Analysis
-
max time kernel
278s -
max time network
294s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe
Resource
win10-20240221-en
General
-
Target
01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe
-
Size
232KB
-
MD5
c8a94b7ff57e67498d621af4bc560022
-
SHA1
ac302a7477cb2f67eee23cc64c69b8bc41b235ef
-
SHA256
01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2
-
SHA512
9444db827fd46a9e8b38f44fc29716f2f03be47c9bd89369b00308f14b5995a6149a1cf2cfbaab157795750794e2b929cf0db87b5eee9f73e6b8bff14e357a5f
-
SSDEEP
3072:avIPm6dnTMRl6U9u/RzKiAHwbjetauENUMVon5GoNtHgfJPssqZvoh:pm6dnoGUSRzSXtau2Kn5HfAfJk
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
socks5systemz
http://aagpebr.ru/search/?q=67e28dd83d5fa62d1358fa4d7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978ff71ea771795af8e05c647db22f31df92d8b38e316a667d307eca743ec4c2b07b52966923a668efa18c5e99d
Signatures
-
Detect ZGRat V1 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1584-534-0x0000000000AB0000-0x0000000004382000-memory.dmp family_zgrat_v1 behavioral1/memory/1584-575-0x000000001EFA0000-0x000000001F0AE000-memory.dmp family_zgrat_v1 behavioral1/memory/1584-600-0x0000000005CF0000-0x0000000005D14000-memory.dmp family_zgrat_v1 -
Glupteba payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/2852-168-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2852-348-0x0000000002B90000-0x000000000347B000-memory.dmp family_glupteba behavioral1/memory/2852-420-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2852-446-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2852-506-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2852-530-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2768-550-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1452-598-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
1CB8.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1CB8.exe -
Modifies boot configuration data using bcdedit 14 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 928 bcdedit.exe 3052 bcdedit.exe 400 bcdedit.exe 2344 bcdedit.exe 2920 bcdedit.exe 956 bcdedit.exe 2152 bcdedit.exe 1876 bcdedit.exe 1088 bcdedit.exe 1824 bcdedit.exe 1860 bcdedit.exe 2300 bcdedit.exe 776 bcdedit.exe 2064 bcdedit.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
csrss.exedescription ioc process File created C:\Windows\system32\drivers\Winmon.sys csrss.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1376 netsh.exe -
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
1CB8.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1CB8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1CB8.exe -
Deletes itself 1 IoCs
Processes:
pid process 1244 -
Executes dropped EXE 26 IoCs
Processes:
D71D.exeF356.exeFECC.exeInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exeEasyAppns.exeapril.exeapril.tmpEasyApp.exeuvc.0.exeflashdecompiler32.exe1CB8.exeuvc.1.exeflashdecompiler32.exe288c47bbc1871b439df19ff4df68f076.exe7718.execsrss.exe81C3.exeinjector.exepatch.exeJJDBGDHIID.exedsefix.exewindefender.exewindefender.exegdjccwvgvjccwvpid process 2584 D71D.exe 2888 F356.exe 572 FECC.exe 1128 InstallSetup_four.exe 2852 288c47bbc1871b439df19ff4df68f076.exe 1628 EasyAppns.exe 2020 april.exe 1708 april.tmp 2684 EasyApp.exe 2876 uvc.0.exe 468 flashdecompiler32.exe 932 1CB8.exe 2328 uvc.1.exe 1976 flashdecompiler32.exe 2768 288c47bbc1871b439df19ff4df68f076.exe 1936 7718.exe 1452 csrss.exe 948 81C3.exe 300 injector.exe 2800 patch.exe 1260 JJDBGDHIID.exe 2188 dsefix.exe 2168 windefender.exe 2516 windefender.exe 1476 gdjccwv 1644 gvjccwv -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
1CB8.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine 1CB8.exe -
Loads dropped DLL 46 IoCs
Processes:
regsvr32.exeF356.exeWerFault.exeapril.exeapril.tmpEasyAppns.exeInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exeuvc.0.execsrss.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exepatch.execmd.exepid process 2428 regsvr32.exe 2888 F356.exe 2888 F356.exe 2888 F356.exe 2888 F356.exe 2888 F356.exe 2244 WerFault.exe 2244 WerFault.exe 2020 april.exe 1708 april.tmp 1708 april.tmp 1708 april.tmp 1628 EasyAppns.exe 1628 EasyAppns.exe 1628 EasyAppns.exe 1628 EasyAppns.exe 1128 InstallSetup_four.exe 1128 InstallSetup_four.exe 1128 InstallSetup_four.exe 1128 InstallSetup_four.exe 2244 WerFault.exe 1708 april.tmp 1128 InstallSetup_four.exe 1128 InstallSetup_four.exe 1128 InstallSetup_four.exe 1128 InstallSetup_four.exe 1244 2768 288c47bbc1871b439df19ff4df68f076.exe 2768 288c47bbc1871b439df19ff4df68f076.exe 2876 uvc.0.exe 2876 uvc.0.exe 1452 csrss.exe 1584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 844 2800 patch.exe 2800 patch.exe 2800 patch.exe 2800 patch.exe 2800 patch.exe 2772 cmd.exe 2800 patch.exe 2800 patch.exe 2800 patch.exe 1452 csrss.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 152.89.198.214 -
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.exeJJDBGDHIID.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JJDBGDHIID.exe" JJDBGDHIID.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMon driver. 1 IoCs
Roottkits write to WinMon to hide PIDs from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMon csrss.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
81C3.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 81C3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
1CB8.exepid process 932 1CB8.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7718.exedescription pid process target process PID 1936 set thread context of 828 1936 7718.exe BitLockerToGo.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe -
Drops file in Windows directory 6 IoCs
Processes:
csrss.exe1CB8.exe288c47bbc1871b439df19ff4df68f076.exemakecab.exedescription ioc process File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\explorgu.job 1CB8.exe File opened for modification C:\Windows\rss 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\rss\csrss.exe 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\Logs\CBS\CbsPersist_20240321221828.cab makecab.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1096 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2244 572 WerFault.exe FECC.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exeD71D.exeuvc.1.exegvjccwvdescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D71D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D71D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uvc.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gvjccwv Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gvjccwv Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gvjccwv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D71D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uvc.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uvc.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
uvc.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 uvc.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString uvc.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 940 schtasks.exe 1416 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
windefender.exe288c47bbc1871b439df19ff4df68f076.exenetsh.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-232 = "Hawaiian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-551 = "North Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-101 = "Provides DHCP based enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-472 = "Ekaterinburg Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-582 = "North Asia East Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-162 = "Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-22 = "Cape Verde Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-103 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-351 = "FLE Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-3 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-721 = "Central Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-331 = "E. Europe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-51 = "Greenland Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-222 = "Alaskan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-41 = "E. South America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-2 = "Provides IPsec based enforcement for Network Access Protection" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-522 = "N. Central Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-631 = "Tokyo Daylight Time" windefender.exe -
Processes:
csrss.exepatch.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 0f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a3030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a42000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 040000000100000010000000e4a68ac854ac5242460afd72481b2a440f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a3030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a41400000001000000140000004e2254201895e6e36ee60ffafab912ed06178f392000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exepid process 2848 01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe 2848 01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 472 -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exeD71D.exegvjccwvpid process 2848 01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe 2584 D71D.exe 1644 gvjccwv -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.execsrss.exeJJDBGDHIID.exesc.exedescription pid process Token: SeShutdownPrivilege 1244 Token: SeShutdownPrivilege 1244 Token: SeShutdownPrivilege 1244 Token: SeShutdownPrivilege 1244 Token: SeDebugPrivilege 2852 288c47bbc1871b439df19ff4df68f076.exe Token: SeImpersonatePrivilege 2852 288c47bbc1871b439df19ff4df68f076.exe Token: SeShutdownPrivilege 1244 Token: SeShutdownPrivilege 1244 Token: SeDebugPrivilege 1584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeSystemEnvironmentPrivilege 1452 csrss.exe Token: SeShutdownPrivilege 1244 Token: SeDebugPrivilege 1260 JJDBGDHIID.exe Token: SeSecurityPrivilege 1096 sc.exe Token: SeSecurityPrivilege 1096 sc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
1CB8.exeuvc.1.exepid process 932 1CB8.exe 2328 uvc.1.exe 2328 uvc.1.exe 2328 uvc.1.exe 2328 uvc.1.exe 2328 uvc.1.exe 2328 uvc.1.exe 2328 uvc.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
uvc.1.exepid process 2328 uvc.1.exe 2328 uvc.1.exe 2328 uvc.1.exe 2328 uvc.1.exe 2328 uvc.1.exe 2328 uvc.1.exe 2328 uvc.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exeF356.exeFECC.exeapril.exeEasyAppns.exeInstallSetup_four.exedescription pid process target process PID 1244 wrote to memory of 2584 1244 D71D.exe PID 1244 wrote to memory of 2584 1244 D71D.exe PID 1244 wrote to memory of 2584 1244 D71D.exe PID 1244 wrote to memory of 2584 1244 D71D.exe PID 1244 wrote to memory of 2492 1244 regsvr32.exe PID 1244 wrote to memory of 2492 1244 regsvr32.exe PID 1244 wrote to memory of 2492 1244 regsvr32.exe PID 1244 wrote to memory of 2492 1244 regsvr32.exe PID 1244 wrote to memory of 2492 1244 regsvr32.exe PID 2492 wrote to memory of 2428 2492 regsvr32.exe regsvr32.exe PID 2492 wrote to memory of 2428 2492 regsvr32.exe regsvr32.exe PID 2492 wrote to memory of 2428 2492 regsvr32.exe regsvr32.exe PID 2492 wrote to memory of 2428 2492 regsvr32.exe regsvr32.exe PID 2492 wrote to memory of 2428 2492 regsvr32.exe regsvr32.exe PID 2492 wrote to memory of 2428 2492 regsvr32.exe regsvr32.exe PID 2492 wrote to memory of 2428 2492 regsvr32.exe regsvr32.exe PID 1244 wrote to memory of 2888 1244 F356.exe PID 1244 wrote to memory of 2888 1244 F356.exe PID 1244 wrote to memory of 2888 1244 F356.exe PID 1244 wrote to memory of 2888 1244 F356.exe PID 1244 wrote to memory of 572 1244 FECC.exe PID 1244 wrote to memory of 572 1244 FECC.exe PID 1244 wrote to memory of 572 1244 FECC.exe PID 1244 wrote to memory of 572 1244 FECC.exe PID 2888 wrote to memory of 1128 2888 F356.exe InstallSetup_four.exe PID 2888 wrote to memory of 1128 2888 F356.exe InstallSetup_four.exe PID 2888 wrote to memory of 1128 2888 F356.exe InstallSetup_four.exe PID 2888 wrote to memory of 1128 2888 F356.exe InstallSetup_four.exe PID 2888 wrote to memory of 1128 2888 F356.exe InstallSetup_four.exe PID 2888 wrote to memory of 1128 2888 F356.exe InstallSetup_four.exe PID 2888 wrote to memory of 1128 2888 F356.exe InstallSetup_four.exe PID 2888 wrote to memory of 2852 2888 F356.exe 288c47bbc1871b439df19ff4df68f076.exe PID 2888 wrote to memory of 2852 2888 F356.exe 288c47bbc1871b439df19ff4df68f076.exe PID 2888 wrote to memory of 2852 2888 F356.exe 288c47bbc1871b439df19ff4df68f076.exe PID 2888 wrote to memory of 2852 2888 F356.exe 288c47bbc1871b439df19ff4df68f076.exe PID 2888 wrote to memory of 1628 2888 F356.exe EasyAppns.exe PID 2888 wrote to memory of 1628 2888 F356.exe EasyAppns.exe PID 2888 wrote to memory of 1628 2888 F356.exe EasyAppns.exe PID 2888 wrote to memory of 1628 2888 F356.exe EasyAppns.exe PID 572 wrote to memory of 2244 572 FECC.exe WerFault.exe PID 572 wrote to memory of 2244 572 FECC.exe WerFault.exe PID 572 wrote to memory of 2244 572 FECC.exe WerFault.exe PID 572 wrote to memory of 2244 572 FECC.exe WerFault.exe PID 2888 wrote to memory of 2020 2888 F356.exe april.exe PID 2888 wrote to memory of 2020 2888 F356.exe april.exe PID 2888 wrote to memory of 2020 2888 F356.exe april.exe PID 2888 wrote to memory of 2020 2888 F356.exe april.exe PID 2888 wrote to memory of 2020 2888 F356.exe april.exe PID 2888 wrote to memory of 2020 2888 F356.exe april.exe PID 2888 wrote to memory of 2020 2888 F356.exe april.exe PID 2020 wrote to memory of 1708 2020 april.exe april.tmp PID 2020 wrote to memory of 1708 2020 april.exe april.tmp PID 2020 wrote to memory of 1708 2020 april.exe april.tmp PID 2020 wrote to memory of 1708 2020 april.exe april.tmp PID 2020 wrote to memory of 1708 2020 april.exe april.tmp PID 2020 wrote to memory of 1708 2020 april.exe april.tmp PID 2020 wrote to memory of 1708 2020 april.exe april.tmp PID 1628 wrote to memory of 2684 1628 EasyAppns.exe EasyApp.exe PID 1628 wrote to memory of 2684 1628 EasyAppns.exe EasyApp.exe PID 1628 wrote to memory of 2684 1628 EasyAppns.exe EasyApp.exe PID 1628 wrote to memory of 2684 1628 EasyAppns.exe EasyApp.exe PID 1128 wrote to memory of 2876 1128 InstallSetup_four.exe uvc.0.exe PID 1128 wrote to memory of 2876 1128 InstallSetup_four.exe uvc.0.exe PID 1128 wrote to memory of 2876 1128 InstallSetup_four.exe uvc.0.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe"C:\Users\Admin\AppData\Local\Temp\01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2848
-
C:\Users\Admin\AppData\Local\Temp\D71D.exeC:\Users\Admin\AppData\Local\Temp\D71D.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2584
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\DD36.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\DD36.dll2⤵
- Loads dropped DLL
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\F356.exeC:\Users\Admin\AppData\Local\Temp\F356.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\uvc.0.exe"C:\Users\Admin\AppData\Local\Temp\uvc.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:2876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\JJDBGDHIID.exe"4⤵
- Loads dropped DLL
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\JJDBGDHIID.exe"C:\Users\Admin\AppData\Local\Temp\JJDBGDHIID.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1260 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\JJDBGDHIID.exe6⤵PID:1632
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:1116
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\uvc.1.exe"C:\Users\Admin\AppData\Local\Temp\uvc.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD14⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2768 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:1948
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:1376
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Manipulates WinMon driver.
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1452 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:940
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:980
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:300
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:2800 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER6⤵
- Modifies boot configuration data using bcdedit
PID:928
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:6⤵
- Modifies boot configuration data using bcdedit
PID:3052
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:6⤵
- Modifies boot configuration data using bcdedit
PID:400
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows6⤵
- Modifies boot configuration data using bcdedit
PID:2344
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe6⤵
- Modifies boot configuration data using bcdedit
PID:2920
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe6⤵
- Modifies boot configuration data using bcdedit
PID:956
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 06⤵
- Modifies boot configuration data using bcdedit
PID:2152
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn6⤵
- Modifies boot configuration data using bcdedit
PID:1876
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 16⤵
- Modifies boot configuration data using bcdedit
PID:1088
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}6⤵
- Modifies boot configuration data using bcdedit
PID:1824
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast6⤵
- Modifies boot configuration data using bcdedit
PID:1860
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 06⤵
- Modifies boot configuration data using bcdedit
PID:2300
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}6⤵
- Modifies boot configuration data using bcdedit
PID:776
-
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v5⤵
- Modifies boot configuration data using bcdedit
PID:2064
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe5⤵
- Executes dropped EXE
PID:2188
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:1416
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:2772
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Public\Music\EasyApp.exe"C:\Users\Public\Music\EasyApp.exe"3⤵
- Executes dropped EXE
PID:2684
-
-
-
C:\Users\Admin\AppData\Local\Temp\april.exe"C:\Users\Admin\AppData\Local\Temp\april.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\is-N4COH.tmp\april.tmp"C:\Users\Admin\AppData\Local\Temp\is-N4COH.tmp\april.tmp" /SL5="$2019E,1485356,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1708 -
C:\Users\Admin\AppData\Local\Senior Flash Decompiler\flashdecompiler32.exe"C:\Users\Admin\AppData\Local\Senior Flash Decompiler\flashdecompiler32.exe" -i4⤵
- Executes dropped EXE
PID:468
-
-
C:\Users\Admin\AppData\Local\Senior Flash Decompiler\flashdecompiler32.exe"C:\Users\Admin\AppData\Local\Senior Flash Decompiler\flashdecompiler32.exe" -s4⤵
- Executes dropped EXE
PID:1976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\FECC.exeC:\Users\Admin\AppData\Local\Temp\FECC.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 1242⤵
- Loads dropped DLL
- Program crash
PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\1CB8.exeC:\Users\Admin\AppData\Local\Temp\1CB8.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:932
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240321221828.log C:\Windows\Logs\CBS\CbsPersist_20240321221828.cab1⤵
- Drops file in Windows directory
PID:1712
-
C:\Users\Admin\AppData\Local\Temp\7718.exeC:\Users\Admin\AppData\Local\Temp\7718.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1936 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵PID:828
-
-
C:\Users\Admin\AppData\Local\Temp\81C3.exeC:\Users\Admin\AppData\Local\Temp\81C3.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:948
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2516
-
C:\Windows\system32\taskeng.exetaskeng.exe {B4AA46DB-D3D4-4022-852C-0EB0FD6DD91B} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵PID:2664
-
C:\Users\Admin\AppData\Roaming\gdjccwvC:\Users\Admin\AppData\Roaming\gdjccwv2⤵
- Executes dropped EXE
PID:1476
-
-
C:\Users\Admin\AppData\Roaming\gvjccwvC:\Users\Admin\AppData\Roaming\gvjccwv2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1644
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\Local\Microsoft\ApplicationInsights\81950f7e7cbd108086cf2da3a401afdfffc60d9b485aac5dd52f7a137c00f950\31c4c56cdc9149a68a452fa094df3484.tmp
Filesize1KB
MD50cf78d17c1e6253ebeddc05846bc60bf
SHA1e9399be4a28aedc8694131e8e64056a87bbd2e3d
SHA25679266eaec7fc649153d41bb99303bbe2aee15d992bb3d913d3593e1ea8dce7a4
SHA512caa7231d4950428ffde7dd4d54c5a0f310c4c6e222cf9095b78968e3cd4f00b8310c2f2cb5481b2af1e9cf49f57eaae8179aa0a3c4b85d9fa5d1d2fdfb8ac877
-
Filesize
640KB
MD5bed2ac3c587de1316cdd898fc024d7ad
SHA1be187bfd3f1afba1f359feb07b81281e7c95e494
SHA2566c4243388a19f3c22cee75ce44790c900ec78c3d33a263158dbefbc4b30482f6
SHA5124bf18cfaa7e50e13ed42f8a796c80aa31fb60182a96fe10213a4eaca04c1d4065d49749d33d614057e46437bc78104357fae10c4939cd0dd461b76bf42b11df8
-
Filesize
392KB
MD5c38feec08c882da8f4f5194476a6f156
SHA120bde398896614a57c0eee50e06d94882bfa8a24
SHA2563326325bdf2eceeca655506e82774ebfe6ab4dd9b2f2c35728053b1685410b49
SHA5121df3f0dd80b50d9eaa4c74e5e473a53aead349377e638dd24037f9525002070f876433d48f14b21cd1da85e6a4c9eebde9dc1a81b007f59ac5daf4d43f437cba
-
Filesize
235KB
MD536f4e358c0a4c082c09025ddbecffb47
SHA1a73b3aee5bfa110fcea17346b4a51fa960a4bcdf
SHA2568cb9e3ec91c2a4e7e3fe967e2c7a9deb7d063fc6e4c7ec1c7069f3221414121d
SHA512d084a4d305377fbc591b526d0b57dc011b9f3668fb78696e9c2ab5e9e8bea83c4ec156ed77ed4be09cc96fd17305fed0303826a9d8db962e258e4cb6d1e87a17
-
Filesize
356KB
MD553aaa813ff31e51f5e7604b64bda0774
SHA1983343122e77ec6b7a2cb5fab0247b77bfe9aafd
SHA256a8932392ba2e3e90dd722646b89cd83f3724c650e213f138293623201f1fd296
SHA512d0ac06bd6a12ba981816a368c24d20a10867e2ee192c1be65a4fabbe741431fe06242d7af36db8bdcb3d0238d0acd0a9b71c994bbaffecd8d81206c5c7c01d16
-
Filesize
480KB
MD5bb524f2994f2d3499d5a84a116abf0b1
SHA16749d5dc60cc5fdf86ca6078240fe46894e66c03
SHA256ee3897176c08a7cdcc350c875ce0e75884096588d2a69b54b982cac6957bd63e
SHA5129a5b0524aedb86b59c46a2137ab9eea0e72f1d181483778cb7f404712f57374b791ef8b099562939df032ed959bee970cd9c0d021c93e0605e849344cc1bb25a
-
Filesize
185KB
MD5985122c99bb23bcfa127f641ab53c717
SHA1b1cbd3a4fd76ded83f673c4135371533aa9a689a
SHA2560d52350c3263751008a1f72605b6a90cd4067d93b9ed205c278a944450e39a03
SHA5122a3125b25b520d504fa174b697bd232d0b99afeb71e8c2e9a119da5474f9484de6b1b4280db51645de3979227aab30329d44c1c8ccf44e14e52a2d07f0fe4f15
-
Filesize
267KB
MD5ce49214ea9732f5cc467f07b4c528e6f
SHA15252476231bf805f4f5694727d1397c7e105ce19
SHA256865301d098ac37afe2be47413c8c0b90f0b2cb0d96bf7a3e0ef46bda4a8526b0
SHA512a3f2bca6ddb6f8ed11ff2e65416708567bd73f9e31138a82d82a85502069e376a7e7c35cd58c2b1379e80ace5a8ab5e0d7bab09d070689bb38dde63b7f733a0b
-
Filesize
64KB
MD5594db5bc89e79bfdaaa77c915c8c37f4
SHA11c3f14ec1a78e46db1d9567fbe1d7174f7c59593
SHA256eb1c1a5ea9c7616bd1558843061bdecb1f28f8a5bb087adc0fef410171ca891e
SHA51268b0b07ee49c2c2548ae7c12e0f8e0e934e4c3ea95693c40710a5a4205ebb1e4b15fa3c1c60d484fce8170f5212ab9797b1455e14ba54af6aced00d894fbc35f
-
Filesize
768KB
MD598b5bbe42333abc95c96e4b7d9f6dd7d
SHA1fc6becc0ae97c11d59cf3d79fe46c851f29223b8
SHA25648333cb845dd7287d32c2a4c3e87d521c9db3b2bff2e5057c79eab73138da8ae
SHA5124a525aeec25e48b8ea35c1d0c7f50893ec0da354b87666c314b5c6d3607d454b65c8002952b2e4ea2073302f306d14b8653cb6537b34328b62f768ffd81d59a6
-
Filesize
783KB
MD55bbe3c79537256aaf821d94d9d823619
SHA12f23508c27e3017e74e89a12564342e62d503e7a
SHA2564c04c47056ccfb1355d6cf2fd74756c21fa0a8c9ad76096bef199e5e737a3d60
SHA512f6858f12e168e87292c9befeb72f5ab2b18dbb065d47d150febc1d6111c6a9c4b0d677f546f8a4c4594a372a26ba440b3b23afaa0aa4dad7fa5082bb588482e4
-
Filesize
1.0MB
MD5e87da61ce4dc64e223d927b17c790c03
SHA1795c87004c97af5dcaaafd504b542f1ca7ff3290
SHA2566dd48cff2829156e23f3c8bd10fb3ca07efc89afe660ecb9c41264c82a151917
SHA512647100678bdf8200cce1e90632045da39f5972d9bd6cd9d45a3b10c4560f52554ffc0daf7dee36bdea2efe55d75bbcb11f8f0018f576c731f5ce7826a6f40dd7
-
Filesize
1.4MB
MD54b6cb26074b45180861a2a68a4d1efb4
SHA14817c8e92c9bb42d24181466631c32c08c3e0a68
SHA256d2a572fc965a625ae9dd81683d6f513052ecb075e7b1cf2a7d7223aee2cc4080
SHA5129592400b8ddc94769c5ec72699af2138fbf03674d6ac91445a1b1e1586fddbb1097f0bb3bdee4592dc165d84b7b03fc7de5a86a8b9d2bb07e56de6dbd8e137ad
-
Filesize
1.1MB
MD51ca7f156d5dde113a8b946912d3aecd2
SHA12a611d1f59912d632efa229fb4c4f280e21eba30
SHA256db6abbaad2a102af978b72682bb26329cd2c2cdbcdb9b45f084ebea3bb810ee3
SHA51266ce2fbede691a62d701e8b0fab562fd11de41f7961b25cf08c844a079174b8087df7c2c0e8353c4f822e9cd0aadd5951b8c4448204f8287b3ec0554d07a2f4f
-
Filesize
1.0MB
MD597b0c5fc977a32c1ec11348c49274034
SHA1c7e770b15b1be4de99f5c8410e1b28c02a5780ec
SHA256c0778acbfb9fac5afeb24e62b09bace3b5947bf23095ca9dfd685e0940e7ab7c
SHA5122d51b91493bf577ab7948491915d5ae244aafce0f272a6c0f330858af6dc636f74b7607be5685b71d6b6803621825811cde1868dee0d90265d704c857d9bcdd5
-
Filesize
1.1MB
MD5679e0c9d77c16f8529e6a08486c3a9c1
SHA18e74ee4ac19b5653981a1d8378aeda9e6fc1b009
SHA256585e21bcd0f3c05c51f4aa74f554e0a648370facb8b90134680c2e49b5fc272e
SHA51254195de01cdbf53812f172931d66ff8ee510f78ac972737c71a57fbae1a3b8b7a295347bba81ff38fa0ab934eb4cb60c90e267acdd512ec1b9e90831db454acc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
232KB
MD5c8eac1d34e880b19859663677cf6f469
SHA14a20b4a61b2172f675e5047b2ce82cc1cc9e7150
SHA25647a23c0c61f2de27199085bde6f0d2f9b891e890d0e0ca9f7b37505ae7a0d69a
SHA512bb42f71f910dab8dfe9f5c769a078bc48bc4d93fb301ee820bdbe37dea1916ac7828671a8f5b356697f154a6e6174da9fdc8c248d1149088e2763a1ff3d7acd2
-
Filesize
2.2MB
MD5e69125300a060d1eb870d352de33e4c3
SHA160f2c2e6f2a4289a05b5c6212cdaf0d02dad82ea
SHA256009de0571eb77c7ed594b9e5cda731e2953fd2198e00b25a0e2c4c4ef7414355
SHA512257d3b61b2c85c1e71d2a80a5fbf44436e9734785fe6b0a643c1939dd01c1d8b98f1c454695296f7137ff035ec6c0118f053e4833e0be91618f2a9066a8cace9
-
Filesize
737KB
MD5cb556f0a94847af1f3aa95a13b41ed74
SHA1ff16586a39003b7153188f9a6b1e3e9005961c5c
SHA2561f96b0bcd307a1ab3b11a06acb6ff4ac34f7c01c5505e95c5cf38b1bfe3df56a
SHA512cc247108b538dabf2b8283507b1200521146e238c8fe6ad6f87021609119fe8269c59a4c89a4ad4b8868a0ad0dc0a345a3632f4c6b79f1c821765236a3100026
-
Filesize
453KB
MD5e9c01cbd63a022db9eb6aede54681348
SHA12c4c7c46a7d32661d707d909a7a43edaa485ed1e
SHA256930e2439945866e2e719497213e3f70cfbeaf546a1fa1b2cdcd20d9b9efe6dcb
SHA512b91e92b9ff81d5c7e3f015dea6d6a261e346ddaf78c1170069c15d2c0021136b9bb007bd59253727b6fcbafb2792d0bd833ffd03e9a893cbc520bd0f62f5c31f
-
Filesize
1.8MB
MD572b2bacab8c548fa3dbd207931683348
SHA14350e4639e680f2877ec25b07c033f2a1231c4f4
SHA256071159f707d20302bffd8093f7a711316c4dea188745697619bcc2a28cdaf691
SHA512a290677666860dea410bb307e5fa1bbca662a5bdd57d313d79b353f3fd7243f33b00eed893a678194905a995a3c9e3d8852ab13825eea57ed858d71cbff846d8
-
Filesize
1.5MB
MD574ee828e3cbf308bfd17a3e92dad6f63
SHA1fc1538c6ea5f1c229f38eabcc4b6c76461b76d70
SHA256195d9cfb0b913370cbbbec3642e9efb684135f0defa105158048295b26857341
SHA51214b44c630770fd30b062911ded590c9dc677cdc183b364cc5c244ff8f3c3652d852d64c0a65a94ddd635a569a07b750b5744ef24feed7997e3a1c294958f1589
-
Filesize
2.0MB
MD515c34cf179547e0705407cd056bbc645
SHA1c4a355f835be7843fa9c39e43f6f28e172375506
SHA2569793e557c31ebf652ab604f272ab82cedbc32f4f0e06a86c3c76790a6042e5d4
SHA5122c80a022b71d13b11728b9daac5e7932c7e76e43ddf9cee4f8a77ec4746274f20cd75e4d5509c25261e87433c5a278adef15669c0314131ef8bd6d756485e527
-
C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
Filesize8.3MB
MD5fd2727132edd0b59fa33733daa11d9ef
SHA163e36198d90c4c2b9b09dd6786b82aba5f03d29a
SHA2563a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e
SHA5123e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e
-
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
Filesize492KB
MD5fafbf2197151d5ce947872a4b0bcbe16
SHA1a86eaa2dd9fc6d36fcfb41df7ead8d1166aea020
SHA256feb122b7916a1e62a7a6ae8d25ea48a2efc86f6e6384f5526e18ffbfc5f5ff71
SHA512acbd49a111704d001a4ae44d1a071d566452f92311c5c0099d57548eddc9b3393224792c602022df5c3dd19b0a1fb4eff965bf038c8783ae109336699f9d13f6
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
110KB
MD55e87f473d674b81767f04f97f39767c3
SHA1cc01dc73dcbd11d4429cf1fafdae0d4c06fd5f88
SHA256be975c25e61fc5ddc1124e2b5290ad3ebcc745a8ebfa0ba8ba4eddfbaa46a073
SHA5126070712a967bd3b8692f4435fcfcc32bc614bf933bf4bf71c0fa64ce33f4e112dec31faac0446bde61efeda57b8ee10e6fbe4fc7cc6344d5b86cc0d5e3e0a5d2
-
Filesize
420KB
MD554a916cdbb4c1488a505ffaf915dfee4
SHA10881638415db0437efd08b1d9d11c60bb374d6ea
SHA2562281e274757b5a6ee22e0c5cc45c2f9c7fe007295b970b6e3002d0d997cb51f4
SHA512a4d4149d1cac4f1dad3ff2af523e2e709897cf9c36c7824fdeaa48baade51d4cccd448b9aef7a9745f29bd3fc317158899b64ebe57b0abc778911bc3201f6a39
-
Filesize
2KB
MD58154b94d80032158d4afb27c6e851d91
SHA163f7b642a237c13902fc05c6e1b7dc40dc476a81
SHA256e7354296baeb6314676d9a66f66085848853eb539edb9f66bbb9eefa2f2c38cb
SHA5127759af96103953a037a6428a22a0daa99b8410b86b2e18f9758db1bccf91226b5ed2af6b197e78259e72e18f96a32699be2e7834c4f7fb2fec345b7fb6b93365
-
Filesize
3KB
MD5108a4b21471b36f42e2e4c49a7f9e51b
SHA15e1cca403520961d87ebdf8f90f29a002f649caf
SHA256fa4f0ec67991fc521d082b878c2deb75e4eca041783f42bcc0c2baca4aaaae9d
SHA5120c743a1f1a468ff275599be5cb3de8666f668641e195579cfaf970dd03fefd9f3d119a19b93ab83ddb92d72370ef1adce9c67a4afc252b7037231f3a54ea71e9
-
Filesize
236KB
MD5c4453f6d258b1e962e5153642b649b71
SHA1043460f5b7f2adf11b1f54f063eb85eaa9390014
SHA2567aae7cba17fac01c2faa13c3ef22672c9e12907281a842f1623099d7f26b0acc
SHA51203f0721e09baf5ede0fa8ba1c2a29b31ae4e03ecbfd6b3cb24b505e4b55805d8062923c42f2e26a7518610b6292e1157755c088a9bea73aec8ed9a6f3aae784c
-
Filesize
358KB
MD567704491a75f6160344960afd410a3ac
SHA1d290e5be71b4fd148f4d9aaedbcec362018f3ccd
SHA256245b031c57b79892d9bc2da724a0374e1b6e0dbd0eaabda3e5f3ef3468fef0b7
SHA5128eb3138e875e1534fb902efa2c7b03d4f7f3966c0ff55b20b4e61cab3bbe152deed98c5e6a9631e4a4228e84b78e7a8b7f6a087cbb40b9f8aa088aed4bb00dd3
-
Filesize
591KB
MD5e2f68dc7fbd6e0bf031ca3809a739346
SHA19c35494898e65c8a62887f28e04c0359ab6f63f5
SHA256b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4
SHA51226256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579
-
Filesize
261KB
MD5606625739201aa74813d211613b2aa82
SHA14409efa953358e31d940d698470bd0e2d952e8a7
SHA256848e37628e8301c0845cab2eab491e49995db81fec86dec3841af2fc6ee584e2
SHA512d6c1dff70bec93e54a1fa4dc420a2e1ca78955d9b5e1f25324732cb55dbe79642a949d5ffe7218d3b9e6534287f9924286d0eaa765cfd73b5f52f84924ef99f1
-
Filesize
9KB
MD568eb9f91d3ff132f622a21ca4aea1da7
SHA1c914a6e8499231cca09722bec8c9ca978d84a63f
SHA25677d1ed33853002d8343195e87315fe42290590d9d1455fda52cc37150c1fccb6
SHA512ba9b3c496f0f95c1d17e3773201cc9a87467533f184edf153f27cf281f531ab520bece7bbf066ace6aca08a95e6b2ba03b4615c57a8fe0ce4b446984d38a9172
-
Filesize
472KB
MD567eb80acaa4ff1a9cb5b013441dce67d
SHA1cc7371145819a9737ea37f4a28513476af41a940
SHA25682e888927dce784e4aeefa413832a0d72731415880fd9375685eb67ad9fb6c69
SHA5120de389d12cdfdbbe8c268a5b74b8d73c7d68ebcbefa9b7c4da6a5e413d9cc89a6ac700fe137500d0fcd7b6113e1ef17334fadedf10d9fe76b6fd02952873d909
-
Filesize
252KB
MD5d6662c093103b2f7f0812177926b1e25
SHA16ffc353bcf091404e70a8632139637ea972cfc84
SHA25655beec82401694da04be851f29b10cd6a4a188d02d9b0fb7be96d56d7e764c5b
SHA512b30984e700bdfab405372e20fa812a49626c9e830bec4923e5011b99cbb36100e50aa15f7d9d37069f7e5c1eb790291dfbe02d061f6b280a161e847603681cfb
-
Filesize
188KB
MD5bd9b7da04f62c51863c1d70ddcbf974a
SHA19e3795d437a9ae985c066a1b540c3f9c1ae41cc3
SHA25661d47ff9528d22291b2d2d607562662f503f0899f5b4b5ee74932f00e648a2cf
SHA5128f225e0b2e9ffb62e9c129a664c3d799f82d9723970578bd67556c9d26ed9a426fa581d89a580c81f6a2ec148bc24c48b3289aa50accf8471053d3be33ad0aa9
-
Filesize
2.2MB
MD5d74aa77e65c91f7dd1f941f85599dd34
SHA12cb589a1e5ca9cf1cba1f4d0b95b4b229d1396a4
SHA25670c359979fd7ffdd110e75c35b295095134c6b28e3186778c05cf7bcb43ef9ea
SHA5129843048404a4c42e9a60a4089b4fc5e39bba2c7343d14f8c22976e17bfdb9f160e8de73dc587330ae1790470f92313df4965f825c36ef9a01c76e675540211d9
-
Filesize
1024KB
MD52236f7892c35bbaf28231011d68abf6a
SHA138f7f9d30ef96d9891c7ff0eee45b81f43ee3482
SHA256f4f9559a21a525303dc04e3807b305cf2bbf69cc636a89440ed6b4d85d1411eb
SHA51290bedb5cb7e94cf53f8635ba7a8bb05f3f3d76191a94205a8e567612e2b69712602af593ae22f67e7248fbf6e8dabe8587584ce39922edfd36fcac359c28153d
-
Filesize
31KB
MD5dac5cfbf7582d1541b670985bdc3c7a7
SHA1f0030e7066a837eba2efdf14e2700d4174a00ac7
SHA25608de03bf80db1ccd5a4735745199f3b188385b7a501e5ac9f66d9c23639b101e
SHA512b806274aeaf9a23492d9e9143fdaa65e672b28dbba66f211fb513cad563519bf2624d27b1e24c1a3fdfca5171161b6d2b3c6f364f84ccdd041cbc01d5a8d2d36
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
889KB
MD544e1f9e20576ea6ad98970b4d77ca74f
SHA1d64bb783dbfd825615d3106f0f14f5af0ef20d53
SHA256b0c732bf72b17f52686a7d46816df3a15d80c05afe71ed7a3de47988a332667a
SHA512975c36405a608c17754505d4d482121d62a33bb58baa6703198c576c0eb81bee22ef2e3cd34d73b287f98596a791ab5d0afe9b5a5b8949b50bcdc76e245d6155
-
Filesize
563KB
MD5e4061540cd29f12971ef651365a42a1c
SHA196138d74d937bf8c27835525d1fba7ff4cebb575
SHA256ba48eb564acc78862a8c19bb07ad74db2116c8200d06f24b282fcf3e4d1235c2
SHA5121ece100ed8077a5d2a51f3e693fa6fe53852505669ec68462ef165a45319cad9ccf839ecd77c8c9cba8f2552f74aa924b9d5a866b4da953cfc20365af1e1a270
-
Filesize
941KB
MD54950eba1e1d7f2d29df9d77e2abbfa7d
SHA1442d38cf5aacd78db842a64012f01b0bce549123
SHA256cb206bb8725cd3a482908246b9a1ca8e53e2a6b4241f37934a9a77b54516531e
SHA51231c1663d03436e8a5a3fa5751677c7c845fa368d163fb717a82b3d6e2fbcf9e1d3f3796f2d2b6f28c305c175e8cce340dc357b23106171d14846e9d991e53003
-
Filesize
1.4MB
MD50f0dd4d5a69dce12700d1beb8461f12f
SHA111083b64c25f5bece1b2217bbdefac0516734382
SHA256e10e788d5aed204bb6cc14c03d457a4de0d8a73f9f9379956131cd111d92e170
SHA5120b762fe3ba2d5e48740a63d3310d774ffe3f0472cdeb595efdcfd5962e7715e8f9f7be456df687d22d0ae39b4d3c780773a8a4540a8003710e397768fce8af59
-
Filesize
1.4MB
MD53f3a77f59463797ab6e384649b9feb25
SHA1c19f174a34ad3ebd288876588cd7fa86795921f2
SHA25617ce29ba80a296df3542a3816f36580562dfc3162af792ac3c94b716cd5883fd
SHA51286f65687b575719dd61df7ce5ae5bbdafefba4a5fff137b8684ffa33339474e9c160e88e4cd0f73e69117a7a5963f8f6ee14403c166c10bbb7e1dc5c72e32a07
-
Filesize
1.3MB
MD546c4c6c4e5f2b1eba1a5fc5b257de5ea
SHA1aad5aab9a9fec89e0023cd86aacb7f622d25b498
SHA2567edcd67da19ae28a6e3d226c5e43bff8022ba86b995fab7c76f4ec56d56149a6
SHA51205683eeccbb4d278ff027a53b4ca57a2e9c4788503d34e9b5ddeed938ec2d0314c8cf406221b081000ea3ab76f1ca604d3a917217ccde3ece83f6cc4a28ff9e5
-
Filesize
1.2MB
MD531028e1fdc9338de4eb7094033d55d4a
SHA1c7b51d5628dfbd79a0c9796e2c43ab4783ed2352
SHA2565725229d9c00d3d8dca18665ad3a75ffe27fb9ec960bd3d5c7ddd7cf6742b1de
SHA51286cd5b56714e9c4660e454ee1cff12ff97c5709c32ab57e44839a8bf57179ecf26c58e8cad5470dbc53a1b304ee7b07b624995398d3c38e324ca0c5e03317b08
-
Filesize
794KB
MD5263c780bcb27c0c32498bb7d4b924335
SHA10fcffb5a13a17d3a4339a8730bd5b3ca470bb9e4
SHA256115c24845940268cae9303d610220775a0e61772f258fea8f5396756e1e22525
SHA512a88b50558114c20e79b84fc879512a7488cbe3591bb545d7da6a0bc27a6f3f0d6507f008ceabdced3f92eedbec05e0e416f5d26c3487bb630b961e5b1352a14f
-
Filesize
73KB
MD59bcef194b7fe805b46aad347c21ec345
SHA11fe9e08734505c3458bc4f04ee62f8d80a6bf401
SHA256385d17da49778606a2877c531e84b1e578e070af6d3a07745b1f3ba0357e3875
SHA512b9bcabc780e789d0695939008f803b18af84c78b3e853369ebd85d96a76331ecfdb98393055d3ed2051f762e52acfda6d34534c13f090ef1162f7bb3acc3e604
-
Filesize
834KB
MD534dba3809f76d8e67d061af7614f0722
SHA15ced85cd1daf82e309fe71570823b05308305017
SHA2564d91189dadcb1cbf15b18efb5c87b9dc7e8525585f21643d93f002072d75c166
SHA5128b0093105e166fc5c71c7c689cfe4be9684a546b08096dadf57318a4c7844c3e9a0915c1460f2b630d4496405f9180486635fbf589aae64a4087ba156ddfc311
-
Filesize
487KB
MD59f540363c15ea20347b9f4cd38ce2a67
SHA12b28a7d07a07d119ec732111925be2c79ebc3720
SHA256a63e16a2eead0da0ebbf6228dd62b2a5d39921b23f16ca52686333b77509a33b
SHA512dbedfab2a6b45ae5ad1f578703d6fa21a8877b9d785c1ef6d34ab3447a05fe2c4c22260ae8b8403322e4fd255f24a8d1f41f8a3b9d60f3625bde11dd073afd31
-
Filesize
404KB
MD5383c48c7f64a6867db5b8577fa3abfbf
SHA1926911f9581df56f5ac38fac01f6d45acdfb7dbd
SHA2569b37a304f33bda4707c0dae60a20ac7c76c75752b0d06ad9fb2d6f07f8edd1b9
SHA51253b5d42ed93ad6f1163ed00be8cd1b66d367fadf25853c16d8c6fb710f69d9e8a32cb85d0dbf36d95c85da16b214de2a564bc0750c264bb0547dd8910a6f4442
-
Filesize
483KB
MD5db3574b18d567c583172e3f6081b4d54
SHA1b1bb1054a3e3a392553ec16458e032b201dc283e
SHA2568a68bab75b8bf12e3f69b1efb0c1623a4da7952d8ac6d2625e09ccbac80ca855
SHA5129d7a24cdc4877af2e2128ca50b0c77dddd629823691d21f57365d79cbc0ad22417966416749dbd2ffe44fb8f2954b2367ef73787a960ee92c3091bb46acc615d
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
131KB
MD5969e392c13fc72ceea6da05ca83e4509
SHA1825c2daf8ebeee657c10e46d42d98b71d2c3a5c9
SHA256d2c2f93c8e48ecb9690a89bc5dff12d82b2548c8e706c9d3f62d9248bbacce1a
SHA51257c50a1891e89a308b5ef8b74386b20c08c293c3958984d8f1159fdf703930f3843634d5b57c0e6cfa96714d63f3cd65f15861715c13e999c8b174b1b0335b33
-
Filesize
108KB
MD513f1bb46f6e82e2eb4293839f4357aa2
SHA17b25e915b8a5bde749d46ed226da01c65bc7bf9e
SHA256e491bd2c2245ff8fe8f354839bfdfd42b95afd8dc7fbdf4d13ccd5c5e92f873b
SHA51262627a1f36c71293fe9a95cafc67c9f2e94bcf6854fecd5e7ddc483cd79a8468ac95fcc4ea51c508536fc0d098ad157a04d3f4d679ab6d761464eacef91df73f
-
Filesize
195KB
MD523458cb315d4baf9b04f1a4e30e8daef
SHA142d9c8d6472e06549df70a13fbabcf68c7f71bf7
SHA2563127522310a3b48492daca399147688f91d2201f2ec26c86a77c2b80513f846e
SHA51244e620fe258bf38dd84cca2a47f9ba61c630f7f9347be2e8e2b2c8d516f683d6ba0aee65e2c4dd1095c3cd2966ec41090d33d0696425cacf09673a60a131591f
-
Filesize
164KB
MD511d8d68ec3d29182652c8af328db9e44
SHA1a94fc0eab69cdbfe5b0a59760b3e5793a6f02e9d
SHA256653ff2a0e2c1250c132edffe48f1611ec9835d726b20829191abd8b244c7d862
SHA5128f8a7a70614dfd594ffd9afaf430d4c73eadf04a7987db6b519dbe321bba63d857dff6cdb1adcc8f13c7b654aeca9e1d6837f09b3330c96bb344b4dd23cf74a3
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
423KB
MD58136ecab258715d9aa5ccff758e797eb
SHA142a89b16aab7506933c193da30f23e37f38844f1
SHA256aa48189a6d61bbae773157dd6974397b79ce552c4ad101148cae272d6b5e22ae
SHA51211be876e0f28103bafa219b04bae560d5a252443fae3f1df96e1eeaf451d3c1dfbb6257493e03f68e5a391a6083496e8c73538b4eae8220d0e4a558363cc687d
-
Filesize
537KB
MD53ede03c9c7222182066edc8d9013fc6a
SHA17895cd4217202810aad438aac265b4c6d501f2be
SHA2564e008a709df83e49bc4e1d0301c9d604d7cc08927d94e5b27492e4d2ba76dee3
SHA5124b858d8f142229f453a1ecf962151421f88bd08e94dea058400fcb956606a9316b47b9469e6a4388660c537cb803642db70c03224cbc659410eddb9d4bf6dfb5
-
Filesize
222KB
MD5148a66b05dc3b6d170f136b432f4672a
SHA1829f0c90d9a29f2f86f98baa74ed2f4088c74a9c
SHA256fb9e4ef90bb6333ed080e38b79aed5aeadc7f47561e38ac7e5d10310e4fd8f18
SHA5125264911cf26fe34829dd36b428e0311a666226e8b8093db3a920ab35806dd9784729c127de18b24ca3f61c6212844da66fdae113cfb93adf3cb6f1d332eaa122
-
Filesize
260KB
MD581dc7514a1e74cdfa7d24fb9a568cc04
SHA1288227ef434f19c0c44f71a3e3bf3f2e48ffcf7d
SHA256bc1f642dbec2365eb09eb5ac8a85a5ed23f2854920d727bf4105f4df5534e044
SHA5128f862806bbb3b34a86fad39d8582f7ab2949f321d883bb3261912b5b1aca01c2efbb8428e4cc5abbeab7e28cfdf6a85a03e1fcecfa04d20489c806bb68d42a38
-
Filesize
205KB
MD59cb074c642ae067901601af159326ce6
SHA176f5f3d4294e7ad143cbc9ad2f3e768709e2924a
SHA2562dcf814dec707555efc5c09c698c9d316d3f6f6e1f181ff88a5c556f42567c1d
SHA5125a3ca0a34f1fef033df06928c27fe9b242bc0aed51753ea3b8201dc37657c0b1e925e3b185e472707324f45d55c7f8bae4b4afb5336ae676b696871b8b6377f7
-
Filesize
301KB
MD5ef3205c16b041f7f82cf333df477e52f
SHA19c81950ac1e6e910a1021250b3e836f495ab75f6
SHA256c6cc396b62fc2b6fcfabfafa6abfd020afe92e9645c49b8f3ecc683aecb2bdcd
SHA512093905e4c390d25b5f9139279facb01a02ab6105032b033b733cb3bd9daf9200a0da33fbbe906032c4901f537f5586fb8adcc3d44ab1f6e11174e692ee3481ca
-
Filesize
2.5MB
MD521c3c121091881df547e87a891ce3572
SHA1e59f456e91f65f08c0b01935c2781ad46a99e267
SHA25605a644e94d6628ff12339568d70eaa036226da8857e96b3bf31387d6b90842cc
SHA5122a9dba7bccffeac7062002f0337368664ca5a210da8d74f88a743a638be77200631220369295be72fd5d4842ee21562f3aa3e6344166718de2399cdf9ddd1793
-
Filesize
149KB
MD503a8873e8415f3f99036c04ee8731204
SHA1d1b2da57854adb30d466c6b65e30079c485343d8
SHA2561deb127b6589cc13cdaf842bd426b7df7ed0967e9fe90e07f8a85c43db819d12
SHA512abc9aee217f467e8b9a31acae1050d826e02d96ec2821381cb33db8f0750ad64d67586e606238f53328fa0d586861a8f30e4609cf5bcacdba5a60192f5d8b332