Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe
Resource
win7-20240221-en
General
-
Target
8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe
-
Size
7.0MB
-
MD5
c820f33f16c617ad9c5d4bad22e8ef73
-
SHA1
70e994ba806cae3642540f2e8dfcda96247c074f
-
SHA256
8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3
-
SHA512
1a3d6dac6afc59ba84f84875f47ab07ac7367f851adfd6baddb6a76b7dc305782110a38a901932923e4a375f9524238d9ab326ea1529bfe0ab4546bc6f55a35d
-
SSDEEP
98304:ews2ANnKXOaeOgmhwUBUqoDwkYRzddiHP6nIFriWp86fv0o8j49Z5/xP:MKXbeO7bU2kQBdiHPtRT8o8sb59
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2784-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2784-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2784-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2528-40-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2464-41-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2464-45-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2464-47-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 9 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\259428601.txt family_gh0strat behavioral1/memory/2784-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2784-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2784-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2528-26-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2528-40-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2464-41-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2464-45-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2464-47-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatfor.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatfor.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Executes dropped EXE 5 IoCs
Processes:
R.exeN.exeTXPlatfor.exeHD_8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exeTXPlatfor.exepid process 2180 R.exe 2784 N.exe 2528 TXPlatfor.exe 2120 HD_8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe 2464 TXPlatfor.exe -
Loads dropped DLL 5 IoCs
Processes:
8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exeR.exeTXPlatfor.exepid process 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe 2180 R.exe 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe 2528 TXPlatfor.exe 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe -
Processes:
resource yara_rule behavioral1/memory/2784-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2784-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2784-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2784-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2528-26-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2528-40-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2464-41-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2464-45-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2464-47-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
Processes:
R.exeN.exedescription ioc process File created C:\Windows\SysWOW64\259428601.txt R.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87364031-1AD0-11EF-A7EB-E60682B688C9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422828709" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000fee26db76d67e44b9942f649f48ed3300000000020000000000106600000001000020000000bde9f6ae2c8eaaf57edc0c16e371fcebbcd319b1ef6ca73426515ace55bb6c29000000000e8000000002000020000000cd68b4ac229cf44ff671734e9a5348a9b6a55ca7d2dfdbf2956f4db5a0e43d402000000088aa571e968eec8a9498963c86edeeb240554c99b27891fac2c0468a9a073519400000001f9c2030c4f67a9c0225cd8752934ba3adec0ad9ba11d6c71ded0c6284b78dc49ec7859af1daa258324cb780ef0f22a4189b26b8161dc11c516c65da1743a480 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3099565eddaeda01 iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exepid process 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatfor.exepid process 2464 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
N.exeTXPlatfor.exedescription pid process Token: SeIncBasePriorityPrivilege 2784 N.exe Token: SeLoadDriverPrivilege 2464 TXPlatfor.exe Token: 33 2464 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2464 TXPlatfor.exe Token: 33 2464 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2464 TXPlatfor.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exeiexplore.exeIEXPLORE.EXEpid process 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe 3052 iexplore.exe 3052 iexplore.exe 1372 IEXPLORE.EXE 1372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exeN.exeTXPlatfor.execmd.exeHD_8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exeiexplore.exedescription pid process target process PID 2300 wrote to memory of 2180 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe R.exe PID 2300 wrote to memory of 2180 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe R.exe PID 2300 wrote to memory of 2180 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe R.exe PID 2300 wrote to memory of 2180 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe R.exe PID 2300 wrote to memory of 2784 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe N.exe PID 2300 wrote to memory of 2784 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe N.exe PID 2300 wrote to memory of 2784 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe N.exe PID 2300 wrote to memory of 2784 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe N.exe PID 2300 wrote to memory of 2784 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe N.exe PID 2300 wrote to memory of 2784 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe N.exe PID 2300 wrote to memory of 2784 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe N.exe PID 2784 wrote to memory of 2436 2784 N.exe cmd.exe PID 2784 wrote to memory of 2436 2784 N.exe cmd.exe PID 2784 wrote to memory of 2436 2784 N.exe cmd.exe PID 2784 wrote to memory of 2436 2784 N.exe cmd.exe PID 2300 wrote to memory of 2120 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe HD_8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe PID 2300 wrote to memory of 2120 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe HD_8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe PID 2300 wrote to memory of 2120 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe HD_8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe PID 2300 wrote to memory of 2120 2300 8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe HD_8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe PID 2528 wrote to memory of 2464 2528 TXPlatfor.exe TXPlatfor.exe PID 2528 wrote to memory of 2464 2528 TXPlatfor.exe TXPlatfor.exe PID 2528 wrote to memory of 2464 2528 TXPlatfor.exe TXPlatfor.exe PID 2528 wrote to memory of 2464 2528 TXPlatfor.exe TXPlatfor.exe PID 2528 wrote to memory of 2464 2528 TXPlatfor.exe TXPlatfor.exe PID 2528 wrote to memory of 2464 2528 TXPlatfor.exe TXPlatfor.exe PID 2528 wrote to memory of 2464 2528 TXPlatfor.exe TXPlatfor.exe PID 2436 wrote to memory of 2380 2436 cmd.exe PING.EXE PID 2436 wrote to memory of 2380 2436 cmd.exe PING.EXE PID 2436 wrote to memory of 2380 2436 cmd.exe PING.EXE PID 2436 wrote to memory of 2380 2436 cmd.exe PING.EXE PID 2120 wrote to memory of 3052 2120 HD_8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe iexplore.exe PID 2120 wrote to memory of 3052 2120 HD_8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe iexplore.exe PID 2120 wrote to memory of 3052 2120 HD_8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe iexplore.exe PID 2120 wrote to memory of 3052 2120 HD_8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe iexplore.exe PID 3052 wrote to memory of 1372 3052 iexplore.exe IEXPLORE.EXE PID 3052 wrote to memory of 1372 3052 iexplore.exe IEXPLORE.EXE PID 3052 wrote to memory of 1372 3052 iexplore.exe IEXPLORE.EXE PID 3052 wrote to memory of 1372 3052 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe"C:\Users\Admin\AppData\Local\Temp\8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2180
-
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exeC:\Users\Admin\AppData\Local\Temp\HD_8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/download-jdk/microsoft-jdk-17-windows-x64.msi3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1372
-
-
-
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504070888d08d25c2b76250a206e1c6b1
SHA1da75a5a4e76130f92cdb1fb97820c6b41376114f
SHA25668bdd14bb8aaf9416213778d1e06fe70d47668a611f256bc0681141889a1185e
SHA512b04c616e5ea6401ef8328ee564ef556b9cd519905255cbb8b593c9d446dbdd8b7dd8b6f55ada740ec795ee8a9715a2a3bc7055f0f18d16cf6b68fa3dcd07f94a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc67a3bfec63929b0c8e120eb35a7cda
SHA1839883f40fd03361ddda37731a919a136cfd8afc
SHA256bf1309f5d7c6fbce9b9794730fbd5358d545c16415ded7866b17988050064cd9
SHA51295011eb8ae9a7d050d7215706c06d12a84556c239eb04b0ff28ac8311a62d49169bed3c450f321c8f619a88943331ab1a365186623ebd9679f4c77941a3b2d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582fb6f0ad1cf2e865cf1f13476a488d5
SHA11d9ae2801af12d6107587fc95d7a2805fcc4b700
SHA256a46b5f934c0a9faf2779824c237190f9ec75442730033306b90e51652e4e90f1
SHA51258a68099339dfd6fe9d8846a3bc77e296dbb32696deb98349a9b000196f3aff915379ec6e84f890db40f4941eda486843fd33e942dad0d0f805a02a557af0397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e0ec295621a5d05bac197a5e82036a6
SHA1ef0d72b577a59e2fd2c407c7cacea0bcb1c0a682
SHA256072d802328195b8671c9daa3b101dd97a2a21e2bba97fc78ea948a7a9ab12da9
SHA512991ffc0ba38ccff5434206f81c8aea219eff2c8b50b02a718d2c13aa7243b5eb076a1a63376b2aa40e122435f0491e321c1f87f509db347e9d17f72786c680da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55060dec74e29a8563a28158a71ebefb2
SHA19b93c56437dfff1acd84a90a99787a7c1e2ebe15
SHA2561bba5ecfe0add5aa7580dc023af9a5865ca177d844a1c9dbaeda163fc43f65e5
SHA512d24b190bc11d3a52b8af238aca43da9632d72f8281671e0f1768df9e30f93347fd93812356859ef99e4bf330215184b024de40ee057a7c386f7515a585191371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6ebe6e129ecc9b77819458abf2f0c69
SHA191730f2799b3e0353727f4c49c1ca58b4e32c4af
SHA25675af630717fc16c872d28b3728b05fa2e4902fc6485b90efcad438c2b90f5ab3
SHA512528ad1fd5c2370a3758546dc4b3a15c0435a32d1b7ba9d07d79bb4a2a6a6f13a2b72b8ad48ee0e9c90a5ff45f664c25f015248b2db696698388d30a068c2bdb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fc866125ef0840eaea11403eb5fe176
SHA139ca5aa2c15697e4b02636de4d5e51c75a95b171
SHA25635756a85d0b65403f62b2143e21d870b41df1d6f2cc2324b41f21070dcc5ff3f
SHA51285e2477a9e6945f2d1b6288d33018242a65e7d7e3c16ce22ef7c88bce5a7c62b022fe0acd2d11139568cd9c97eac23fca0c5ffde7487f7ce7b3f93e4ea52e1cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549247b1cff0e0a173916bdfcc68690f5
SHA168d9df03b5cdf0cf41894af6413ff071d4cbda9c
SHA256d7d3e080d03f6f6b6d921049b9e07e06db71743755ddf6decc6e8402ff5363c2
SHA51243f1dcb9ad299147307d0d0e78f022c18c3cc37621c4a653e98104b80339956410a82565bee0f9b010303b45490632badfb4de5c6186487c4ead2088a4038b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5537b6a3f8f4c3be6d9c5a31c4e47ab15
SHA14543f95602ec9f2b4876a4976f42224dae389fbb
SHA2560fdda03479fd0d460b79cb5eb70d943c82c26a13aa04a57648e876e1ff53b08f
SHA512446c12c9ef003ca4858d07e1056812ab344be56fba9babfd44ebecfbe3ffc6a69389f8a735b54ff95f97954bc49e428ae7e6fb1a9262da9205b95b17cab1fcc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5575d97b84ba4049c67e2423901ba2981
SHA118bd2ef3ba9aa80a46ad6687bcda3b21b1801c66
SHA256f22074ea4a53b1dc01cdd0eba79a2cf80eb4dfda4c11f55fea7ce6d9398ceb96
SHA5126808895921265bf6a4ef99103105d32c6eafbf90eb3f01fd797f78beb3479e03232c831949f23f72a8968e8bf76fcc1c24a834a1432a692b15dd9db8f084875a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5019229bcc1ee6b7e603367c2196a91a7
SHA170bd8a00e51dd42cc63fce10844cefb9d137e72c
SHA2566030ae417ca00a28c9b61988f8bb723907e5f6b6a5c07960994c8fafa0604201
SHA512445c1bd61ef41054e196bb3b06144436416787f7e7592cd22ad070965c8b5021ec0003af370c2e2bae1b05dd7b4d09213c92518a8ea2e2d36cbad4a58b0aec99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8a04dec628df76a8eed30d49ab54a43
SHA13cfb1ececbf8e484c610b24fa190deb05d06bb3b
SHA2566f9ca9d9dfc951d71348c28f24a58e1c8e370ccfc6137a23f54a45f00573b380
SHA512b4920d183a3c8ef2f076a6005ab1715f601244fe331b571df0e9bb192411366e415ee1899e4faaf56987d07114667574b0d48548b31302da17efcf0e78a54012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efb20ec993c7b79b286f7eeb16c94843
SHA1d82e7c2dab8922ae5b4b412cd1e33923cf0a36f5
SHA25648b68ab4e8d508e49e2448a0789bc0d0a56d101932beb2c5165d75cf79b79e79
SHA512d0c36933c64ad43f4779ea263bd3d76210b3d41913a34cc043ffab80d0e5ffe007d25766eeb5e21a8b1437ff66a85a9181f19b10b29575c60eb27f472389a1a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6096548d5ddf63296f29b36b9eef094
SHA17e2d59c559a59b130dad174b2e6b4824c1f2e5c2
SHA256edf3220fde2a133e587e8f9b483b42a936f41eaabe2f77d35d83dfc0a3637f6b
SHA512a39d1de11d8318d73283dd3babc768a3f558b08867446da0ea3b5649d60c31f4a3bd1801f3181826720e878047e82e6eaaee851f923bd9564eb1dd02f4981c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b0655045601d088a226da8befe801ce
SHA191d101b1d8d6c3215894461a714032704208477f
SHA256475a3b9bdd52ca690be1978f081df0721a9ef1acb92e98bec2b775e9d9668d9d
SHA512195b4cb0e25b97a5f438ada4d0bb83667b3ce2dc22065faa9f3f4beb9e7da9b6975fa2a7fec7c8a658847d609d8b2f17b372ea5478effc12581be3779b39817c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5712b4dd7ba9e4ce640eab63db91c9fd7
SHA1a674a7d7664e3ad388781f8b9dffcc1da6a64502
SHA256f494804070918db6ecc25a12f479a38394e3f90ab971c62bfe3888875c6b99b2
SHA512123438f987df13c8c2a139d575b4bdeadd66fc3a3b588d9537ca8ce52d83199dafd56249918423145f0b3a17dce05f1c642b7773a735a8417d8c337685fbc67d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e81d18305131fe8255c8daba2fe7853
SHA1ac20318205b9b1e522b5243fb1bd4437e924757f
SHA256393a6c166e48452136d0e9dad721814c2acf05f167a11408d4fe58da30733f24
SHA512b82acd339c67eb431163cdd86e9625af362273547e876d5cd594ee9c7c2400f72e16a9ed3924d3851d44b4b0be770b0c8a0d6fd71b9dd2b7763a2654896f7982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504de9f94681a5c256d498cf50cc1bf1f
SHA1904bcdcb85696342b3c0a78f4a89cd52cb7292f0
SHA2566abfa0307fc9c0588f6488001c764f0274893fc2e35514ed50012c6ca7c0c550
SHA51273fbc358414449f73193d7c58a02b9ef783385491cd539fca32161e3f23abc29212937d63dd21bad904d3c4a2d4119b3f8e4fbff2243138e8ba8ea0569608bc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55031df5e971cd758022b660e3830135d
SHA1a95d81d1f1d91047ad08468b4819af6cea7e17c2
SHA2569fc40cfe4ec3404ecca06906e775b4168b7fa25483dddc482531664e6626eb6b
SHA512f48d53699bba2144b33a66a5b4a653e412c35860ed87426d9ec56f7de74270ad73137f751a280a4fd52ab148f70c9d1d6b127eab69ea3d624571266344a9d24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf759aec34b4996d9dfc63165c42e689
SHA128e1c5694c918c0ad3b5e890ec42872e7021e729
SHA25679cb37ea4fc77f07c2210e6a8de34a42f8e4205db8fb5fe21249acc1848a7480
SHA5129b0b2379a15af4f049172b6be9266a79b68224d8662467ccb24ac0b98a906788dde5649307b8bdbd392a813174f1afbb94437930d8be7a1f85d0d073bc6e17bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e88dccdeb1d5d0799ca37f36f24cf34
SHA1b9e9284e84cf30264ea45db594e0bfea3e73a889
SHA256711b0c02f3817f9fd448a47b711f3f99894882bf56886b96e7ec6e91780370de
SHA5120734d181fe033f1aa64fd160d23c6dc25e2c820ccb10a06c47116e649fd0b57fd2ff5b0989a1ae93211430a350e740fc6bdee581395e3167271dcc43d3ee1f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51756188b7707c93aeac42122fa73c53f
SHA1d0cb1ef7f5c3faf9417c33b2299004a519fd9956
SHA2565e4d3a45a33ca4e08a1d19a8964789549b82f8aee9e662d0d28931062f1b03e8
SHA5126e26082836fbd88d1370cd9550d0fdc2a7c101450ba9cfab770a3ee51a3a7621c21bd648b1ea5fa39600d1f8082cc7a2bbcca996fdbaa11b7c8f009d732cfc3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5121ec3cb59895fba7c9f795542218fc7
SHA16095a761e0145ff43d5b4af5c04fad43932de9b4
SHA256e01d69dbbdc406b0e35cfac0598edd87dff79f46d51ed7f9a5eb302366422963
SHA512f8204b363dbf39b8c4b291174644fd823928fa81f08cdfe2f6b8f5c6f4f823fe0a8763fbece49765ef7294000af20cee3de9c41356b43ffcc205bda959ce80e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569c04070c3aab10f7aed825eca9846a1
SHA11fa6dd170fa308698e108a55fd2d823dc5397ac7
SHA2568c95d409d372a07b816ddc51fc8e43ff4b1f88265e122e06a7cfc3c5af33dca2
SHA512bb3ec5501cddb644c4b91a5b8fdfa03046cdcb91b9f611fb6eaf273a19c756d512a8955e9bc300e903ce35f5f6b7629005911d3f55d613c51c372f1827a65e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509298e3666235b094d77d350a43a9286
SHA1d9d54cd2d8c103efd7aaeea846d9fbe85ce2f65d
SHA25613f09b6dc183c2ea9721f633a57037c1c4271549628f75d42c509c4e2a9471eb
SHA51242042ed4f338d7c5b5cbbc1e9cb1eef1bf7e9bfa0df1296fbc4b8d8247cc101795f58501af408f62491a6582fa954cd8b15bfdda09a051912584b2b026ced795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f52fc47a6af4fb9c13b7a535d36b2ef
SHA1c31779709e89b1a9e50d800f34a8229e48a8f19d
SHA25602d20b6ace975a63ffd5d41d4cb17704ad67e89655361da4c7ee65e56ee57f04
SHA5126f880b7c0ebfa4637dfa2f5260d020868acbffd781dfdc8b279101e2b777dcc65e4e0321fb7f87109c7a97935a1c4b2e9fd1b7494f68c11710d3f2b3f3ceba3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54839390d6fae761b9d54925d91672fef
SHA12a3b68a0998700215d89f59a402ae182e3f6a402
SHA2567573ad4d4876e3457928f122c300f94e79f0920dd46a747a19b447655f6dd0d1
SHA512299ec8c4043bbd7b03f12619c6ee8ad52a177218dd2c05f73832da2628d1d400272f8876b08469c2ce198b8622e1d82ca53c9aeb4e664eb11df889fc37a984a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519f8c61bc2854a2484bb5f1e661546df
SHA11216b097d72122ca2ea634d32971be4eb51c7f3a
SHA256a50bc1a0e8a6a4322875841ba11aeece740bdf061b567b34486e52e75bf5a2d3
SHA512a2bee1e5e96ad6365d9807ea0306868b5ac84d37023ca3ded147398acdd54167821a4e87cad5973f3701c40ebb3b1c5ca94ab435d9e9e6f28ccc8f18c52f7c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a008f84c8569d326eb5c02c032c6c836
SHA1b9c18af783f6912d51b805868aa8c67b3fe33a3f
SHA25641271c3c919c18d8600827a993380b039d648a4769f9a687e09c73a0b7e9c86b
SHA5120853f635bf84b71f67ebc7b98c2e570ca0171c0b860bd285be60f3ba049631143ec2e188df6ca9eaa93a19b7f760f2f5669df8d05197e17ed83cabfd96fe0d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520cae179378b42959bda76f81dda0928
SHA1c96c0edbf9cc4c58c6a144297fc31970797b20fe
SHA256d7ed0e502f9aa5fe35f36029357225ccaf4eb15d2e87ca732c1da5db9fc76452
SHA512f58ba670445c43d8e5e72519d4f18b634b1d6f432ac37c14cdd030ee3edded82ec058abf5f3f73997e7cced840901da315d7e0212d52eefdbd34a054ba5e54ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7f60912804714da692f55ca3075cb4e
SHA13ab53f01c2beadc6cd3a900fea9f236a054049ee
SHA2567ce89f0f301667646c9a05dc83802a77ddd92667f3040f9229f0ef85e8da400c
SHA5127febb6f1db508463c528d12cc5a48a4f81ada471a447c9fb92f7f14c0998c00e3e2b2a2b99fe99e4b64445d764a656f08f3c93e55ceb960b5c4b1385d68914aa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
2.5MB
MD5396d7d0de1669ec544df36d0a9f103b9
SHA1986b013e4b9d3f8acf9735b25da8b87250e8bfea
SHA256aaa861067bd5e0d3e2f1041dc4dfba9ff58f48a7cb0b1b255425be9dd7ed39ff
SHA5123181b3a523b017182a7010fef16650bb95755f4ca9ca8069bbd8b6a60957eac19513d88cef3272d1495a922990d7d994c248a1f6f8985097ac7b8382fca85124
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
\Users\Admin\AppData\Local\Temp\HD_8f69b50c068ba8c241438d853ee4aabd0e57900d9f84b92ceb3b8066c35b74e3.exe
Filesize4.4MB
MD5c40aebee2bf4002f042241a4625176d4
SHA13bfb5be63e2438788e431440865cb0dc42f34ef7
SHA2568e4f917471e96a7f28802a0e816d000aa7156a040a066887672207ca9cb6474e
SHA5126fabce39177305db58cc95bd7ffac3bf4348c738c158e0c420e1d9bef7020ec81512ddf1d4accceb324bd0127b7d611ae316b418340db465b4ca925c90eaaa3f
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
899KB
MD52015a66fd28c3c4eb3b1d7b1cc487b00
SHA1682eb464c01bb88619695b428cb607297fdea280
SHA256bf2212201c48446e7605531f4e1a17efa424656ae86651f178ce0113ad339bad
SHA512f04dd5fe016d09d6b205363e79b4068001c4f9042170b854f838ee4aa8c379b943cfa47271d07744a053a4ee916367e04e8b992bc37304dfc961ba1bf2ad65d0