Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 06:37
Static task
static1
Behavioral task
behavioral1
Sample
8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe
Resource
win7-20240419-en
General
-
Target
8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe
-
Size
6.9MB
-
MD5
87825d66996c3910b2fbed3f5ab4a2ee
-
SHA1
a86aa5c25645488b3a3a9aafae4779e8f9362848
-
SHA256
8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287
-
SHA512
1b4bb50e745b4e296c056076daebcdfe3e59130f3a8b9991203a6449614fa34bad86e0af37d6f8c1e351ceea03f4acca318bb9ba861ea73f6724230fbf0a9ff8
-
SSDEEP
98304:Wws2ANnKXOaeOgmht8n5QBUqoDwkYRzddiHP6nIFriWp86fv0o8j49Z5/xP:kKXbeO7A8U2kQBdiHPtRT8o8sb59
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2144-21-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2144-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2104-46-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2104-43-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2104-49-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 6 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\259394749.txt family_gh0strat behavioral1/memory/2144-21-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2144-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2104-46-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2104-43-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2104-49-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatfor.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
R.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\259394749.txt" R.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatfor.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Executes dropped EXE 6 IoCs
Processes:
R.exeN.exeTXPlatfor.exeTXPlatfor.exeHD_8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exeRemote Data.exepid process 2292 R.exe 2144 N.exe 2756 TXPlatfor.exe 2104 TXPlatfor.exe 2752 HD_8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe 2424 Remote Data.exe -
Loads dropped DLL 8 IoCs
Processes:
8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exeR.exesvchost.exeTXPlatfor.exeRemote Data.exepid process 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe 2292 R.exe 2260 svchost.exe 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe 2756 TXPlatfor.exe 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe 2260 svchost.exe 2424 Remote Data.exe -
Processes:
resource yara_rule behavioral1/memory/2144-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2144-21-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2144-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2104-46-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2104-43-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2104-49-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
Processes:
R.exesvchost.exeN.exedescription ioc process File created C:\Windows\SysWOW64\259394749.txt R.exe File opened for modification C:\Windows\SysWOW64\ini.ini R.exe File created C:\Windows\SysWOW64\Remote Data.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remote Data.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52CC66E1-1A61-11EF-8004-DAAF2542C58D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603d2d286eaeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422780945" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000e25426ca9e464a7c60a98483db48d9ea8654c315b76f0fd0ae3ad492712f707f000000000e8000000002000020000000f841b350dd9868fa75466a428644e4ee4c94937419cf16c954378d75a3c576e52000000020283642642c8254c4743a1159413f9892551450a48973b66ca8976f4919915d40000000fcefef9486dd5f026448d176d56f88b86e0fabc45aa62ec4c25f914a155e219a357b54437b2393614d722b02592116ab9036cb3ac29e5fbd2743ae2cd7a18ef1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exepid process 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatfor.exepid process 2104 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
N.exeTXPlatfor.exedescription pid process Token: SeIncBasePriorityPrivilege 2144 N.exe Token: SeLoadDriverPrivilege 2104 TXPlatfor.exe Token: 33 2104 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2104 TXPlatfor.exe Token: 33 2104 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2104 TXPlatfor.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exeiexplore.exeIEXPLORE.EXEpid process 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe 2712 iexplore.exe 2712 iexplore.exe 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exeN.exeTXPlatfor.execmd.exesvchost.exeHD_8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exeiexplore.exedescription pid process target process PID 2288 wrote to memory of 2292 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe R.exe PID 2288 wrote to memory of 2292 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe R.exe PID 2288 wrote to memory of 2292 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe R.exe PID 2288 wrote to memory of 2292 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe R.exe PID 2288 wrote to memory of 2144 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe N.exe PID 2288 wrote to memory of 2144 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe N.exe PID 2288 wrote to memory of 2144 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe N.exe PID 2288 wrote to memory of 2144 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe N.exe PID 2288 wrote to memory of 2144 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe N.exe PID 2288 wrote to memory of 2144 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe N.exe PID 2288 wrote to memory of 2144 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe N.exe PID 2144 wrote to memory of 2668 2144 N.exe cmd.exe PID 2144 wrote to memory of 2668 2144 N.exe cmd.exe PID 2144 wrote to memory of 2668 2144 N.exe cmd.exe PID 2144 wrote to memory of 2668 2144 N.exe cmd.exe PID 2756 wrote to memory of 2104 2756 TXPlatfor.exe TXPlatfor.exe PID 2756 wrote to memory of 2104 2756 TXPlatfor.exe TXPlatfor.exe PID 2756 wrote to memory of 2104 2756 TXPlatfor.exe TXPlatfor.exe PID 2756 wrote to memory of 2104 2756 TXPlatfor.exe TXPlatfor.exe PID 2756 wrote to memory of 2104 2756 TXPlatfor.exe TXPlatfor.exe PID 2756 wrote to memory of 2104 2756 TXPlatfor.exe TXPlatfor.exe PID 2756 wrote to memory of 2104 2756 TXPlatfor.exe TXPlatfor.exe PID 2288 wrote to memory of 2752 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe HD_8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe PID 2288 wrote to memory of 2752 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe HD_8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe PID 2288 wrote to memory of 2752 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe HD_8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe PID 2288 wrote to memory of 2752 2288 8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe HD_8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe PID 2668 wrote to memory of 2552 2668 cmd.exe PING.EXE PID 2668 wrote to memory of 2552 2668 cmd.exe PING.EXE PID 2668 wrote to memory of 2552 2668 cmd.exe PING.EXE PID 2668 wrote to memory of 2552 2668 cmd.exe PING.EXE PID 2260 wrote to memory of 2424 2260 svchost.exe Remote Data.exe PID 2260 wrote to memory of 2424 2260 svchost.exe Remote Data.exe PID 2260 wrote to memory of 2424 2260 svchost.exe Remote Data.exe PID 2260 wrote to memory of 2424 2260 svchost.exe Remote Data.exe PID 2752 wrote to memory of 2712 2752 HD_8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe iexplore.exe PID 2752 wrote to memory of 2712 2752 HD_8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe iexplore.exe PID 2752 wrote to memory of 2712 2752 HD_8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe iexplore.exe PID 2752 wrote to memory of 2712 2752 HD_8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe iexplore.exe PID 2712 wrote to memory of 1996 2712 iexplore.exe IEXPLORE.EXE PID 2712 wrote to memory of 1996 2712 iexplore.exe IEXPLORE.EXE PID 2712 wrote to memory of 1996 2712 iexplore.exe IEXPLORE.EXE PID 2712 wrote to memory of 1996 2712 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe"C:\Users\Admin\AppData\Local\Temp\8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exeC:\Users\Admin\AppData\Local\Temp\HD_8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/download-jdk/microsoft-jdk-17-windows-x64.msi3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1996
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵PID:1256
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\Remote Data.exe"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\259394749.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2424
-
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7b3c98b4f4745c77289d2c0ffdc5c95
SHA16203be2e429a19ab3671ba842ca2c67ac75dd3b3
SHA2560d3b282b568e665b166b62a727a341446bb45750951ca24648d820de51962ec8
SHA512354f6d8a2622eba5f1edad951d2b7e55b3fa66b4af257094bcd173c86a5fe4c0cdc2b0475991f06dfde244d0461def2a5e3337051ba7175d19bc67502d2121d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fd5f2799094c3f96a650f6a7209984e
SHA171f3b236d777832dc98e8b73162945b680dcc7fd
SHA2562075a1dcc1fcc2a37c616cfee84d4c97797b1be8b3e8090fc08e99c8358eeca7
SHA512ab406204afc29b3b461eac95d34c940312b1e36f6c7f020ea1c19ec50184eb3342675c188c852114421c683d5071baafd56190a3581a967e34c66eb9b053ed14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51429cb663aa4e54dbcd3c21c5999921f
SHA164e5bf8f4d34b537ae5436245b48394772c3d667
SHA256f52c6c41c23002207a9612d9724fba533d865980db5c1ad68124fc302f7b33a1
SHA512f3ea45b49e506eeabc69df86fb1b109e306bec87357e2d446199c52f87d9d0d771091f7322668aae1fd59114a00c0b01731d4dde960ed2ebdf5b424dfed9a4d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599a12b87926433ececa4c3228bd5e5ac
SHA12baf787541f21357947f52d0ca4f8419b78dbb12
SHA256b98aa9f4d18ae470e60c40206e81289cc95e1673c4df02705a91a97057316e1d
SHA512454d52e5732e1ca414082df722cf0a372e0dc5ee1062b1ab5eb3df2293ba21ea642e88f7ecdd8ac694d43a966115c481a7b4b1e3ca73780941ee0629374d6dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecebd167cd2b03dc6f869051f089a56c
SHA148f718abff9f800bd7066342cf575a265be4d7c2
SHA256f443f187d35d89c7ae2a40cd9e55513d1d27202e17cdb899536f08547c86c3e7
SHA512d4aeed74f3ef621eb9eef91c84b9317001c07758794964087c34d69275fb00f32d63e387b45fc4f00441782b23cdcef93e44d12027f668e0ff2a5a9f342ffcfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5774a813a7cead80e880a20bd8f6d15bf
SHA1813e60eca7fe0f286dde65c62093627cee4f4502
SHA256fd425e928d679a00efb9bc16981dc240e382fdaf81deaef8a4fbebda9cb3db7c
SHA512e431912f8e1162f4b186929f9926e7acebb44be84c6226fb375ab41fadcc9b1002186f1ac10a8eea577ccc043676d6263281ec8f426d926a1d190151bddc576c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596ff08c085739792cf01b85d7b5a5475
SHA1da63312ba126328b47f949ef28e9b4a8cfc50c76
SHA2569b37ad51f04d050e51eb9c92613bd9a73054cd3044a28ca1d0d1be905bdffa6c
SHA51229e364842520dd522908e871c6189a37b0c7bc48cbcd09e584760332c874657557abd9505f8e07c717360de7d4e884cd7aa5822eb2f57adad2a1b78f263066b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dddd5dc846ea38fcbb9062091e27cb39
SHA10c82a444e058c1c8673cb3ffd0bb8093e07524f5
SHA2564b38003748f032291fcfecd4ad8ecfe2535a2e6018ec2f9355cf9fbc442a66bc
SHA512402eb4ebf9f9b560c455096c1be74431769a4707fb5036720c04592e9b1a49a1c9a06b2c712829d0fe1e4ffc9f4e6aa1f8939f021355a690b255128796902e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5475420ac43a8c23fb451a761a711cd8b
SHA1aef5f4dfcd895df9fa61c8478c6b238026a4f7ac
SHA2561369db41843af437879394a2725850805d7de31e94ae410999067d07e701dc62
SHA5126fccc114fd474e6e9f5ace1275f2e4639c4851d9cff1d35647bc11e1f5a3e437afdeab3e6558bf414a22c83f5b2aad368843bd748ce5347aea3fc2ae8c23e2d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5297b89cb280a81837cc076b23523a75e
SHA159ffeafce8f7a96bc46ef6e315a2024230b111ae
SHA256e735a1b7c1c6ad5a7b5141bfee116173c6a65c672ce0e3aa3c2f45f9402c270c
SHA512869af9f4740f4c3a71015809eb18285404d6fdd75853f6f5a457efa60fef1c06d0868300dd1b547a64ec2d63ac9e0a75dacbba29ebe7150be1571db6cc130700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553e117e7de09dd47f15cc68b26f5ede9
SHA16cfd7cfd45f783d3b366e2f54a386d33605bae73
SHA2566dc76cd003ab499723b0e16a005241a4c78d443cd468c74e06bb93cfe136b520
SHA512e9d12aac3eec5767628b662078bdb30d400c00a27e8500471f6c27da6a582ba85986975f40aedd4db96c1ca19eed7aff9902a467e4dc552b25296071c1ed07ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a5477fa41ce0b852d20d7f1ce1697e4
SHA1f663befd6efb9e425cfadb95ef2a549b28e73c8f
SHA256f660315f8def656084c60e06735d51476d99ee4e62cfc71756ba783e47d933d8
SHA512b9adde4023a70d6fa70be435cd475e16abcf7f36300d45b38c82bcadb9d178aeac28f88e0b0f8502948eac662023d8b5bb71b032b4f93220706263270763880e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b3eb979091c7c62c98310560ddf49cd
SHA1ed4a424dd6ccb852e2f44312480930a5cc676275
SHA256dd8700133b8d6275364e4d0a174e0326f919c8075d582fd37219edfe67dff1ec
SHA5129c6bf4ea0360e0d0c40e60db9ef830e79b9b67aadc33872a4b378f159dede1990c46033db9c904e75240e13ceb1e1988369ae1e1ef266b6eaad8257b1bada73c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b06ca2aad559565c42e2ca20ca7ee1ff
SHA10922783fbd0a6a819d2a2e2e6fefdbfa2c9c227a
SHA2562458c02327be12968558ec7db6c70715f149ecefe2ece91f25a2f794cf1d6738
SHA5121ed5396700ca21836870bda7e33f70876039528b18d45d16f848cfad015e9ae3afa9bb6d11205a289afd5ddb31fc71adee055d1c73a1de2ebabded5c9ab0da21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b24764218befbbdc2c056714cc8bf865
SHA1b19c37ee41c642ec761e4b139de63e2aaac151b3
SHA256a95410815e08d1fd2d03f115ee27a7e4c1c033d1d802b6302c8f578017282d0e
SHA5121c6a7bafcf5afa4aed80d00fde651f8d1c24036f50e48b3d68cef7b46f45067d9ac0344ea576d329c6479e0b3d8b4f107c10d0ab9027ca2df88e3c9eb6996d46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0a4fc251431f4c67e85be34f3b93a86
SHA1f914e863b4322e76c7c46bdc11b579648da5dba7
SHA2562be59da555936468d0d85cab2b0471b18adbe671de91d6aa0a9a6153a37bc1f8
SHA5129230706567a5b96392de2954f42208d513b866f2d3af6f1a96b03826c4c1bce8755cc0bfc588f5b43ef8edcbe6c91066230f4fd24619f04aeb899e00c41ba322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9eaa8a955cb7ac28154e0bf5296390b
SHA160d24fe0554272ab4d662b5d2ceb37504a745c85
SHA25600155d84fd19bde2d98aa5c061a95ccefde09fc98bd9c250dd74799dfa233599
SHA512864073fdfd72dfb6c42354cf940610b08343d2a38a92ebe5ab8698349fc88babd01adad6b2467733e686a49688d64221d91f73bc9ff7c8b92379fa8f6b253f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dba48ec9a9a8b5d0cef0687c629786e
SHA19a67f34a3168bc12e1cee2c0f8c7888ac2e33e02
SHA256bfb5971ec0c5c7f39d30618d6335a541c290773eedf40c5a69027168be15e8a0
SHA512431ffa07f14ee529131e6ba84ffd6c3248cda970f3aa8f33fc97112b92828b4c76bbf193379569b44013262228d63e150ef35f342e1b13b0e17af08c0859a7e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fce8f96d6d6eb27ee9a7c8276ead7af6
SHA14c553a18bf556fcc42d23142820dd4faeccbc42b
SHA2561b389364b0c4a32aeb69549ca5b9243d6e88aed5acf7a45177d3283176f6cca9
SHA51236a841e86dae7d20a567c61756823f9b927708b71c259f9ba9f6b2555b651f9cd5a54e1665d86248ac01e325131e15831ba0291f0c84f4d13d90fba1ebde3371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d702e21d6db01ef8e44b5b5f6eadc170
SHA1415b87f57bb51d1774873de5afedaa415bf644df
SHA256a43fa866ff5d5949756d6d67f9fcc42a4bfdc0c5b0333435ef797aa285d8b400
SHA5120e5d9b2bc0b7ac1422bb7c8bf26140c9d83399c20c0740babc944c33f88199f7316190266d480028274bf4bf1b7ede8a75be64a9a5467ff57bb9316131d65d8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c55964d089666bebe5dc5b9fa6b9d676
SHA11f956a052fa3e30a01ff48f8259613b36d732681
SHA25630d8a3fea49722407f93873c3601f03029ead2a8fcef27467f363df60b1621bb
SHA51270d7c5974366b643c382f594377c7de6ffe59bc423465a74c8e6a97bd6fe7f30502747a3c61a6d5dc272aad9ad8da8c5a3270d4fab0c5600e032186ede0dcade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f3a2ba866857018f057087b30703c65
SHA1b5658b34e445d0b52252f4f30b33f972e5ad537e
SHA25655279e70e3492eb2016f32d76ed3bebf93a3beb23084723a39e89998ee0d845e
SHA512c38fa62d5fa391a04c694f57df2c6c7363289e3cc68502a3893a288f86b76e4095cf3870710974254ee43e046595dea91a90438aeba18347b248602471d699cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50067fa3dd67dfb198873c9edbabe6262
SHA16c47a85fdd19013c1252027cc48a982a9d770be6
SHA2561a5886111e028082173518d1d8000610fa7935561654190e9bb820a6a2aaf453
SHA51240f3c0f975a2f5383a7bc84a14ac3e8076672d4a9688ec599a6b242b974b8bb1d7faec280f267cfa5d71cd9c280e3e0b3b56f27a683263811ef2363083a8526a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f99067291f09d2de3366dd9c7868f0b4
SHA113c6350587a3e501effe822cf57a7b34114d5bb9
SHA256e22e2410d9ca36c05527d72da26a30ccf484a3919b65c3bad797c002514dcf27
SHA5124521e3e1a942d5c49e609c5a6be03bd8173ca6e000384fe42611c0c6583c3f901538351df57d0620bb3a96c80fec877c967f2ebde356280780a1199f0e2dde65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b69b01ad543e71778b8b2243d46e96a5
SHA16a665687a298d4c4728935276de0e2f44830386d
SHA256bcf20d7be076e0ca373c8b0102cfa818b183b10b8ef95fa62eb54756d4540f56
SHA5125f7eace37b631ae64076ba8e84ddf1ebeb6178dc7d1cbc7dd88ab912591b658e222d1eee982e495d1c35153e13ae7f780d1de49bdd503b8d32549e9301285ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df00e9b8e6b6c178380843587cf24b14
SHA175e857ef9e7fa2ef38b4b78c5d1580c707a697b1
SHA256f13362c55a2536541fd2a61e3db364f9fa6400ee06efc6fe902f47886a6a8bb0
SHA51270a03dd5b78de44f4a471af4e07322912e67d08c95d44cc2b936d051bb0a2bc64d1cb319c5a4f88f88213ca2a0146ab4e9ea06ea06a75a87989cb59932894562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a359ec895aa943088f38453b78113dfc
SHA1b5a84fc15084afb07d4bccb2744f0a6dfc51ec06
SHA256a99dec68b0706aec4ce0e0e43fc7163db806dd9e95d910215cb19f8e0b2677c6
SHA51257d0d7b70ee272662bdc95240374465d1830f6216b92c17d8f518338c8b86b8f7bf576972e674fe3c51ac8cfcd791c837b0729eeb1d2fc2cb28200f1e0e15d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccc1949ff4fdccdd3a95aa0d6d4d90df
SHA190b92690b636f367062726e9570431561fcf6218
SHA256e02353096618c3da5d7578a6892342c8985822d81306da110f56b13a7690d93a
SHA5124a2eaa0a6834299c2804e6612b1e23d446e836854ca82c8fbdbe2539f2042d10e5161576f1e63be96eef2bf33a49036ce82a8bdbbf04e7102e3acd771ed89881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdb8d25ab9f58f1514905e9b55662550
SHA19bcb1e358e669be0d8fdc32b711dafe3e98ccdef
SHA25634a6e688b3dc52752621db3b47cce4bcaca30a56b2ae54eb8aebbc3e2d08dbc8
SHA5126ae749b357d8ccf9c6649eae3fe890b3bc3295690ef1b8cf25c851833a649597e00ce82cd2ac6f277f1a8eed1b6c1020afd409ae386b4a50572ecd38b18a58e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cac192f8d09b3476daeb423aeaf775c
SHA178a94e08f63cdae94c1fc9fc2a4b5950150cb49c
SHA256edfef55759ef4d8844f87d405aad456597ec1c192c765dee5b3122a14c9cb02f
SHA512f496e41b87c99b5ceb1db1f2d43fa691ea1e8b02ab5fb3b4b8d230ae5b6a748233073ec76c5aace236a8b7bbd75efcf62e1d05b56dfd1ce3a273219c51507acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502e648b2a624b5c4ae27f7ee677bbd1b
SHA1f892c16002f8670b5532da412dc314627bce88a7
SHA256aa01d33c0a8276a0cc07c5e39d226214013c408512a0b7dbc654f703c76fa859
SHA5121fa161c17a3ff39172b89cc55bc1821846a620f99d522a67f9130b5f1ad1b59494b35437a3a2d5bd99c067bc13c56756cac198f00ad6cc50dce974a52ece4331
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
2.5MB
MD5171a226dee5aaa5d81a1fdaf619b2d5e
SHA104de24f275712462e48764824527ee85c423fa6e
SHA2568ab75d2cf26d6147f3385edf5959a41bc18cd45b14bdc04f3fbe1faa1d23912d
SHA512a0420bffaa224ac4266fd5850c9c002fc2d1cb9f7fa8e32860028a5cf175ae84065f2a913038a996c59ba83181df31514ec0df6f18848cf440cfe2f929a7219c
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
\Users\Admin\AppData\Local\Temp\HD_8b0932899a0cb3350905b12d4e6e2af39c7edd79871eae46e949874279426287.exe
Filesize4.4MB
MD5c40aebee2bf4002f042241a4625176d4
SHA13bfb5be63e2438788e431440865cb0dc42f34ef7
SHA2568e4f917471e96a7f28802a0e816d000aa7156a040a066887672207ca9cb6474e
SHA5126fabce39177305db58cc95bd7ffac3bf4348c738c158e0c420e1d9bef7020ec81512ddf1d4accceb324bd0127b7d611ae316b418340db465b4ca925c90eaaa3f
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
899KB
MD5abbff166b925b71e16e2f02236946cfb
SHA1a36cccb5fcf54c8d94a0f86f76e8597e8a255f5f
SHA256b0fe8eee6dcb4e576fb4e0970b0d9a029211c8a72c33b80e12185a79d97d8274
SHA512513b5c4c24d27446a6faef3b61e984d62b9a5123092180e2cd2a6cab75079febf2c93e6ff2b64d1c7c3acebcded1259ca9035eae795e32375a0d02d884350af9
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d