Analysis
-
max time kernel
285s -
max time network
303s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
3a3ea9277d27b09f0519ab000067bf06cea7f64c566e153d37367288e3423616.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3a3ea9277d27b09f0519ab000067bf06cea7f64c566e153d37367288e3423616.exe
Resource
win10-20240319-en
General
-
Target
3a3ea9277d27b09f0519ab000067bf06cea7f64c566e153d37367288e3423616.exe
-
Size
239KB
-
MD5
02d76f13b740663d70b64eb6b2893ca1
-
SHA1
3571450afa2cc258ef4583f3896ed5222185900b
-
SHA256
3a3ea9277d27b09f0519ab000067bf06cea7f64c566e153d37367288e3423616
-
SHA512
84b54360469d8e3c53f1b8a75679f15aada5e59e96a64eabf8424082feee352ea6b730f4036b2940f2ec28153dca2133e4e9e4404f1b7708c768569b1e074cb1
-
SSDEEP
3072:uerZdBdazR6RKbafowJ2/dWgGXCUIWP5NCedNAhGYTBbykKBdpRSNa:uCZdBdazR7baQ//RGXChMNAhGgFKP
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
socks5systemz
http://buknhhu.com/search/?q=67e28dd83d5fa62d1358fa4d7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978ff71ea771795af8e05c647db22f31df92d8b38e316a667d307eca743ec4c2b07b52966923a668ef911c0ed95
Signatures
-
Glupteba payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/920-76-0x00000000029B0000-0x000000000329B000-memory.dmp family_glupteba behavioral1/memory/920-85-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/920-387-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/920-398-0x00000000029B0000-0x000000000329B000-memory.dmp family_glupteba behavioral1/memory/920-429-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/920-496-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2848-517-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2848-543-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
3E2D.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3E2D.exe -
Modifies boot configuration data using bcdedit 14 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 1780 bcdedit.exe 2612 bcdedit.exe 2028 bcdedit.exe 2960 bcdedit.exe 900 bcdedit.exe 1624 bcdedit.exe 2608 bcdedit.exe 2284 bcdedit.exe 1524 bcdedit.exe 2052 bcdedit.exe 2220 bcdedit.exe 1608 bcdedit.exe 1252 bcdedit.exe 3044 bcdedit.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
csrss.exedescription ioc process File created C:\Windows\system32\drivers\Winmon.sys csrss.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1596 netsh.exe -
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
3E2D.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3E2D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3E2D.exe -
Deletes itself 1 IoCs
Processes:
pid process 1212 -
Executes dropped EXE 24 IoCs
Processes:
CB0C.exe965.exeInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exeEasyAppns.exeapril.exeapril.tmpflashdecompiler32.exeEasyApp.exeu16s.0.exe30B4.exe3E2D.exeu16s.1.exeflashdecompiler32.exe288c47bbc1871b439df19ff4df68f076.execsrss.exepatch.exeinjector.exeD8D7.exeF222.exeJKJKKKJJJK.exedsefix.exewindefender.exewindefender.exepid process 1956 CB0C.exe 1628 965.exe 1540 InstallSetup_four.exe 920 288c47bbc1871b439df19ff4df68f076.exe 2464 EasyAppns.exe 2532 april.exe 2640 april.tmp 1956 flashdecompiler32.exe 2176 EasyApp.exe 872 u16s.0.exe 2924 30B4.exe 240 3E2D.exe 3052 u16s.1.exe 2304 flashdecompiler32.exe 2848 288c47bbc1871b439df19ff4df68f076.exe 960 csrss.exe 1956 patch.exe 2448 injector.exe 1252 D8D7.exe 1268 F222.exe 1704 JKJKKKJJJK.exe 2456 dsefix.exe 2540 windefender.exe 2064 windefender.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
3E2D.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine 3E2D.exe -
Loads dropped DLL 48 IoCs
Processes:
regsvr32.exe965.exeapril.exeapril.tmpEasyAppns.exeInstallSetup_four.exeWerFault.exe288c47bbc1871b439df19ff4df68f076.exeu16s.0.exepatch.execsrss.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.execmd.exepid process 2032 regsvr32.exe 1628 965.exe 1628 965.exe 1628 965.exe 1628 965.exe 1628 965.exe 2532 april.exe 2640 april.tmp 2640 april.tmp 2640 april.tmp 2640 april.tmp 2464 EasyAppns.exe 2464 EasyAppns.exe 2464 EasyAppns.exe 2464 EasyAppns.exe 1540 InstallSetup_four.exe 1540 InstallSetup_four.exe 1540 InstallSetup_four.exe 1540 InstallSetup_four.exe 1540 InstallSetup_four.exe 1540 InstallSetup_four.exe 1540 InstallSetup_four.exe 1540 InstallSetup_four.exe 2884 WerFault.exe 2884 WerFault.exe 2884 WerFault.exe 2848 288c47bbc1871b439df19ff4df68f076.exe 2848 288c47bbc1871b439df19ff4df68f076.exe 872 u16s.0.exe 872 u16s.0.exe 856 1956 patch.exe 1956 patch.exe 960 csrss.exe 1956 patch.exe 1956 patch.exe 1956 patch.exe 1212 940 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 940 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 940 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 940 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 940 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2916 cmd.exe 1956 patch.exe 1956 patch.exe 1956 patch.exe 960 csrss.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 91.211.247.248 -
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.exeJKJKKKJJJK.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JKJKKKJJJK.exe" JKJKKKJJJK.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMon driver. 1 IoCs
Roottkits write to WinMon to hide PIDs from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMon csrss.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
F222.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 F222.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
3E2D.exepid process 240 3E2D.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
D8D7.exedescription pid process target process PID 1252 set thread context of 1676 1252 D8D7.exe BitLockerToGo.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe -
Drops file in Windows directory 6 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.exemakecab.execsrss.exe3E2D.exedescription ioc process File opened for modification C:\Windows\rss 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\rss\csrss.exe 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\Logs\CBS\CbsPersist_20240321222542.cab makecab.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\explorgu.job 3E2D.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1572 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2884 2924 WerFault.exe 30B4.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
u16s.1.exe3a3ea9277d27b09f0519ab000067bf06cea7f64c566e153d37367288e3423616.exeCB0C.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u16s.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u16s.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3a3ea9277d27b09f0519ab000067bf06cea7f64c566e153d37367288e3423616.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CB0C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CB0C.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CB0C.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u16s.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3a3ea9277d27b09f0519ab000067bf06cea7f64c566e153d37367288e3423616.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3a3ea9277d27b09f0519ab000067bf06cea7f64c566e153d37367288e3423616.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u16s.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u16s.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u16s.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2656 schtasks.exe 2956 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
windefender.exe288c47bbc1871b439df19ff4df68f076.exenetsh.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1471 = "Magadan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-132 = "US Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-721 = "Central Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-472 = "Ekaterinburg Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1042 = "Ulaanbaatar Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-291 = "Central European Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-681 = "E. Australia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-81 = "Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-791 = "SA Western Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-382 = "South Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-31 = "Mid-Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-751 = "Tonga Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-101 = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies." netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-11 = "Azores Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-152 = "Central America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-582 = "North Asia East Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-212 = "Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe -
Processes:
patch.execsrss.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 0f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f0b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f007400000053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c0140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df01d0000000100000010000000918ad43a9475f78bb5243de886d8103c09000000010000000c000000300a06082b06010505070301030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47420000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 19000000010000001000000068cb42b035ea773e52ef50ecf50ec529030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47409000000010000000c000000300a06082b060105050703011d0000000100000010000000918ad43a9475f78bb5243de886d8103c140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c00b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f00740000000f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f20000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a42000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 040000000100000010000000acb694a59c17e0d791529bb19706a6e40f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f0b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f007400000053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c0140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df01d0000000100000010000000918ad43a9475f78bb5243de886d8103c09000000010000000c000000300a06082b06010505070301030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47419000000010000001000000068cb42b035ea773e52ef50ecf50ec52920000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 patch.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3a3ea9277d27b09f0519ab000067bf06cea7f64c566e153d37367288e3423616.exepid process 2236 3a3ea9277d27b09f0519ab000067bf06cea7f64c566e153d37367288e3423616.exe 2236 3a3ea9277d27b09f0519ab000067bf06cea7f64c566e153d37367288e3423616.exe 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 468 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
3a3ea9277d27b09f0519ab000067bf06cea7f64c566e153d37367288e3423616.exeCB0C.exepid process 2236 3a3ea9277d27b09f0519ab000067bf06cea7f64c566e153d37367288e3423616.exe 1956 CB0C.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.execsrss.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exeJKJKKKJJJK.exesc.exedescription pid process Token: SeShutdownPrivilege 1212 Token: SeShutdownPrivilege 1212 Token: SeShutdownPrivilege 1212 Token: SeDebugPrivilege 920 288c47bbc1871b439df19ff4df68f076.exe Token: SeImpersonatePrivilege 920 288c47bbc1871b439df19ff4df68f076.exe Token: SeShutdownPrivilege 1212 Token: SeSystemEnvironmentPrivilege 960 csrss.exe Token: SeShutdownPrivilege 1212 Token: SeShutdownPrivilege 1212 Token: SeDebugPrivilege 940 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeShutdownPrivilege 1212 Token: SeDebugPrivilege 1704 JKJKKKJJJK.exe Token: SeSecurityPrivilege 1572 sc.exe Token: SeSecurityPrivilege 1572 sc.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
Processes:
u16s.1.exe3E2D.exepid process 1212 1212 3052 u16s.1.exe 3052 u16s.1.exe 3052 u16s.1.exe 3052 u16s.1.exe 3052 u16s.1.exe 3052 u16s.1.exe 3052 u16s.1.exe 240 3E2D.exe -
Suspicious use of SendNotifyMessage 9 IoCs
Processes:
u16s.1.exepid process 1212 1212 3052 u16s.1.exe 3052 u16s.1.exe 3052 u16s.1.exe 3052 u16s.1.exe 3052 u16s.1.exe 3052 u16s.1.exe 3052 u16s.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exe965.exeapril.exeapril.tmpEasyAppns.exeInstallSetup_four.exedescription pid process target process PID 1212 wrote to memory of 1956 1212 CB0C.exe PID 1212 wrote to memory of 1956 1212 CB0C.exe PID 1212 wrote to memory of 1956 1212 CB0C.exe PID 1212 wrote to memory of 1956 1212 CB0C.exe PID 1212 wrote to memory of 2352 1212 regsvr32.exe PID 1212 wrote to memory of 2352 1212 regsvr32.exe PID 1212 wrote to memory of 2352 1212 regsvr32.exe PID 1212 wrote to memory of 2352 1212 regsvr32.exe PID 1212 wrote to memory of 2352 1212 regsvr32.exe PID 2352 wrote to memory of 2032 2352 regsvr32.exe regsvr32.exe PID 2352 wrote to memory of 2032 2352 regsvr32.exe regsvr32.exe PID 2352 wrote to memory of 2032 2352 regsvr32.exe regsvr32.exe PID 2352 wrote to memory of 2032 2352 regsvr32.exe regsvr32.exe PID 2352 wrote to memory of 2032 2352 regsvr32.exe regsvr32.exe PID 2352 wrote to memory of 2032 2352 regsvr32.exe regsvr32.exe PID 2352 wrote to memory of 2032 2352 regsvr32.exe regsvr32.exe PID 1212 wrote to memory of 1628 1212 965.exe PID 1212 wrote to memory of 1628 1212 965.exe PID 1212 wrote to memory of 1628 1212 965.exe PID 1212 wrote to memory of 1628 1212 965.exe PID 1628 wrote to memory of 1540 1628 965.exe InstallSetup_four.exe PID 1628 wrote to memory of 1540 1628 965.exe InstallSetup_four.exe PID 1628 wrote to memory of 1540 1628 965.exe InstallSetup_four.exe PID 1628 wrote to memory of 1540 1628 965.exe InstallSetup_four.exe PID 1628 wrote to memory of 1540 1628 965.exe InstallSetup_four.exe PID 1628 wrote to memory of 1540 1628 965.exe InstallSetup_four.exe PID 1628 wrote to memory of 1540 1628 965.exe InstallSetup_four.exe PID 1628 wrote to memory of 920 1628 965.exe 288c47bbc1871b439df19ff4df68f076.exe PID 1628 wrote to memory of 920 1628 965.exe 288c47bbc1871b439df19ff4df68f076.exe PID 1628 wrote to memory of 920 1628 965.exe 288c47bbc1871b439df19ff4df68f076.exe PID 1628 wrote to memory of 920 1628 965.exe 288c47bbc1871b439df19ff4df68f076.exe PID 1628 wrote to memory of 2464 1628 965.exe EasyAppns.exe PID 1628 wrote to memory of 2464 1628 965.exe EasyAppns.exe PID 1628 wrote to memory of 2464 1628 965.exe EasyAppns.exe PID 1628 wrote to memory of 2464 1628 965.exe EasyAppns.exe PID 1628 wrote to memory of 2532 1628 965.exe april.exe PID 1628 wrote to memory of 2532 1628 965.exe april.exe PID 1628 wrote to memory of 2532 1628 965.exe april.exe PID 1628 wrote to memory of 2532 1628 965.exe april.exe PID 1628 wrote to memory of 2532 1628 965.exe april.exe PID 1628 wrote to memory of 2532 1628 965.exe april.exe PID 1628 wrote to memory of 2532 1628 965.exe april.exe PID 2532 wrote to memory of 2640 2532 april.exe april.tmp PID 2532 wrote to memory of 2640 2532 april.exe april.tmp PID 2532 wrote to memory of 2640 2532 april.exe april.tmp PID 2532 wrote to memory of 2640 2532 april.exe april.tmp PID 2532 wrote to memory of 2640 2532 april.exe april.tmp PID 2532 wrote to memory of 2640 2532 april.exe april.tmp PID 2532 wrote to memory of 2640 2532 april.exe april.tmp PID 2640 wrote to memory of 1956 2640 april.tmp patch.exe PID 2640 wrote to memory of 1956 2640 april.tmp patch.exe PID 2640 wrote to memory of 1956 2640 april.tmp patch.exe PID 2640 wrote to memory of 1956 2640 april.tmp patch.exe PID 2464 wrote to memory of 2176 2464 EasyAppns.exe EasyApp.exe PID 2464 wrote to memory of 2176 2464 EasyAppns.exe EasyApp.exe PID 2464 wrote to memory of 2176 2464 EasyAppns.exe EasyApp.exe PID 2464 wrote to memory of 2176 2464 EasyAppns.exe EasyApp.exe PID 1540 wrote to memory of 872 1540 InstallSetup_four.exe u16s.0.exe PID 1540 wrote to memory of 872 1540 InstallSetup_four.exe u16s.0.exe PID 1540 wrote to memory of 872 1540 InstallSetup_four.exe u16s.0.exe PID 1540 wrote to memory of 872 1540 InstallSetup_four.exe u16s.0.exe PID 1212 wrote to memory of 2924 1212 30B4.exe PID 1212 wrote to memory of 2924 1212 30B4.exe PID 1212 wrote to memory of 2924 1212 30B4.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a3ea9277d27b09f0519ab000067bf06cea7f64c566e153d37367288e3423616.exe"C:\Users\Admin\AppData\Local\Temp\3a3ea9277d27b09f0519ab000067bf06cea7f64c566e153d37367288e3423616.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2236
-
C:\Users\Admin\AppData\Local\Temp\CB0C.exeC:\Users\Admin\AppData\Local\Temp\CB0C.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1956
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\D451.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\D451.dll2⤵
- Loads dropped DLL
PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\965.exeC:\Users\Admin\AppData\Local\Temp\965.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\u16s.0.exe"C:\Users\Admin\AppData\Local\Temp\u16s.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:872 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\JKJKKKJJJK.exe"4⤵
- Loads dropped DLL
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\JKJKKKJJJK.exe"C:\Users\Admin\AppData\Local\Temp\JKJKKKJJJK.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1704 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\JKJKKKJJJK.exe6⤵PID:1976
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:2392
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u16s.1.exe"C:\Users\Admin\AppData\Local\Temp\u16s.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD14⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:920 -
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2848 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:1752
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:1596
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Manipulates WinMon driver.
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:960 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:2956
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:1956 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER6⤵
- Modifies boot configuration data using bcdedit
PID:1780
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:6⤵
- Modifies boot configuration data using bcdedit
PID:2612
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:6⤵
- Modifies boot configuration data using bcdedit
PID:2028
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows6⤵
- Modifies boot configuration data using bcdedit
PID:2960
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe6⤵
- Modifies boot configuration data using bcdedit
PID:900
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe6⤵
- Modifies boot configuration data using bcdedit
PID:1624
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 06⤵
- Modifies boot configuration data using bcdedit
PID:2608
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn6⤵
- Modifies boot configuration data using bcdedit
PID:2284
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 16⤵
- Modifies boot configuration data using bcdedit
PID:1524
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}6⤵
- Modifies boot configuration data using bcdedit
PID:2052
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast6⤵
- Modifies boot configuration data using bcdedit
PID:2220
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 06⤵
- Modifies boot configuration data using bcdedit
PID:1608
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}6⤵
- Modifies boot configuration data using bcdedit
PID:1252
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:2448
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v5⤵
- Modifies boot configuration data using bcdedit
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe5⤵
- Executes dropped EXE
PID:2456
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:2656
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:1940
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Public\Music\EasyApp.exe"C:\Users\Public\Music\EasyApp.exe"3⤵
- Executes dropped EXE
PID:2176
-
-
-
C:\Users\Admin\AppData\Local\Temp\april.exe"C:\Users\Admin\AppData\Local\Temp\april.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\is-QEB34.tmp\april.tmp"C:\Users\Admin\AppData\Local\Temp\is-QEB34.tmp\april.tmp" /SL5="$201EC,1485356,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Senior Flash Decompiler\flashdecompiler32.exe"C:\Users\Admin\AppData\Local\Senior Flash Decompiler\flashdecompiler32.exe" -i4⤵
- Executes dropped EXE
PID:1956
-
-
C:\Users\Admin\AppData\Local\Senior Flash Decompiler\flashdecompiler32.exe"C:\Users\Admin\AppData\Local\Senior Flash Decompiler\flashdecompiler32.exe" -s4⤵
- Executes dropped EXE
PID:2304
-
-
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240321222542.log C:\Windows\Logs\CBS\CbsPersist_20240321222542.cab1⤵
- Drops file in Windows directory
PID:1804
-
C:\Users\Admin\AppData\Local\Temp\30B4.exeC:\Users\Admin\AppData\Local\Temp\30B4.exe1⤵
- Executes dropped EXE
PID:2924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 1242⤵
- Loads dropped DLL
- Program crash
PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\3E2D.exeC:\Users\Admin\AppData\Local\Temp\3E2D.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:240
-
C:\Users\Admin\AppData\Local\Temp\D8D7.exeC:\Users\Admin\AppData\Local\Temp\D8D7.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1252 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\F222.exeC:\Users\Admin\AppData\Local\Temp\F222.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:1268
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2064
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\Local\Microsoft\ApplicationInsights\81950f7e7cbd108086cf2da3a401afdfffc60d9b485aac5dd52f7a137c00f950\9b01cd38a5844300a49fb3bab274aca8.tmp
Filesize1KB
MD5403c6f4e8901db2c85696b2b139d2639
SHA1e88751d2c167ecb310ccb125281c4549b45be9c1
SHA256f5aa2e6ec036a8c119a9dd75b3b92f2c93e8ff359bb8103ed4b6416d0e7867f4
SHA51287b6d7483a68dcd025b85f1f55b19148cb9679bf139529d16565e9a31cfe519de89d5922304a6fc0568a9468777a095a0d306781aced8f78fdce4efe206e59a9
-
Filesize
701KB
MD50cd82ea1be78aea78b834d1fae618d8f
SHA19f70a4b3136f98894785b2df976548c001bd8364
SHA256026465b1b55d4e1ff58b3424280b2b71cbeba20ad18697881a3083dc293b4d08
SHA5120fe44a6346d3d853446211c58564639680a020604fd45da71de51aa928575a03ce23dce02115935864200ac3cdc3afe402d5e0a358b8a25fcfd7989dbcc76b87
-
Filesize
449KB
MD5623fd71a418a5e59270718ca8fb1aa79
SHA1ffef5a58cc34a50ad4d9f4332c92ce1d6c024c8b
SHA2564fb044e87917f8cbcedd2a5b351dbc928e228ac714b6e8a49b88d55fab51f485
SHA51290ff93c7ca07501d9b9c335101a2ade589940fb71a0455715d24cdc3ccb92c46816747b24b76365c496ce2b57152566254fde725f6cc3e4e08e224e17bd0883e
-
Filesize
141KB
MD5acbdf63cf3f8174b5d570dea336ce874
SHA160841ae65c5cbace1e57841ddf5adbd2bc121c19
SHA256dc030ef6b44ded020175818a454ebda4889480abf9ac3ab0b1e2da4439fd184a
SHA5129f57c9fffc7960814ec91cf78573586d6396b380af23124bf0b618c2dc366af1558f320430fc042fdbebb776ead5a0a7c1e00ee5fe61910c457c558608292814
-
Filesize
181KB
MD532069c4c106c7d62f3ec7bc41f9263af
SHA1c5fcdf35f2ad2db6842e68563ae4519d69b118d7
SHA25640c0eab66c37b6d04ece510af368f7f6f1d750cd3d26b7d5d95c849791aa6cda
SHA512cfb796df192948f61d7eedf9197999f3cab344555b1a5ffb0ba6027f0fcd8bd9250b4ff77f7fbce3ddc274ea4378dabc086ef5696d18364248a440a334e895be
-
Filesize
203KB
MD56e61c3d78d20ecd328d9a3d257ae9314
SHA1e6d4b84a284c3febe64b5e29a287f05635efcd63
SHA25607da418ec0990fa5f999f1ef9c57e433e4e49312234fccdc629668cceb20a640
SHA512e3d7aa1881802f13ca86eb47c73f78e33bec7e3474191265319e02f4db5a81dd0459b84d3a1c785c0d8983e85601504bc0da22da4d197eef2dc9d392ee422681
-
Filesize
357KB
MD5bd2ce34eed00fd40fd27802fa47f72db
SHA1bb123e9bc0bdf7afbf7c7f6b36ec79c9ab65dd53
SHA256167f4e8f1e328c992d5876873402f579b28ce2fd88377bdda2b0bd056b42d529
SHA512bd09693f66ad7d1ac726f1f3d441c637a36875dfafda1acc0b7a9cef6295d242a696816dc537cfc7debefd502e75e03c9a91a7cf303bdea2bb16e48627f8618a
-
Filesize
144KB
MD550d20f96086d0d2b31527e417e3c359a
SHA195dfa5ba60c180a8d56b58bda7457733582474bf
SHA256f7720bf401841dd80044da2a275de12704fd0489bc27745884537d7d1659e8f6
SHA51233f0713da222aa8d373bb603b73a91bf5fca387b65032ddf49704267c341c218de10d7a0e71b4812fe1ca9c8c24867fca48a88ac4632f475762bd709c0458b15
-
Filesize
793KB
MD53be51e6feb7c55beb794b47b24390028
SHA1c004a45b2db7ec233506c1e7922a207c81843581
SHA256227a1c5b9b0b1deeffd9bb02f6a12e2d7c3f5b2db92ce512447b1eff5d2b26a2
SHA512993615debfd499f1d3d622115d7374966aceb375461e7aa8e867c995846293551825a36c9a7b4971919ef099143d1c75f18168cd61d4a46a43910fed6757fbe7
-
Filesize
64KB
MD5923a8b054e90cb742629d8fdd9fffbd8
SHA1b447904366ac302be16df0c1d1114123eca35d61
SHA2569d7a0e2e3b4a7735061ad9aaed9d9b4813b341b1d926ab2b7ea078715d661216
SHA51204d113f356607135b65d5b1875d64a87b99b57fcccefda68b6d45d9b93233f0bfcaf6e96e522692d9fdf4a1aaa8514f1afd430c5383cac66ebc3e304c0f329d6
-
Filesize
31KB
MD5bd507d6d0c572cf50364d4ac6ee91d97
SHA11c998a2aa747176ec6b8c4fd92fb66664d0f06d3
SHA25654f15e56f404cc47ce09360661fbfb8f3d0b2a5b87e6669a07ac3f78a3d49ab9
SHA512553cbfcff95d82be454cef5883134acf7e53a871f5def174d206648430e91d253e26b3e76fbdfcdf344d259a62379f736cc0b4ef194d18dfede299eaa4df170c
-
Filesize
315KB
MD522a1baff7984c35d8483619e76743b54
SHA1275add19b4df034229071a5966621572c3d5ddba
SHA25612d71ba72d7f6f55157a19341bd76c568681b9414d12f83cbdbe78bb5ada3b92
SHA51214f0be8d8ef9329756976eb23b7000fa5ebd8417259560900687ce503a3a2a4653cca0e4f1531c742c32a7fb0a4002ea7a2514ae982bf12159997727d4123820
-
Filesize
353KB
MD50c9d4f70a2b8441c04ed4d6095863da9
SHA19be2e9da8e7a700327713233b097f672cfd37194
SHA2563d7525d1e97422aff3890ef0fe09a0ef20103a29fe653b770805d2a53e5c89eb
SHA51212424a151303ce5724dbf496c25d6da93bfbc28ebfe44723890511a0763d4a8179b5227a66f4ec2a98613d519d71a116624b48022983e34374d767683c2a6f9f
-
Filesize
431KB
MD5b3e8d27919831127f70e2551237d28e9
SHA13be541e15617a4bf3455ed5db6a2d9d3375e5804
SHA2566562e5e80dc0297be9bc3c5d41827c3da1899a891189a87c3b33b5c14884d5aa
SHA5127eef0e6829e9392e3ea5ef2f45e9e69137e39f195d2de29d1e22ec7338ebf83a1de7db36e8948573f52c267b6502c7de77fc34bea3a7c0f2792bcb28b3e71cb3
-
Filesize
232KB
MD5c8eac1d34e880b19859663677cf6f469
SHA14a20b4a61b2172f675e5047b2ce82cc1cc9e7150
SHA25647a23c0c61f2de27199085bde6f0d2f9b891e890d0e0ca9f7b37505ae7a0d69a
SHA512bb42f71f910dab8dfe9f5c769a078bc48bc4d93fb301ee820bdbe37dea1916ac7828671a8f5b356697f154a6e6174da9fdc8c248d1149088e2763a1ff3d7acd2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1.0MB
MD5f8b0423c4754476c9b3251c8d6a9f740
SHA1107894f1c6d66f309cba21057d765e1d91637047
SHA256808e525768f25385423fc50f05a0be04f094d0adcf0d133dd8f03ddbc78c2ba9
SHA512bcac46248d3e2fff77834baedf0b51e588e325ff901fdd1d49178edd924901f3cab46cd16faddb3992fa07113537fcbf24031ed62126964d1df45edb88788937
-
Filesize
49KB
MD563dc7db7806a7bf03302f23c67672904
SHA1efaa6149056267fbf2cfa36f00ba572031e54e07
SHA25693dd6da9642492393b011040410c4ff4f998035e4ef8e1d6c21ccccfce3c569d
SHA512d991b1468a94142c1ced85c9ff3187bb3f75f6f31f8132a23a8144cc29293b919b257a041a2dfe7474d9b8638f0604b8e12330e265ca5ed23b08e0ce3101a427
-
Filesize
529KB
MD50f1f326844b89306c42d3fb8a2718031
SHA1e7f7081a425f78b15afe91fac41c7746369a0704
SHA256a92a467582d23696fbfc1d8d263d90877664c6b6ec1f99be9860a3f930752771
SHA51285451ef14ea97c6f83e100f5b4595bfe4983dcc22d592761851759fcbc1309dc3afa06fab6137d3fb2652a12b126a09e5952ef5e79b8557ec4f6c7b55feddf16
-
Filesize
1.1MB
MD5679e0c9d77c16f8529e6a08486c3a9c1
SHA18e74ee4ac19b5653981a1d8378aeda9e6fc1b009
SHA256585e21bcd0f3c05c51f4aa74f554e0a648370facb8b90134680c2e49b5fc272e
SHA51254195de01cdbf53812f172931d66ff8ee510f78ac972737c71a57fbae1a3b8b7a295347bba81ff38fa0ab934eb4cb60c90e267acdd512ec1b9e90831db454acc
-
Filesize
384KB
MD52621e6c8cbb456404263d0e1a5770391
SHA188b2fc6be57bdd988078a11bf86618e9ec568308
SHA2569220a2707af0f721521cfaeb27368b82429c37853b30e0c44b5705cf7fa6ccb5
SHA512efae80bf74f57b268879a2e7caead5d04499402009251cfdc464677d09d50057303a74f3320f0e60cbb18e5afc276119f9bca4856744065e9d60288a0be47c83
-
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
Filesize492KB
MD5fafbf2197151d5ce947872a4b0bcbe16
SHA1a86eaa2dd9fc6d36fcfb41df7ead8d1166aea020
SHA256feb122b7916a1e62a7a6ae8d25ea48a2efc86f6e6384f5526e18ffbfc5f5ff71
SHA512acbd49a111704d001a4ae44d1a071d566452f92311c5c0099d57548eddc9b3393224792c602022df5c3dd19b0a1fb4eff965bf038c8783ae109336699f9d13f6
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
625KB
MD5e0afb3403c69f6b80d646693c4047bf6
SHA1e66268912626b3807e01c3c04cfb8969b4a4e970
SHA256552078df3d9cc3c0e9b32b8fb3fe72b450427b090031b9145917e774052c0c65
SHA512cfd940a3d1d984820bb78cf24396170111463564b2903da0e45f841f982e265af5a745d0ab013ce7825177d68c52aa66b60bc94d3a8c46b8f6793253642b36bf
-
Filesize
546KB
MD510e57cd517b36d55e0ca2dcb06eda5e3
SHA116ad3ec4633a7a7f7f4ab9481b9b15679e8ed17d
SHA2564d8c3e6b44e2df026cbcacc297a1483be877ae3a46392126545e82bc1c86d1e0
SHA51253f4b0747837e5a9f4cfc7fe1198aee06fe5456913ee10ead4d7745bed31456f302529418bdc14d0c7e10cdee3907fc2066467c5267b499407fc91c431069d4a
-
Filesize
508KB
MD5938b9605c151041bb31b428fdb833ab8
SHA136fa1188015de7d236477c2c397b40aec81cb30a
SHA2565691cd080412437bbbad13007e90683d00a09164646a9467a864994712ec045c
SHA512d695b52d74885039f7113a0176d811d8e54050406a7871ddf7851737e17f9a08b1a5bdafaaf251a6923d1d4f40bceddc53e95041d914649f608a0529ac3fe362
-
Filesize
2KB
MD5c2f5a3a6d9aafc67d7654e824d778402
SHA105b525797686ada97a5db4978160039d6afc3ce8
SHA256a9fdd9f3cdf83a20c82fd1cbcd8da76e71e95154822e302d0e88665dd4a7e361
SHA512f54de5876ab2daaa7493879e3d0d7e500da6c6b3322b329da30d650caea94a4fc4d8d005ac054e3f050c40a6c71e319f07a8a53094915415eef23170cf245f54
-
Filesize
206KB
MD58f289d4cb6b6b204e8bbb0c2abfb2e25
SHA16abe5ba1775bb501ed25a06001318af61f9750f6
SHA256fd5d73f750d823b7357cdaa02bbfced0d2e9dac34880c27898463d5531341c38
SHA512be0d648784eeab84609c9e4a55c48ea4940e19a6772eff85185e6d4685099f25a1c85d30d0adb7982c921bc8489a8486aa7a7f2b0afbf4dec7467b596bd83065
-
Filesize
718KB
MD50fd7eabb2136c31a0a343655389a87ee
SHA1f5add52af01d6c0921d91a79f715ca67d7725f46
SHA256f50055910d244e9285b27ff7dd4acdb766eac0931aeb52362ace97ee5d2ced5b
SHA512b266b960017651d4ea732745215d6f7ec6cdcdda9445078b7339739c7aab87ededf79ede79a03898296d98d57150701fea9060db50a3b8db8a9fb1f18e5506f3
-
Filesize
591KB
MD5e2f68dc7fbd6e0bf031ca3809a739346
SHA19c35494898e65c8a62887f28e04c0359ab6f63f5
SHA256b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4
SHA51226256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579
-
Filesize
141KB
MD5c9746b751284bf86838f7dd722d18ac2
SHA1d0acdbcd6afe5f7bb1c20a34a34f3d56641231dd
SHA256ed007e6e5e386ccf844a1847ee55b94fbbb29bba9aab74c8cfd8d77bbadeaa02
SHA512f4199dbed9dbaf65041c8029570814803ccf9a503a5632ef1ae4f64289e2859a32caeec32e03c073e8b8fe2263e563c53c296e48fa5175f74c38c810f213d154
-
Filesize
63KB
MD59cfb2d8aacd88852165f9630afd8803a
SHA15070870c682e4ae736862ee2a6e7cff0e8ec1d5c
SHA2565c5f937d3cb9942fbf228b99425fc8b08c35aad525a458e6b7ceadf84d8a7835
SHA512d378a12e8bb346c051a626157901e8d72eacae091370a58fa776f4d76efed2c2b8f757ab7a26d4175fdfd10f4f0042a2b51861dc19f0aa2798097d669e401fda
-
Filesize
423KB
MD5dfcceebcf2b1493524dd76fa3fa76dbf
SHA11c96760493dd0a06509425c6338263adb94c727a
SHA25654fc4ac3a5efc13f46c9da3d4e0caaa706764f178df9dbed7695e03a6f36e37f
SHA512103a68b3880e40515899be4bbdfa4f3ec4dde31af59dd8c91646c9c926eab966989063a702611b25901c7cb24d1f1d882db2244f140465fbd7f06279cbb83a8f
-
Filesize
161KB
MD566f6510283087bf2cae668c66e399880
SHA1ea5cc7964ba05dbfd3f75908bc94b2af655ccb1d
SHA256cbe9a9606e0656ec70c22619729a4c6e1f3533bd6a0f4e89db0ce6cceb22fab4
SHA51217521490654fc334dbf9614721e07b3fce72040608e8c34a74490118609b579d7b531f70ca02efe28a8114cfb42582311957707d7084a6681837c0bcee39e6a5
-
Filesize
65KB
MD513c59ad8dac58f7f82fc57993488e18e
SHA1ac057a2919f4a1b19d02020b3ed4692cedf84331
SHA25620c71080ca24cbf6aac85035e004177e9675c7d12a17098fbc33a0a13ed8c9d1
SHA5125328a4038ad89c432aa1edf189ff55d1f43d5f8816d6b5488e544fb79d36edaf3e67874c0dbfc0690cfae2921e8dae3cfdb638f50c53db4d6e99668c44373c08
-
Filesize
187KB
MD5ff319b2dd16a404741227c6dc5881e18
SHA11d05248d8facb658eb3aca90f424b5dbe2dcc628
SHA25633473ed6ffad55795aea6f2696b6d5b4faa02c69005bd8ca27993de29feb5765
SHA512683b16fd40bf933694a82062bc378b4d9d6dd5c7d4c3d28a40adeaf36561e6309cc303f91d296ac30b6a0fc3f6d0c9853eb399534c818a760f105d53550fdb04
-
Filesize
108KB
MD54849fb97319373f80b8b0eb365e3da46
SHA118277f2953b5ec938b1e415d099f98f14a0665d5
SHA256b601cad889f01db5c2f0e85e7c7d56adb2307a092f17bd15eda5b611068d3c39
SHA512e2e91ebe0e27704564321dafb6b10b5809f8da3652b3519fdd00a097e8f368b29ef96308a1ccb01ee76d697d4719c08ce52a267082f8806f004bb22e6468108b
-
Filesize
575KB
MD50322e20c4e2571ca047ddbcf3dc61ce5
SHA1538f6c50f924bcac66ce112b92071d240525d51d
SHA25622ccc7be2fd1e3a24f779650747e9f990969c4a37165856d9e58c7f4c30b1806
SHA512b51746b78181c725155757ed934efbe2ec94a0008c2d3fbb751776534b8886e5b11fa37dffc296371ec0614ab990a7d4678c97c2887fac1474404fd35e48894c
-
Filesize
447KB
MD5f4f88a53e278bc93ca7e5b8be1cdd5f3
SHA1e9cb5fbeab9a9fbec54f44e91c352817e197d414
SHA2565be3eb06247da8b759dd1509d074d13d43a1b77aa505d807575c9593d2697866
SHA5120fde2d58a6b6d26ca61f4d55e33e221a403614d8b487805506766b77ce3bf693f2c4d96151d04c2d001f1fb8796b9c3d34e7162086f1d2c0d31838c40145a24c
-
Filesize
176KB
MD54164777642bd64dd43f3934a612c49f9
SHA1d0d9596c5d10d1a140b5ce14410ae7215f38a477
SHA256c7559e6a85544a21b0d25b12167a577d98f89f2aea1610c2799424fd23faa70e
SHA5128c7a9c623bfe06e4cede1404a776a58fc7edf4f91131fb6d0977aa27583d3040794791d01675ed9dd71ba0fca2ec517955fe8da2422523d3f0e1f22e4834ff01
-
Filesize
259KB
MD58baf7f517034d691c3af487cd372f7be
SHA175175d910afe698d78ada0705ff1fa708e72f51e
SHA2561526a7dcf05740f60180e6b6ae28080ab9504d42807f49498d163a377302cd18
SHA512b3d9c7980649d5b237b91399d6c99bbbb7f1e9641ee2e51280b8d5eee83564113800373e9b447f548c6c6a97e9fc086813e13c82e8ca10323c485467b3643433
-
Filesize
483KB
MD5000ba598ebfd3289ab755e622037dc10
SHA1280f182ce006832b4d01db7b4633633ee5b5ce5b
SHA2563b98d97fdaa48a4b66637f69b357af8feb35e069c4d92e88a97298632e6c84cd
SHA512d90aa84d2fa1926e338e0be9899027d2546f907bbf7a842ab629b89617e80dfd84797076d731edb67820a5d593635e967edeb71c2d235cfafb2ec94eef016a5f
-
Filesize
548KB
MD5d6e4133872d52979d6e56a84bfb9d977
SHA11ee4bfedbcbd6cea6d4e90faf7cd9c67f62fe803
SHA256b68366cd7fa84c07eeaf1ff69dd22d2a8e06a693481256ca6384bfa548c3ea2c
SHA5128c960b7914b0e3cf59e31df1fb15515fe5f6a3b457e2c6e435b3c17d284d38cc39e4ff11d04697a013f8ae06c72934a9409bc4e605c0a73715a2d2453a4e55ea
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
988KB
MD541edf625064150d8a9255f585052b54b
SHA1719c3fad7b64ffdb38b2451304c667cae529ce69
SHA2560a007abd9531aa92ef803439b943bcf852f4bc412dbcce6218886b40dd67d06e
SHA512f548726c889d38976696d254a01c65f5713d969770788d637c6c8504bcd5f83a1796db3f671b31be1dbebfc2e6586e0c89d2e67737ac7136177460c0476f7cc3
-
Filesize
2.2MB
MD5e69125300a060d1eb870d352de33e4c3
SHA160f2c2e6f2a4289a05b5c6212cdaf0d02dad82ea
SHA256009de0571eb77c7ed594b9e5cda731e2953fd2198e00b25a0e2c4c4ef7414355
SHA512257d3b61b2c85c1e71d2a80a5fbf44436e9734785fe6b0a643c1939dd01c1d8b98f1c454695296f7137ff035ec6c0118f053e4833e0be91618f2a9066a8cace9
-
Filesize
78KB
MD52b98ff880f0985462efabf45e72d9eb9
SHA134665237555321246fe96d8a8495277d7c697372
SHA25674ece4132f47ad3057f399570cf99a2890592362fab42824a80c422938b02225
SHA5122289a4773000d7d8db164ef3074ba7d2472838e88bb102254fbdc1cd0f14f38cb8255fc55a3410835f582536efbcd66164e43c24e61e4dea9f86d6ef88224fec
-
Filesize
404KB
MD5383c48c7f64a6867db5b8577fa3abfbf
SHA1926911f9581df56f5ac38fac01f6d45acdfb7dbd
SHA2569b37a304f33bda4707c0dae60a20ac7c76c75752b0d06ad9fb2d6f07f8edd1b9
SHA51253b5d42ed93ad6f1163ed00be8cd1b66d367fadf25853c16d8c6fb710f69d9e8a32cb85d0dbf36d95c85da16b214de2a564bc0750c264bb0547dd8910a6f4442
-
Filesize
467KB
MD5bb9c152708f53c0a1dae846b0529e572
SHA1b0c6c4cb01bbfcde98b07e04ca643caf07e3d85f
SHA2565f1269e474b537663662afcff4e03b348613fbabc2616c8ebf5998b142d9c083
SHA5127abf3b4d811881c265a633b3560f68ea3ed1e283dbb476ef1705a7234a2f097011ea4b82e9eae9b8b8ec083328b08ea52ebeb0599b694f55c0dc07448bcb553e
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
631KB
MD55e6ec49b6e482a8f172b0e80df3e67a9
SHA14c0662c223d601cc2908b04ccebc9a30ef67f360
SHA25602ff70f8bad1bd7c9921279936730107af2480241052d09405c1f74fc9809e62
SHA5126d95726e3b319545c20d597df1265289329e9daf7f9428341003a9a6d1e3a27ae7df165c43da12cd3656438bdc7c45643c4221d73d6871de3d64153247dccdcd
-
Filesize
294KB
MD52aefe96ca7030b9506248f4eea58a2eb
SHA196ee0949298e1f73dfe2ed15a0b20c9edea5e7ec
SHA256570229e87d781dcc94c93e4286c94b10c62bbce41c11298994b3e00501b1d913
SHA5120bc4581b36fd524641e05a7b90845ee89c1f2855c5b368ae3411841aee37272b5314cec2279665ab9dec80d424ea41163aa76bc14870729b06f66842b71eed96
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
252KB
MD5a20bc3746c937da4f50e4714df10a3ff
SHA10fc6248a496d234ae9cb951337a95cb4fb87bef8
SHA256067be7109d0c4459fada42c0a7c0f658f591b971ecfadf63ad9023927e34bf0c
SHA5121aa979fc76fde8cd23704cb13afbbb2989181304f6d8b3670a47a8275f690f1a58ef003852fc2cdb012c811f4b969d4b0589e9db31a7642e3056e8e03150800d
-
Filesize
533KB
MD586e442cdc181f222dfcb5db959f65a67
SHA17d328281e9980d9891185ed4a9a5fad9e9b845af
SHA256c61ccce04a11afc35630da9a0a1e0fec1d3976c8f4ed3048bae37624584d47f3
SHA512fdbc5d087acef3e366e653c9fbbc763c91500fa37d5d525025abb6fb8cb023491cf393d78b722dc7cc62f8ca906179abdadb52899b3893710140c250c9fd79a6
-
Filesize
978KB
MD54e8eab6eea50b6d2ba1ac2eededef355
SHA14b150233ee30b07cc3d432eb92d73f18cda2d03f
SHA2566b302abab06101a549787bdea6149b980bba0643cbae365ae47297ecd4e13382
SHA512d1d3823da9a1ed7228acf9b1b930b613bd43f41783f326a17d7bdbb553da2469f36b5ee349d0ac31ddb1e3176a38c89a5f50b441867699f5f3623a6950f57047
-
Filesize
693KB
MD5fca61bd62b5538f31d1d7378ab5b3a01
SHA1278c2345bc773aaba0ae4b77333cc3bd84cf43af
SHA256920bf21e8275639cab977c4b78c81de1049159a39b42780d669dabd5653b359a
SHA5123b88e72cb4b7846eec58f2939bc4b9237ad4a87c8ae29a0924397b19374c2931b056a738c5d45194d667dbc17ed01aecfc93458bdc79335b98e18223902ff874
-
Filesize
81KB
MD5aa492ba8674be3ebe8a4d6930e48248e
SHA12f9c7ed090129a878f8904f963155f3426cf8952
SHA2565a427e296150c4e5769592b776ab4fd089006d3bf0a7ed0b5770339fdcc9ce10
SHA512e64f23bc94d8830143a415a900d8f708e569077ed9e0a0ccc8ad0206dcbd46dae5d4955bc8a1f5f19c5a99fdbe369239cc58e63918dc517634f0f7f6ffa31791
-
Filesize
239KB
MD526fd5e49cbafe3692ec610acf0a5178e
SHA1402f575a058b7bf0ec6499bd11bd3bbd5bd7b280
SHA256de54096018b21c59ac67fe1ba4b7abfdc39940620fdfd0115c524de0c48eec34
SHA5129dba942ec716f615e60127b6b1f08dd3fd804957339186705c8b34e78ee1d1b01d59d6c58f81071d499d83f1a6d5618b602945b8286e02c18b0168c1d8be227c
-
Filesize
144KB
MD5fbe0a037b24dd22470f0cfbfc3cd6a78
SHA1bf9534357e2582220aa7e115eba562d33c5c55bc
SHA2562d1da10a774e7e33ae524e5a116885527b364c2da824446353be0dda954f1820
SHA512ce585123c3d907093bb8a25849fd61a8650016a5e66c780c9f35559f31fdf99bb1976a317b06dac320155184b1f34d91b4eac7104e9a139d557ed0c43fdafef1
-
Filesize
172KB
MD5eca3eda58149b9ef5c482baac6d81f8b
SHA15738aa5f4d66e0e3d5650ba127a3726accd033bd
SHA25675aef9b34a35c50c293e8bd08e9677f04bd961f219bf50122d7ea03aec3f8962
SHA51253cb3f74bf1af19aa40e3b17341c629a5fd3d13b00d7eb323a60f4ca7b76d3b058f29512e108eb376c5d01bdcd9b4f95f05ac4269987cec4c181a34a386b672c
-
Filesize
128KB
MD5c84484ee58f4000f4bc73a4824c22f1b
SHA1285144a6114a46d83606de61d3935a3fa030dbd6
SHA2565f543fe601320c0e97d49fff6ead0bcad5c8ed7fe27ea0d1f207c4de10a95abc
SHA512461cbb7a9fa44953ab1e4c7ab56ae1236841ce788b7d2a8701577f69b82ab5023f7bce3dacfe378448b1b002ab35ab545cc3a0a72f3ead832a3bd771993e2770
-
Filesize
79KB
MD52ccc3d4bda73cc88dafc407e44ca4ced
SHA1d7ab39b342711b52937e6af8fbddea6f4edb79d0
SHA256d3b4c69119697449baa1caf2681bc3631723a90adac4b3976bcfe18e2212cfae
SHA51268dc8ad920e527aa31d336b17fcd2a1b664d3f6b2a06f44a6d007cd3bf8a6b60b2d484a5275f790f02e4645e11077fddedc448d7e6f501cf7a5fcec043dd358a
-
Filesize
77KB
MD58f7e0bc5a2ee3bdd4aaf6071ba0f634b
SHA1da7dcedc917be6524461968a72e103d17f026e0b
SHA2566d405a2c5b73c8e904eb07c933107f99cbc6489066d19156be7265a47aec6149
SHA5129b64aab6fcb29e911b5b832473f0d73915796465750cba930c85608236074dc41affcc4285aa5c149c2a51dbd13d83a9a5a4afe9af36870f8b69831da1c5ae76
-
Filesize
130KB
MD505bc54ef5e209667649195b338fda0e7
SHA1b03c5ff018ff129bde06306f6297c1dc785fd250
SHA25648baff5a2313ba63f1635d2a38df7aac84bef00a2a3e6fb2ec6657a157fca5b4
SHA512abb69084d31886c51fde1e2fa7d72d6ebce3e2f0e37968a15ea125aefcc948807d48baf363a4450cf2b41674c4fa1324e661e9779497b03527eddb44bed7695a
-
Filesize
64KB
MD51d67d31ae4c604259e783c8ae6dd0339
SHA1d13770685a6eacc16c8670c0197b83f2aedb50bc
SHA2566473c36460c22ea67f9d0821e5032491177403e8651832ba82336aa774f22668
SHA512cd803a9ca71cca0ee9755ee6ead2505d303a60f04afc68277baf7d7947d8621cd6c709c2db0c2783c6339127e48df37e0350d8db5bc0aad12e8328c606aad54e
-
Filesize
268KB
MD5a3a28886a2f84cdaf8888b68cea1a649
SHA146cf74075237d14292c4b0e08597e5af6234e702
SHA256cc88e12040e98cbe5633988c1092ada2bb6f0f87591e90dec6e0bf25adb5d580
SHA51296124f397ae234116b1b54dc65a5dd098ca52c131a264fb10a8879eb51f9d2b1d3f23714e0a9913b28ed96b231186c4eb8618d36154fdb662a74f26a7e05124b
-
Filesize
341KB
MD50e49e66fd0e90ac46ad9f027df419048
SHA1357559abc784e69245db2e4302c838913df618b2
SHA256599fbee1c0335d5f8efae7ed35eed9700001841005158a1c8c6648b53a6e4bda
SHA51238aa37d633795de8ad65749a11da261e9f3aa2e1f285cd95e89a895c76e28a7d1fb72e87776013e8b508b9201d1b7ce92462c85cb4e3d55d5cf9b5a802479fed
-
Filesize
168KB
MD539a4381ad7db22b8775d9176c6fa0203
SHA18edd7aea4f1753bb52e8f242c904b3a8ca98839d
SHA2567f3f2999c1ec599dc56fa93338e71ce8e635aa82744c06f63302a81d958c89c7
SHA512834e4073dc4372b5ff10a338e806942a8233418a001998ed8293388ef98ac8fe0b1aaa1e58e649470f394352b87c1568d178062d6f1867eef8cbeda96088659e
-
Filesize
311KB
MD5fd5abd6da47ddd93388c773b15592912
SHA1748f5f55141d4ee6892e1e401b5085efc18626a1
SHA256f699732a1b5fc1f2da596acda39866e41fdef9b72f2753f1ae0a533a6b6e832d
SHA512afde675b2ce5288d2defbd634f529b93fbef4fa3d4eb5e9a2ecbdf8d0f1380587b8d2f47f0a812c6b39c22c44283d0c943fbb5f73493534ca5a66563af3818b4
-
Filesize
223KB
MD52bdec36d0ad2f1359aef86fd425f8d27
SHA1d876a91b84d836d054a268cb2df74dd08f9ba0ba
SHA256395b6006d72d41721238f7f3c5a4de74ffc898a43a7cd0859edf0c2113fd6c28
SHA512a3d23628dde6073d77cb4f5af6ac3266bd2982855c6cb0ccf23d565f6d883b8fee7404a96a779bc9f65258181a1dc5fe15f7cc0d88800d6aa2f63799387a9eed