd59e910166fe92357a3401820667dcaa2d73a937ee67e7425557
SHA51290b8ce37d8363cd06753c897c1742a37f97b75355a5588c0c080157af193b2d8424103922a3f6f3e1496687fdac1fea1642faab93600dc9d2130a05a9df03ef8
-
Filesize
73KB
MD5bebba8f291b239ccd84baf56f1ec1879
SHA11725d8266e73e426f223395cd4b47c34ac9feaad
SHA256912eb62c7c9b16b055000af5f511e6b3e8cfab6a4717d5c78d5689ac02b59491
SHA5124df461fb5fd2a3868b5320c6d280869976560c2295e2ba2c12f4e33386fb007f0d4ee17bd376e05a8649c675664137fbd1bd0c9999953403f5de66a0ec272d0d
-
Filesize
73KB
MD579afad4a1bd0d48397aeefc49a6b8b07
SHA1ee0ba375540ca704e51a656809177cde8434febe
SHA25650530e9498d6b260e02274f23a9b4bb9e23d15ebc30f0c4da8f600d0e46c6b86
SHA5126e444dd88758383aaab840246662faa930aa3e364b85d6fc26a1ca6b305a587667651b0966d3d56f23e9ff5e04195b87f4ebe235918604aee1f133a96fd2ea1e
-
Filesize
63KB
MD5c71e2cb7abbfded3afb0f4f0e9309671
SHA16b4841887e61ab59bc62d1d0df404d3e5a6fab91
SHA256d8f80cca8ec24125b292eb8f950e2f2ebd6bc1fb1877168d6fbe50f2b54ed2ca
SHA512c97996724a7b9218c976ee2ad957e786b5dc11b99823d87c9d79b21bb50d03c1154f1919a3764ca7d33042ee5365ca9e8352a1d70fad254613c2d64fa2dcebb5
-
Filesize
84KB
MD57359877ecd80c7eceda478ddc786932e
SHA1201d5e41057c6b8f05d97c60ebc81030ad7edea4
SHA2566e5fae76ed26a0d6d8bf41391c18f03b600559a3b89c5c5cb61169ec3a6092ed
SHA5123f2b0b30bd22b3785303cc6b36cfdd6e22acfe94e09b9d6fc6bcfa9e975e0058889491a9e4d8c11cf5dbe0e426f1f4ee501d57a6cafa60443aa3a28d80b85f1b
-
Filesize
37KB
MD526029873d3e63bc0cf278e2feea5bcc9
SHA1d45e8ac1c9e329c1c9f47d35edbf703e7f55a174
SHA256757dac9d263c1419e0ee4b1cc9ba1ad23500e9b266ed9dc9524430caee9c7872
SHA512e14300f6fd5d8b744bc00fbf2a5d568af68e5a9ef70e8d7327f48d9eee0d4cffb4090d1c42b5c04a0f386226654dca21f3f70b3127f24be458479766dc5fbfa2
-
Filesize
79KB
MD5ebf3b2b8529eb0d46a2f2fbf9831b51d
SHA1aa6ef69a59438baea108ec5771e20c7432dac119
SHA256c8a49455433bf9101540f1ab230967b32103af8c93e8982731bbf963820c3381
SHA5120750b115894aa5e4c582963c439ba27ed3e7b9ba6047a3009386c69fb40a36cc8b3e7d01ccb40fa241f531fc8e186b2f5d5367bba10f44c7fefe6d1f1c75de46
-
Filesize
96KB
MD5b0495f72806c5c5931cf97ad33c310a7
SHA13192b3fc122af75ee5a1feb1a0921a6565aeaad6
SHA256dae8d284185e7e860e4b3522748163d83834b1fef055cade3b984a58a00c48f1
SHA5122331640f778b75d33aff7ced18b5cf13e22500c8717dc19047c450e727413d05e556a60e4757b725be75657def342235df9476b98b116a0ac8787d5a427a4057
-
Filesize
106KB
MD57945f280ae1353d9fed93950dca9bc67
SHA1adb7f481a4f20d1e099b0f9e79b0be17ef01cde4
SHA256dfe29085e60d83f81ea366d8725c9ad434986e3b4da8ff43ee1f1bbc0f1f8b37
SHA5124e33f4def0d24f8a258c5fa4d2f88bb42d93310d79f2ca0c4ad8e48b9455bf0fdb13274a4d6c040f46cf169c5538250c9475d47335e7ba062b4aca9365858616
-
Filesize
75KB
MD5bd5bbbbe54db457b512fdcfc2d7ec841
SHA14fc693592faf40018cf0108f0d6f90a1da704b5d
SHA25661df55a0af1d594d60931a691fb6c9fd7d814a77ae6ed508801aabbb2ba771a4
SHA512423a50137b92786ed59eec27d8163ec3de9e34b153f4f16e2b947760d04cf34e5d311b5d6df677c92d57f8e87ec0a41dc2e1dbc529202cb2c611b373c2626a82
-
Filesize
46KB
MD56eeff9501ac74c3da7c0cae7567e23f9
SHA1052cae68cbce273b61d6a00850d516f7340176dc
SHA2569d9d6086545a93b577a9dd9a0405faeb31944ed43775ec71900c4a18c6ac43ae
SHA51222568b121eccb2dd372ad9685dc376ea1e4251f7e29f1969dc2c4a619df6415938ff7a8122f98b2dce32a8d26fffba1f19051404aa139923fd918a205e0599df