Analysis
-
max time kernel
300s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
21-03-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe
Resource
win10-20240221-en
General
-
Target
a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe
-
Size
208KB
-
MD5
9b10a29569abdddb99d729e07f51d62a
-
SHA1
c152b192772a1fdc2dcf17faf4319fb0173ce55d
-
SHA256
a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef
-
SHA512
237b5c3f390030d256cba7af05f8b4d45f0c7459127891a12d3a644b28df2da09109325e32457e83a1af93885abd75fc9da79bb4864157ebc15275f6673617b1
-
SSDEEP
3072:PMCZ3MKPMkeED9EqQvbMaOnrDN08QKuV9w1RBeg8+/yGYV:kCZ5MiD9EqQvZOG8QKOkRBeA
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
lumma
https://asleepfulltytarrtw.shop/api
https://resergvearyinitiani.shop/api
https://relevantvoicelesskw.shop/api
Signatures
-
Detect ZGRat V1 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe family_zgrat_v1 -
Glupteba payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/1676-79-0x0000000002DE0000-0x00000000036CB000-memory.dmp family_glupteba behavioral2/memory/1676-81-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1676-371-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1676-396-0x0000000002DE0000-0x00000000036CB000-memory.dmp family_glupteba behavioral2/memory/1676-413-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1676-425-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
Processes:
explorha.exeC217.exeexplorgu.exerandom.exeamadka.exeexplorha.exeexplorha.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C217.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amadka.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe -
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exeflow pid process 104 2064 rundll32.exe 106 4144 rundll32.exe 116 2184 rundll32.exe 120 3328 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3348 netsh.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorgu.exeexplorha.exeC217.exeexplorha.exeexplorha.exerandom.exeamadka.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C217.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C217.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe -
Deletes itself 1 IoCs
Processes:
pid process 3336 -
Executes dropped EXE 39 IoCs
Processes:
12C8.exe79FF.exeInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exeEasyAppns.exeapril.exeapril.tmpEasyApp.exeu3jw.0.exeB360.exeu3jw.1.exeC217.exe288c47bbc1871b439df19ff4df68f076.execsrss.exeinjector.exe5753.exe6667.exewindefender.exewindefender.exeJDAFHCGIJE.exeexplorgu.exeosminog.exegoldprimeldlldf.exerandom.exeamadka.exeexplorha.exefullwork.exeTeamFour.exealex1234.exeTraffic.exepropro.exeexplorha.exe987123.exeISetup3.exeu4bg.0.exeyoffens_crypted_EASY.exelumma2.exeu4bg.1.exeexplorha.exepid process 5028 12C8.exe 2200 79FF.exe 4604 InstallSetup_four.exe 1676 288c47bbc1871b439df19ff4df68f076.exe 3092 EasyAppns.exe 5092 april.exe 4688 april.tmp 4836 EasyApp.exe 4068 u3jw.0.exe 3652 B360.exe 776 u3jw.1.exe 4528 C217.exe 4808 288c47bbc1871b439df19ff4df68f076.exe 8 csrss.exe 1016 injector.exe 848 5753.exe 4608 6667.exe 3628 windefender.exe 4356 windefender.exe 4384 JDAFHCGIJE.exe 2636 explorgu.exe 2256 osminog.exe 1376 goldprimeldlldf.exe 648 random.exe 4716 amadka.exe 3320 explorha.exe 2588 fullwork.exe 2348 TeamFour.exe 784 alex1234.exe 5112 Traffic.exe 4696 propro.exe 4796 explorha.exe 5484 987123.exe 5596 ISetup3.exe 5688 u4bg.0.exe 5856 yoffens_crypted_EASY.exe 6048 lumma2.exe 5640 u4bg.1.exe 4548 explorha.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
explorha.exeC217.exeexplorgu.exerandom.exeamadka.exeexplorha.exeexplorha.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Wine C217.exe Key opened \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Wine amadka.exe Key opened \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Wine explorha.exe -
Loads dropped DLL 10 IoCs
Processes:
regsvr32.exeapril.tmpu3jw.0.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exepid process 1020 regsvr32.exe 4688 april.tmp 4068 u3jw.0.exe 4068 u3jw.0.exe 2416 rundll32.exe 2064 rundll32.exe 4144 rundll32.exe 3012 rundll32.exe 2184 rundll32.exe 3328 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Windows\windefender.exe upx -
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.execsrss.exeJDAFHCGIJE.exeexplorgu.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JDAFHCGIJE.exe" JDAFHCGIJE.exe Set value (str) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Microsoft\Windows\CurrentVersion\Run\random.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000873001\\random.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Microsoft\Windows\CurrentVersion\Run\amadka.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000875001\\amadka.exe" explorgu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
6667.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 6667.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
C217.exeexplorgu.exeamadka.exeexplorha.exeexplorha.exeexplorha.exepid process 4528 C217.exe 2636 explorgu.exe 4716 amadka.exe 3320 explorha.exe 4796 explorha.exe 4548 explorha.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
5753.exeosminog.exegoldprimeldlldf.exefullwork.exealex1234.exelumma2.exedescription pid process target process PID 848 set thread context of 1048 848 5753.exe BitLockerToGo.exe PID 2256 set thread context of 1572 2256 osminog.exe RegAsm.exe PID 1376 set thread context of 4144 1376 goldprimeldlldf.exe RegAsm.exe PID 2588 set thread context of 3668 2588 fullwork.exe RegAsm.exe PID 784 set thread context of 4080 784 alex1234.exe RegAsm.exe PID 6048 set thread context of 6132 6048 lumma2.exe RegAsm.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe -
Drops file in Windows directory 6 IoCs
Processes:
C217.exe288c47bbc1871b439df19ff4df68f076.execsrss.exeamadka.exedescription ioc process File created C:\Windows\Tasks\explorgu.job C217.exe File opened for modification C:\Windows\rss 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\rss\csrss.exe 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\explorha.job amadka.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1648 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 700 4836 WerFault.exe EasyApp.exe 4392 3652 WerFault.exe B360.exe 2420 3652 WerFault.exe B360.exe 648 1048 WerFault.exe BitLockerToGo.exe 4296 1572 WerFault.exe RegAsm.exe 2508 3668 WerFault.exe RegAsm.exe 1108 6132 WerFault.exe RegAsm.exe -
Checks SCSI registry key(s) 3 TTPs 15 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
12C8.exeu3jw.1.exe987123.exea550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exeu4bg.1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 12C8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3jw.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 12C8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u4bg.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 12C8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u4bg.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u4bg.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3jw.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3jw.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u3jw.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u3jw.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u3jw.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4756 schtasks.exe 1576 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exewindefender.exe288c47bbc1871b439df19ff4df68f076.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exenetsh.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-661 = "Cen. Australia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-722 = "Central Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-771 = "Montevideo Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2791 = "Novosibirsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-371 = "Jerusalem Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-122 = "SA Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-372 = "Jerusalem Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-32 = "Mid-Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1472 = "Magadan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM netsh.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace netsh.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance -
Processes:
propro.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 propro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 propro.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exepid process 4556 a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe 4556 a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3336 -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe12C8.exe987123.exepid process 4556 a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe 5028 12C8.exe 5484 987123.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exe288c47bbc1871b439df19ff4df68f076.exepowershell.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeDebugPrivilege 3628 powershell.exe Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeDebugPrivilege 1676 288c47bbc1871b439df19ff4df68f076.exe Token: SeImpersonatePrivilege 1676 288c47bbc1871b439df19ff4df68f076.exe Token: SeDebugPrivilege 4780 powershell.exe Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeDebugPrivilege 2496 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeDebugPrivilege 4136 powershell.exe Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeDebugPrivilege 2184 powershell.exe Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeDebugPrivilege 3352 powershell.exe Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 -
Suspicious use of FindShellTrayWindow 14 IoCs
Processes:
u3jw.1.exeu4bg.1.exepid process 776 u3jw.1.exe 776 u3jw.1.exe 776 u3jw.1.exe 776 u3jw.1.exe 776 u3jw.1.exe 776 u3jw.1.exe 776 u3jw.1.exe 5640 u4bg.1.exe 5640 u4bg.1.exe 5640 u4bg.1.exe 5640 u4bg.1.exe 5640 u4bg.1.exe 5640 u4bg.1.exe 5640 u4bg.1.exe -
Suspicious use of SendNotifyMessage 14 IoCs
Processes:
u3jw.1.exeu4bg.1.exepid process 776 u3jw.1.exe 776 u3jw.1.exe 776 u3jw.1.exe 776 u3jw.1.exe 776 u3jw.1.exe 776 u3jw.1.exe 776 u3jw.1.exe 5640 u4bg.1.exe 5640 u4bg.1.exe 5640 u4bg.1.exe 5640 u4bg.1.exe 5640 u4bg.1.exe 5640 u4bg.1.exe 5640 u4bg.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exe79FF.exeapril.exeEasyAppns.exeInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exe288c47bbc1871b439df19ff4df68f076.exeu3jw.1.execmd.execsrss.exedescription pid process target process PID 3336 wrote to memory of 5028 3336 12C8.exe PID 3336 wrote to memory of 5028 3336 12C8.exe PID 3336 wrote to memory of 5028 3336 12C8.exe PID 3336 wrote to memory of 4212 3336 regsvr32.exe PID 3336 wrote to memory of 4212 3336 regsvr32.exe PID 4212 wrote to memory of 1020 4212 regsvr32.exe regsvr32.exe PID 4212 wrote to memory of 1020 4212 regsvr32.exe regsvr32.exe PID 4212 wrote to memory of 1020 4212 regsvr32.exe regsvr32.exe PID 3336 wrote to memory of 2200 3336 79FF.exe PID 3336 wrote to memory of 2200 3336 79FF.exe PID 3336 wrote to memory of 2200 3336 79FF.exe PID 2200 wrote to memory of 4604 2200 79FF.exe InstallSetup_four.exe PID 2200 wrote to memory of 4604 2200 79FF.exe InstallSetup_four.exe PID 2200 wrote to memory of 4604 2200 79FF.exe InstallSetup_four.exe PID 2200 wrote to memory of 1676 2200 79FF.exe 288c47bbc1871b439df19ff4df68f076.exe PID 2200 wrote to memory of 1676 2200 79FF.exe 288c47bbc1871b439df19ff4df68f076.exe PID 2200 wrote to memory of 1676 2200 79FF.exe 288c47bbc1871b439df19ff4df68f076.exe PID 2200 wrote to memory of 3092 2200 79FF.exe EasyAppns.exe PID 2200 wrote to memory of 3092 2200 79FF.exe EasyAppns.exe PID 2200 wrote to memory of 3092 2200 79FF.exe EasyAppns.exe PID 2200 wrote to memory of 5092 2200 79FF.exe april.exe PID 2200 wrote to memory of 5092 2200 79FF.exe april.exe PID 2200 wrote to memory of 5092 2200 79FF.exe april.exe PID 5092 wrote to memory of 4688 5092 april.exe april.tmp PID 5092 wrote to memory of 4688 5092 april.exe april.tmp PID 5092 wrote to memory of 4688 5092 april.exe april.tmp PID 3092 wrote to memory of 4836 3092 EasyAppns.exe EasyApp.exe PID 3092 wrote to memory of 4836 3092 EasyAppns.exe EasyApp.exe PID 3092 wrote to memory of 4836 3092 EasyAppns.exe EasyApp.exe PID 4604 wrote to memory of 4068 4604 InstallSetup_four.exe u3jw.0.exe PID 4604 wrote to memory of 4068 4604 InstallSetup_four.exe u3jw.0.exe PID 4604 wrote to memory of 4068 4604 InstallSetup_four.exe u3jw.0.exe PID 3336 wrote to memory of 3652 3336 B360.exe PID 3336 wrote to memory of 3652 3336 B360.exe PID 3336 wrote to memory of 3652 3336 B360.exe PID 4604 wrote to memory of 776 4604 InstallSetup_four.exe u3jw.1.exe PID 4604 wrote to memory of 776 4604 InstallSetup_four.exe u3jw.1.exe PID 4604 wrote to memory of 776 4604 InstallSetup_four.exe u3jw.1.exe PID 3336 wrote to memory of 4528 3336 C217.exe PID 3336 wrote to memory of 4528 3336 C217.exe PID 3336 wrote to memory of 4528 3336 C217.exe PID 1676 wrote to memory of 3628 1676 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 1676 wrote to memory of 3628 1676 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 1676 wrote to memory of 3628 1676 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 4808 wrote to memory of 4780 4808 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 4808 wrote to memory of 4780 4808 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 4808 wrote to memory of 4780 4808 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 776 wrote to memory of 2496 776 u3jw.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 776 wrote to memory of 2496 776 u3jw.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 4808 wrote to memory of 2984 4808 288c47bbc1871b439df19ff4df68f076.exe cmd.exe PID 4808 wrote to memory of 2984 4808 288c47bbc1871b439df19ff4df68f076.exe cmd.exe PID 2984 wrote to memory of 3348 2984 cmd.exe netsh.exe PID 2984 wrote to memory of 3348 2984 cmd.exe netsh.exe PID 4808 wrote to memory of 4136 4808 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 4808 wrote to memory of 4136 4808 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 4808 wrote to memory of 4136 4808 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 4808 wrote to memory of 2184 4808 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 4808 wrote to memory of 2184 4808 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 4808 wrote to memory of 2184 4808 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 4808 wrote to memory of 8 4808 288c47bbc1871b439df19ff4df68f076.exe csrss.exe PID 4808 wrote to memory of 8 4808 288c47bbc1871b439df19ff4df68f076.exe csrss.exe PID 4808 wrote to memory of 8 4808 288c47bbc1871b439df19ff4df68f076.exe csrss.exe PID 8 wrote to memory of 3352 8 csrss.exe powershell.exe PID 8 wrote to memory of 3352 8 csrss.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe"C:\Users\Admin\AppData\Local\Temp\a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4556
-
C:\Users\Admin\AppData\Local\Temp\12C8.exeC:\Users\Admin\AppData\Local\Temp\12C8.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5028
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\22B7.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\22B7.dll2⤵
- Loads dropped DLL
PID:1020
-
-
C:\Users\Admin\AppData\Local\Temp\79FF.exeC:\Users\Admin\AppData\Local\Temp\79FF.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\u3jw.0.exe"C:\Users\Admin\AppData\Local\Temp\u3jw.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:4068 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\JDAFHCGIJE.exe"4⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\JDAFHCGIJE.exe"C:\Users\Admin\AppData\Local\Temp\JDAFHCGIJE.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4384 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\JDAFHCGIJE.exe6⤵PID:3156
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:2508
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u3jw.1.exe"C:\Users\Admin\AppData\Local\Temp\u3jw.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD14⤵
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:3348
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4756
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:196
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4824
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:1016
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:1576
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:3628 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:1756
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:1648
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Public\Music\EasyApp.exe"C:\Users\Public\Music\EasyApp.exe"3⤵
- Executes dropped EXE
PID:4836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 9564⤵
- Program crash
PID:700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\april.exe"C:\Users\Admin\AppData\Local\Temp\april.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\is-D5V9M.tmp\april.tmp"C:\Users\Admin\AppData\Local\Temp\is-D5V9M.tmp\april.tmp" /SL5="$60116,1485356,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4688
-
-
-
C:\Users\Admin\AppData\Local\Temp\B360.exeC:\Users\Admin\AppData\Local\Temp\B360.exe1⤵
- Executes dropped EXE
PID:3652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 10162⤵
- Program crash
PID:2420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 10522⤵
- Program crash
PID:4392
-
-
C:\Users\Admin\AppData\Local\Temp\C217.exeC:\Users\Admin\AppData\Local\Temp\C217.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:4528
-
C:\Users\Admin\AppData\Local\Temp\5753.exeC:\Users\Admin\AppData\Local\Temp\5753.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:848 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵PID:1048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 5203⤵
- Program crash
PID:648
-
-
-
C:\Users\Admin\AppData\Local\Temp\6667.exeC:\Users\Admin\AppData\Local\Temp\6667.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:4608
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4356
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2256 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3000
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 11044⤵
- Program crash
PID:4296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4144
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:648
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
PID:2416 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2064 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\990815831200_Desktop.zip' -CompressionLevel Optimal4⤵PID:388
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4144
-
-
C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3320 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Loads dropped DLL
PID:3012 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2184 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵PID:2960
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\990815831200_Desktop.zip' -CompressionLevel Optimal6⤵PID:2668
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:3328
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1028
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 7924⤵
- Program crash
PID:2508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"2⤵
- Executes dropped EXE
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"2⤵PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4080
-
C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"4⤵
- Executes dropped EXE
PID:5112
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
PID:4696
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:5440
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:5552
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5484
-
-
C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe"C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe"2⤵
- Executes dropped EXE
PID:5596 -
C:\Users\Admin\AppData\Local\Temp\u4bg.0.exe"C:\Users\Admin\AppData\Local\Temp\u4bg.0.exe"3⤵
- Executes dropped EXE
PID:5688
-
-
C:\Users\Admin\AppData\Local\Temp\u4bg.1.exe"C:\Users\Admin\AppData\Local\Temp\u4bg.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5640
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe"C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe"2⤵
- Executes dropped EXE
PID:5856
-
-
C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe"C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:6132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6132 -s 8884⤵
- Program crash
PID:1108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4796
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
425B
MD5605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
Filesize
1.8MB
MD53c44bfe54c1233d8645cb87101be526d
SHA1dd7d94832980c162e5793dd27d2024e8aa1af18d
SHA256990d288499b6945af3246331757db918f78d9d94889b973836b1289fa6cd1123
SHA512c365a25e7c906458b960743a3221a632c0cf59d5b9bd73681444f1b6797973c1098953d50deaeee315f42aaa6949890cc281024e30258350f74a7959e2de80a3
-
Filesize
376KB
MD5ffbf529797c810f214c313592ea7b904
SHA18e3b76884b2fa9983276294519edeb38b4f26f85
SHA256ed09ed5ecd839b25c4810ba919abdaf03ba125981da555bf667022fb8af80459
SHA5120051f4072b7400984fa09ad1431c50fe1e69754aefc9f313acfc6669b0b703034c2994d4ef2b62190adbce067c8c970c2d9b26589e7219d6eb5e6e2bf7226744
-
Filesize
534KB
MD5a3f8b60a08da0f600cfce3bb600d5cb3
SHA1b00d7721767b717b3337b5c6dade4ebf2d56345e
SHA2560c608a9b1e70bf8b51a681a8390c8e4743501c45b84cf4d59727aba2fc33cadb
SHA51214f63e415133ca438d3c217d5fb3ecf0ad76e19969c54d356f46282230230f1b254fbfc8ae5f78809dc189a9648be2dc1398927b3f089c525cd1105a3843f60d
-
Filesize
464KB
MD5c084d6f6ba40534fbfc5a64b21ef99ab
SHA10b4a17da83c0a8abbc8fab321931d5447b32b720
SHA256afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624
SHA512a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1
-
Filesize
2.9MB
MD5aafc00662f8c68cbd45a08c885a2d6fc
SHA1bd1f70f190579debb213bf3022a304c0d9ce6a9f
SHA2568003cded35a962784da90078ec690fa1a6ee9d565d1d9da457811e292745d955
SHA51220a61dbfa4ab76de740fea6d976e3ff3f48f7b2649dbe10c2f545c0c45a272652b951c6e7ca5a9d31a90ac157498a2368f0f0b72657348d23614d75da4207774
-
Filesize
1.8MB
MD5444532fcd858195a7e6e08dc42d9b119
SHA1d6648434771b3072314ae6f170a771f0f1e9408d
SHA2563c0f5360b66ae1e40769081558167c5dbc9cd849998c1cc49d921a74acd610d1
SHA5124f39c26eba4edfa95129f11ab43e38d54a259955b353788d57e820986fbe5fddf84f5e43436e5e1a99bfdb75898aa2f977d77a48cd6bf6e153feb2cecc5f89b2
-
Filesize
685KB
MD50f8158981e75faa223828539fef97d5d
SHA1d1a197895d2e0532bbb1b53895c6c58e04e7d3ba
SHA256f9771bafaee88bdc68ecece1e0002da5098771a6f22935764c6d21b8f0ca9082
SHA51220dae7c7daaf0492bdfa590a10b5e1c45da719ce4f575a411d8464bc0503560bf7c6ac0641f7a8e5509ce04aee20353dd1255e93142c9adee1114fffc2fce1c4
-
Filesize
451KB
MD5b2b60c50903a73efffcb4e33ce49238f
SHA19b6f27fc410748ae1570978d7a6aba95a1041eea
SHA25629d409af265261b204f6eeeedb5e9bb1f7a829b723a5d1d78384066744bddbe1
SHA5122c66a1615de77157f57c662de2e3ec97deb8cb6aadc0a03ff0acc3b269affd5ae0d50dfef85939ca9c1a8c6d47ff915061157e7da92dc286cb6ddd9b06a88126
-
Filesize
541KB
MD53b069f3dd741e4360f26cb27cb10320a
SHA16a9503aaf1e297f2696482ddf1bd4605a8710101
SHA256f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e
SHA512bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9
-
Filesize
1.7MB
MD585a15f080b09acace350ab30460c8996
SHA13fc515e60e4cfa5b3321f04a96c7fb463e4b9d02
SHA2563a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b
SHA512ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f
-
Filesize
231KB
MD57381ea960bed2021a7761d78049d038b
SHA19ab316797a88ddfe7d95a0e74801b5e1851ff640
SHA25639020badb933ada4d9889ed670aec8831b759047e245583029cabe1d309ea1ed
SHA51252cfe3fc7e104ae7d5057c47e4487402a8cbf152cbb19b2c36a0f2f935a421cf8f7a128d9a61d49ad200166a377f648db121f5a33517ebaeb2510251b690b27c
-
Filesize
410KB
MD5c2d63badae88b87da297268bf006b8a3
SHA1b7983a8b1d5d438a80e401f5bc073aff8701735c
SHA256db2589bbaa7edfece7d4bb233231b3cdeaa88ede4b1f34689adbfa35ca70de1d
SHA512f1b9bec97e887f6eb9819ad61f99013cf77ced5570a51276ca90406675f5ae1458235b079ad5eeaed67fbf5be5177cc12508abe6f32455465d23ea2943c5fa20
-
Filesize
832KB
MD5e3c0b0533534c6517afc94790d7b760c
SHA14de96db92debb740d007422089bed0bcddf0e974
SHA256198edf9613054f8a569ac804bf23081fbfa8566270fff05bba9dc3c9a32d9952
SHA512d12631796afca877c710b9308d1236fca1bfe3abe6582445d9df1bbb404160cff220316e3f600b3a87b46dd3bfb859734008b5c668e410466e82be9dc033249e
-
Filesize
322KB
MD53c30dbf2e7d57fdb7babdf49b87d8b31
SHA133e72f2e8e6b93a2ecffccba64650bda87e08e0d
SHA2568d2c29f6d94f4375450e54b8d9fcd645beb7642d4240a4137e7c8539a57040d2
SHA512c48c83d1d9d459720bea88aa7fb56c13d886fff9ab65deb0ace750d7d35a7b61c66b5d697e506ec152534d788f1641c51bcba38610ae66a6a8e08b0dabdc7657
-
Filesize
232KB
MD5c8eac1d34e880b19859663677cf6f469
SHA14a20b4a61b2172f675e5047b2ce82cc1cc9e7150
SHA25647a23c0c61f2de27199085bde6f0d2f9b891e890d0e0ca9f7b37505ae7a0d69a
SHA512bb42f71f910dab8dfe9f5c769a078bc48bc4d93fb301ee820bdbe37dea1916ac7828671a8f5b356697f154a6e6174da9fdc8c248d1149088e2763a1ff3d7acd2
-
Filesize
2.2MB
MD5e69125300a060d1eb870d352de33e4c3
SHA160f2c2e6f2a4289a05b5c6212cdaf0d02dad82ea
SHA256009de0571eb77c7ed594b9e5cda731e2953fd2198e00b25a0e2c4c4ef7414355
SHA512257d3b61b2c85c1e71d2a80a5fbf44436e9734785fe6b0a643c1939dd01c1d8b98f1c454695296f7137ff035ec6c0118f053e4833e0be91618f2a9066a8cace9
-
Filesize
381KB
MD5b68bfe1a45f82c30690d06f0376a197b
SHA127b90e1cbe558348d8802718df46d00cdc613a49
SHA256eb45b78e6cd6f67a3701efc7de6088489da9688c9b9fcdaa6ddaa3f8a71ee7e6
SHA512ae739395c98abadcdee2c201f37419076f8ae66636df3b54dddb30f41bbb58ad6c1acc997bfc6d3033812d229c1ec0d8b2511569ffbc3578ba208e2864e9b59c
-
Filesize
529KB
MD575949a76fffb8c514035093615772f79
SHA19bca8d4580649aa8e507f06174801d479adc9139
SHA25606118be050fa5918ae3ef608285aa3198b325e3b8873c3894f69e9656208e621
SHA5121c58b90795960a0d30a0a77d98f02bd5bd2483e2083b52f9f9b1babecf28b4f5f8526f69e9ee60ae581c8f2435cc7625085fcdf02255b2d9bacaaef29ccc20ab
-
Filesize
3.4MB
MD55ceb157f2a5eb0d0312a2b20b8a6f1f9
SHA103f804c850bceb648e4498a9a4505c97e840ea8d
SHA256f65434f2bc8fe3b975c53d11539a05d03d5fbb78502578d2bfb7a2d26ca7d317
SHA51296dc77d3b1c17b9fda41c722d526e142d4cd759436e890e8edbad69c6e33461f11e7c5d6f6e8a124b8014480de1fbe6c97ed64c45a7c41828af9d1e1e1c6d202
-
Filesize
7.4MB
MD579c85b9357c54c35202ba7e73e28db3f
SHA10edb3fee7862e3b69210526ac57308886842cd24
SHA2562522dd6f9c5d2b2db495c5a250e74617b5598c7e9f61ee9c3af2d35a26dbe639
SHA512f2a3cafb6de933bbdfe68beff92b865f00bceed4542e44bebcfe9bb8b145b401497c4dbd3eb6e19cb2a155f26880eef4a14fa033c09ff080f6e735c4acd2726e
-
Filesize
7.2MB
MD5d53a59820956572f89766fe450fa53fc
SHA134bbbc8536eaa9cf4147b03a4efe4274f5e55c5d
SHA256e3622c1a1b6fc469921e22bb2b16fb81753a29fd91e2d6bdc489c7bfb234e002
SHA512305670c01296123696dacd38ee6430c077395eaf9328b9cc555a563f08f0648c0ae3f1fb4a155d381ff943989d9ef85d560edf80bbf0dd83c03ea836807ae3d9
-
Filesize
1.1MB
MD5679e0c9d77c16f8529e6a08486c3a9c1
SHA18e74ee4ac19b5653981a1d8378aeda9e6fc1b009
SHA256585e21bcd0f3c05c51f4aa74f554e0a648370facb8b90134680c2e49b5fc272e
SHA51254195de01cdbf53812f172931d66ff8ee510f78ac972737c71a57fbae1a3b8b7a295347bba81ff38fa0ab934eb4cb60c90e267acdd512ec1b9e90831db454acc
-
Filesize
2.0MB
MD5f9c778d8fd1d3db939959915dfa0defc
SHA18ca357c69a06db71b2e7b28ce89ba76bbc749cab
SHA256a0eae0e1dccb94e0238f9fcc92f98c0079b13adf2513380550097b3b652a3d14
SHA512f0ff30e613ec8db119f8caf08659cd76dcc652bf714d7e2089f576a776ccd2c98dff60c4f63d987e5455f0c9375a1d014abef4e612d0f02dc415c94fdf2029ed
-
Filesize
2.1MB
MD5efac337a01b088461ab1899914935783
SHA1e631afacca89ef16262a4a73829f25353e874789
SHA2569d5cd40a68f05169ad6b118d491f154178a394c686d2f361cc9f2059b77f9dee
SHA5123d5475769711d09fc2e869e5a805c91baf55652ce83ce93062b5ba1e22fd06943363a715dcc9502f3d01a97436e1db021012e07f5c28cb0c44e4f9164dd49e47
-
Filesize
339KB
MD50212dfcb813b2cf81269a8acc2e5905f
SHA17cb15e5fb1cd0db852d3784ca282ded359780c53
SHA25641ce9bd283dcaed4b69c0f28251bdd2e845049ae445081196ae3679ff0d1888a
SHA5127205e5f50b538ba592f31ebff27f70ce1eed2d4c6c6c40e24ea1da2770e55eae2d5c88d7a172d9663c24886961bcebf064a9a3d9ae98130dda10dcaf72573646
-
Filesize
195KB
MD545228044b6834706f06b764429030f26
SHA1a04a507206a5e54450ff4d6c754d799eca52aa9d
SHA256cfeac65052d810a1ea2d1801598b44b6b3daa0a90db99849a580842fa4802fb9
SHA512ae2e6c9cc729a9a0d7a72b4133d1b53f9a56cd44998ed07b55b64f9c5b2d32f9a77ad1311b129740a73f81ae3a5f61f1f3ce8b6c643bbe3f3039533fc69dad92
-
Filesize
436KB
MD597ba50a349c34c586218c4d257a274ab
SHA111d9354dc41d4c19d3a65fae148fb7b3491e9abd
SHA256308c3b21cde74d72bf47e874c9493b8834d2346a75521546c9baaf59d917f107
SHA5121fb8e8183bdb3c3a5e7ac57e3ac32422514c6aa570ac249605650f1bc5fa2ee80f7c72b57bb6a090ec2c1944b87be40c7d1c38d967c136cef0bebdb74bb26495
-
Filesize
531KB
MD56a07ea74fd8becdd3c026331fd953793
SHA1ac2300bbca961e2f51ac9a04f50713fca2d4893c
SHA256cfe31120ac5ae138578330999820a53d14ce19a8e45b229d1482b46e85502c01
SHA51256317988ed8561e48e7fe0302a433f4d7afc981d3e445bad9a97b2aa256d16cddd0d83061b387fa301976053229d6b28aa667d84a2411b16a483365a5abd64cb
-
Filesize
293KB
MD59e489b76a54ec9cc14b1bf6a63b64896
SHA1c9dea0901839c9e7b303f5c69b1d194d743b50d6
SHA256ac79b651217d6fa136eaf23e5961a4fd8c829933d1a814a5276a83d365393142
SHA512e0ab19ca02289ad2d48ee022bb0504075863f86e6cc2bd0f1d5e990b90b108cf1857f7da3a0c9eb5d553ce369f8df10ad6dad0c4ec6b608edc7212f1aeabf995
-
Filesize
22KB
MD58cf2dc677f5afe2dda3cdc3be61f07fe
SHA1d8f55327641af3cd3be072aa12684e0946f08e57
SHA256ae718054d80935ea3f44aacba922b2bf57ab86ff38550e194d1c1f4c683c7050
SHA512a41530763eff4a520191b0ea762c2cb18b469385f198276950002959efb3a697c4612beb1844ec30aa6ae1399bc39671d49775908f9101ae9f93e1af301494ec
-
Filesize
404KB
MD5383c48c7f64a6867db5b8577fa3abfbf
SHA1926911f9581df56f5ac38fac01f6d45acdfb7dbd
SHA2569b37a304f33bda4707c0dae60a20ac7c76c75752b0d06ad9fb2d6f07f8edd1b9
SHA51253b5d42ed93ad6f1163ed00be8cd1b66d367fadf25853c16d8c6fb710f69d9e8a32cb85d0dbf36d95c85da16b214de2a564bc0750c264bb0547dd8910a6f4442
-
Filesize
101KB
MD542b838cf8bdf67400525e128d917f6e0
SHA1a578f6faec738912dba8c41e7abe1502c46d0cae
SHA2560e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d
SHA512f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
517KB
MD51066a4a1534ef04cc843024da222e005
SHA129cad362b8201716de169e101e01da8e04bd85e2
SHA25678d95f9184bb7bdf0c1fe1a33a5600cc7adcf57f88ad0c947582f877dc18b71a
SHA5123f70c1fbac7c37e786f0306e4ed8e5f41e252aa71d4902b784ce7373aed4fa112abfdf65de8148dfa97de38447924869202389a2b0533f770cc51e1ab92dc706
-
Filesize
234KB
MD5b1e038bc5fa9bec9c5f8fe88878653d1
SHA111ebfc04a44f617f70235d6b4182b44da99d12ba
SHA2564cda132c93c770d464b417656da0f988a30a8557654532b893681d5b3636740c
SHA5121badccc94009caa6d4484a246257d667f615d50f1561a644ae58b9e187b3092ccb81fa45c8f69938cef038a43d1e6bcb858a61dfc0ce2c937072e5b266adfe28
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
4KB
MD5a11bbc7b2af3bcd6d4bffd9286466a2f
SHA139b4385ee6cf80c24a94cd9df5205ce85ea4ecc8
SHA25651459cf875f08f2b6cb30af4afcc3a825adb4b1528579e9cbe46e4f6f6b03710
SHA5126d549e1b4b724411b523df89a3fde8261b44aa4202e4c4eb36b18ee503c3a149dbfb0e2d9e3507c9668e95e801239c2c078bf86ebf85edab551a4a5f837192b7
-
Filesize
2KB
MD54760f0753f35b01abe92123deccae075
SHA1a042f75cdb481286e534a93b6697c9e27bb3972e
SHA256d310382ab6faed375126e81459cee16a091009a2619d4ab976c81165a00ea827
SHA5124e821a67b410b7ff344d928877c37158f2c9c6bd5afeaf515ec40e8bc75f277ea0ede32fc6b45efefe25762a5913580d729ca473e9be480e3cba7463a4ed5495
-
Filesize
3KB
MD5f85dcdd6cf746199a83000909e46d6c4
SHA103184110428e45d17d3e3d07f75e8fb9afeaea2b
SHA2562e7990046b34907c6a60f150d002e9a090d3931b4259aac83b4cb950530a2328
SHA512b536367b1d2678d06d07e129e23af31f120923bf8e95a505cf8490fccb947b0a8657d51506722f7b8587c0767f69c2c7e0aef18611276fb9f774cfc0747642d0
-
Filesize
408KB
MD578114a6bfe98e8d5838f4ee1cc3f5e5c
SHA17c153f47f72149f5d6ba1b14d82512587f750bce
SHA256ae17bdadd8de5436aca845251f28e702e1ea1334bd71af5e3a08fab44113ed45
SHA5123dd3d5dc012093d53370132e4547e0100ecabcd804b18939f001b4fc888dd6bab52ec3adcbd678910ca937b7b8f6cad4149acfb7263996c8b6e64094b3642b6d
-
Filesize
272KB
MD55042bb532ef5344d693f6ef470711351
SHA1af255e8e0f24dc53148df2fdfa5780993b9de34a
SHA256bda97300f120b5f32457171f676b52112ec1e0f80c7556bd6f50fd79b0ad59ab
SHA51202a1aadc1949267fe32023fce99288b9d0595cd8032cd1748c580a0b6b8ccea875765ec256a108342bb2ddd19b6babefcc8742f90afb529075fb448ff3cb96a4
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
261KB
MD5606625739201aa74813d211613b2aa82
SHA14409efa953358e31d940d698470bd0e2d952e8a7
SHA256848e37628e8301c0845cab2eab491e49995db81fec86dec3841af2fc6ee584e2
SHA512d6c1dff70bec93e54a1fa4dc420a2e1ca78955d9b5e1f25324732cb55dbe79642a949d5ffe7218d3b9e6534287f9924286d0eaa765cfd73b5f52f84924ef99f1
-
Filesize
739KB
MD5de004238b63ab3591c78817ecacac368
SHA15c9c2e8e418976fc4088904cf755771659ff1035
SHA256890e308908d39683493b11830ee4b163b9b438aba3ecf2bdb625d05fd8326af1
SHA51290e9f1b70d2f369dc5d3bb645f8fa6adca8bc8ea1094bc1571573b037c73bb5ecdf144582eeaf064349e20ec1195851533a095ceedf276bbfc6df1dfe1cf4db0
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
91KB
MD532723fc0026273b8a0af92bcb8bd95eb
SHA19fdd1a11248b489b7a727f7f734dec9df30ed744
SHA2565263ac3a8fab70a3e814b09d33d180386e343c14a786782e084e03581bc483e7
SHA5123771cba8fa9d599a53eb96271110726ec8a7b0c44a1983128fff9826df67efc43d3333e4e62f905800a61ca2b080dbde9eba14e80302711894ba62802efae8fb
-
Filesize
55KB
MD58a77848d10389f444cf7ca480d123fd7
SHA151855cc8e24b22a159e61b77d4e5091168848d86
SHA256e8ab77433d6ba70f6e992adfbd1f3865839f112e303de1f175bb1eca26dffc1b
SHA512af963dc198aacb17e859fbd55a4371e7f15581eff5e5324814e40423ec3e1ac22e547caa35fb5e5957bc04bbc26e107e503c0adb7b10dcc3697287f11d3b98ca
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD51259baeb38860de9407751647e5104fd
SHA1bfc0ffe7f18ac116370fc78b555e4bfb2af8ca43
SHA2565c932f1a51090a94869b2e74afc3e61688346ab96d22a92785e0f62998cd7de0
SHA51287bc2322a3e16717e186aab6d51a8006587ce983b860ffbbeb62ee193393abd7ce8d69083207e7d781658ac62eb0e06624aee5d07b4065410c90d3d0ae7f6c9b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD55f8b61b5fe42e4d7a9987a729dc4b1c8
SHA105133530cce2c79dd1d6fe469a42d52a0fbe2912
SHA25613e332324b8023405f1863a936a3fffc1b6f261e118d67f0b1b9f2b3a07aaf7a
SHA512b9461829d7d54ca7244b46e0fdbe7e8a8b9d60f030333f7a2df4e9b6e7ef5f39e5cd1a67822e0bc997fa7a18fe21b45fde9a810c7f1e28419a2431f00b2a33ff
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5f422d18c0c01666b21377e86e5518b8c
SHA19741d34da6a9d3384b8da0978112abf9d439633f
SHA256a2edc8e7a786ebee2df3a1f9fd6c55688f1f897d7526af1c72d65cefab6b9a6f
SHA51250015945a34e63160fd93208a6c3e13c7da5d5c7ddb283cadf74ee545e354f99f2d308aa98abba9e320318973a25f9f639f93f9c31f581e78b32d1265a1cdbdb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD54cb731db45a8ae00e25258113d8908aa
SHA1323d0ead8dfee0aaaf818180899ed520c8cb57d7
SHA256ca932566c6f04fc83b4318ca6ec53978586058f3e99c53bae75f172c6fdd28d0
SHA512aa116cd2323e46f93e6463316d4b8e8645d306e7c7714c4bf394c2fb6fdf5975debb886ef2414fb07caba39c9fac016b529ef2dfd9b4a76e01349ae4d51c23be
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5d6e3984ac51d32367f2ee0e44183afb5
SHA1592bc36c0746344d3b21296231d04e5a19c7d4d5
SHA25658f24e356069ab66923d6a5d6dd1150c2b144216c485c9ef8da00f1c24939fb0
SHA51249359e419ae852ce4d6441387ec0f3021cbf0004734353e845b1a8c6c8bb5b2d0082104098a58f062fbed4e7692e82d6929debcb0e0f74c8da66e7292936c71c
-
Filesize
4.1MB
MD5c8564b4d627953e836d0faab99740a6a
SHA174b37a34950bd081d10072b4dae88952a4c52178
SHA256051b0fe6b1d01ab0cc4dee0e7270b4dd54040a5c1783b78ea612bbf37d0c6f31
SHA51277af3dd58d16effa1a307c174add6cdd1006b2a08add287388162bb2b7b3245a77e15375da1e508bcce10f024ab0e888b16862f087941e7b165834e8ae406776
-
Filesize
3.9MB
MD591cf4e145d69de3ac673fd76f6b434bb
SHA1b2426f00fe14d3cb228f084882f9d455e973bb55
SHA25638eeb2ca66424e0edb4181ea41deef423eadd6188308e2de7a8a0e5d4299bf7b
SHA5123439f37c34c8fe25646289da6a5499dd4c3d849ff5e7f3824b912cbb5aff2dd743163944f5a8d76cbb9b48a5dabbed46ac8110309511293356387fcb03087688
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63