Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
4Static
static
3SecuriteIn...82.exe
windows7-x64
4SecuriteIn...82.exe
windows10-2004-x64
4$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3D3Dcompiler_47.dll
windows7-x64
3D3Dcompiler_47.dll
windows10-2004-x64
3Qt5Core.dll
windows7-x64
3Qt5Core.dll
windows10-2004-x64
3Qt5Gui.dll
windows7-x64
3Qt5Gui.dll
windows10-2004-x64
3Qt5Network.dll
windows7-x64
3Qt5Network.dll
windows10-2004-x64
3Qt5Qml.dll
windows7-x64
3Qt5Qml.dll
windows10-2004-x64
3Qt5QmlModels.dll
windows7-x64
3Qt5QmlModels.dll
windows10-2004-x64
3Qt5QmlWork...pt.dll
windows7-x64
3Qt5QmlWork...pt.dll
windows10-2004-x64
3Qt5Quick.dll
windows7-x64
3Qt5Quick.dll
windows10-2004-x64
3Qt5QuickControls2.dll
windows7-x64
3Qt5QuickControls2.dll
windows10-2004-x64
3Qt5QuickTe...s2.dll
windows7-x64
3Qt5QuickTe...s2.dll
windows10-2004-x64
3Qt5Svg.dll
windows7-x64
3Qt5Svg.dll
windows10-2004-x64
3Qt5Widgets.dll
windows7-x64
3Qt5Widgets.dll
windows10-2004-x64
3Qt5WinExtras.dll
windows7-x64
3Qt5WinExtras.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 04:29
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
D3Dcompiler_47.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
D3Dcompiler_47.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Qt5Core.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Qt5Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Qt5Gui.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Qt5Gui.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Qt5Network.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Qt5Network.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Qt5Qml.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Qt5Qml.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Qt5QmlModels.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Qt5QmlModels.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Qt5QmlWorkerScript.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Qt5QmlWorkerScript.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Qt5Quick.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Qt5Quick.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Qt5QuickControls2.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Qt5QuickControls2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Qt5QuickTemplates2.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Qt5QuickTemplates2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Qt5Svg.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Qt5Svg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Qt5Widgets.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Qt5Widgets.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Qt5WinExtras.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Qt5WinExtras.dll
Resource
win10v2004-20241007-en
General
-
Target
SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe
-
Size
19.8MB
-
MD5
b095aa48891654453ef741daf4e26961
-
SHA1
3dd198bc166ace35827769de93a26c81c9d13ac7
-
SHA256
5432a7db786a1c1819bd14366bdd3d7691888b8d3ee5363c4cf88ab6d8f1c71b
-
SHA512
62f0208123a7897a42d26ed42201a5c4a8b144d17c3f4c330a2e4fcd8dcc663e0c770813fb4d9d15c9596773a6373be388d12d65f3825dd881ae5791709d64ba
-
SSDEEP
393216:hpRg/CHmIAeoMYRtMYukLCJY0M+64BbU65lDJdfJjHdxtx7NXHPU1apZLdpxl:h4/dIAIYDMjkOJYY645XDVj9bRhHM1YP
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Unraid USB Creator\Qt5QmlWorkerScript.dll SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Material\SwipeView.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Imagine\SwitchDelegate.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\DelayButton.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\RoundButton.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\imageformats\qwbmp.dll SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtGraphicalEffects\RadialBlur.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtGraphicalEffects\ZoomBlur.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\Qt5QuickTemplates2.dll SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Templates.2\qtquicktemplates2plugin.dll SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Universal\TabBar.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Material\SwitchDelegate.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Fusion\CheckDelegate.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Fusion\PageIndicator.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\imageformats\qjpeg.dll SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\StackView.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Material\ElevationEffect.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Material\Menu.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Material\TextArea.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Fusion\Menu.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Imagine\Frame.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Fusion\SwitchIndicator.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtGraphicalEffects\Glow.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Universal\MenuBarItem.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Material\ScrollIndicator.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Material\SliderHandle.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Material\Switch.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Imagine\CheckBox.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Fusion\TabButton.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtGraphicalEffects\private\GaussianDirectionalBlur.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Window.2\windowplugin.dll SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Container.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\SplitView.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Imagine\Switch.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Fusion\Switch.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\Qt5WinExtras.dll SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Material\SplitView.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtGraphicalEffects\qtgraphicaleffectsplugin.dll SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtGraphicalEffects\private\GaussianGlow.qmlc SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\Qt5Widgets.dll SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick.2\qtquick2plugin.dll SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Universal\ComboBox.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Fusion\RangeSlider.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtGraphicalEffects\DropShadow.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtGraphicalEffects\private\GaussianMaskedBlur.qmlc SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\imageformats\qtga.dll SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\ToolBar.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Universal\qtquickcontrols2universalstyleplugin.dll SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Material\Dial.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Fusion\Button.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Fusion\CheckBox.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Material\SwipeDelegate.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Fusion\DelayButton.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Fusion\ScrollIndicator.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\Qt5Network.dll SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\Qt5QuickControls2.dll SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Layouts\qquicklayoutsplugin.dll SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Universal\PageIndicator.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Material\DelayButton.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Fusion\SpinBox.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Dial.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Material\plugins.qmltypes SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtQuick\Controls.2\Fusion\DialogButtonBox.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe File created C:\Program Files (x86)\Unraid USB Creator\QtGraphicalEffects\ColorOverlay.qml SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 unraid-usb-creator.exe -
Loads dropped DLL 42 IoCs
pid Process 1812 SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe 1812 SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe 1812 SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unraid-usb-creator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe -
Modifies registry class 40 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.img SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.zstd\OpenWithProgIds\UNRAID_USB_CREATOR SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\UNRAID_USB_CREATOR SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\UNRAID_USB_CREATOR\shell\open\FriendlyAppName = "Unraid USB Creator" SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\UNRAID_USB_CREATOR\shell\open\command\ = "\"C:\\Program Files (x86)\\Unraid USB Creator\\unraid-usb-creator.exe\" \"%1\"" SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.zip SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.gz SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.gz\OpenWithProgIds\UNRAID_USB_CREATOR SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.img\OpenWithProgIds SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.zip\OpenWithProgIds SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\UNRAID_USB_CREATOR\shell\open SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\UNRAID_USB_CREATOR\shell\open\command SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.img\OpenWithProgIds\UNRAID_USB_CREATOR SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.zip\OpenWithProgIds\UNRAID_USB_CREATOR SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.xz\OpenWithProgIds SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.xz SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.xz\OpenWithProgIds\UNRAID_USB_CREATOR SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.zstd\OpenWithProgIds SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.zstd SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.gz\OpenWithProgIds SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\UNRAID_USB_CREATOR\shell SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2316 unraid-usb-creator.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 2316 unraid-usb-creator.exe 4560 SearchApp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2316 1812 SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe 87 PID 1812 wrote to memory of 2316 1812 SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe 87 PID 1812 wrote to memory of 2316 1812 SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.TR.AD.NsisInject.yzerl.9891.982.exe"1⤵
- Drops file in Program Files directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Unraid USB Creator\unraid-usb-creator.exe"C:\Program Files (x86)\Unraid USB Creator\unraid-usb-creator.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2316
-
-
C:\Windows\system32\werfault.exewerfault.exe /hc /shared Global\8fbb6545f0604baba8823c7da79887e3 /t 3328 /p 40641⤵PID:3988
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD539d509b1675c380dc549972506a8f717
SHA17fdbb1897ccd3ffcdee39ac3838e19f7b9d3f6c7
SHA256bb88391d53cf771c58887cb54101b5dc638abeb84bce4beddd82be5fb4bae671
SHA512bb4cfd92dd772b4d7a5bc84a6348be1e7d96864b086bfc331713ebefb47e30c7d1b304cde7d3a25b388ccd7e59816b0e3fe96f85676c722664be470723960ca9
-
Filesize
9.2MB
MD5f676936b5dfce1c5ac2f8a1a7f577844
SHA1c9870365d594bf1d6a4215acd4e730695166f809
SHA25677f8946ac559cd03694d9a36ab4630cc7d5f0db62b34c00ecec12bc021eafbe9
SHA512ce4ca22c4afb55a035c68711708ac86b5abf08ddca0bb0b059c3ad130aa1c9266a36e412b4feaeb4cd89edda6aa8ad95225e0a777fb33bcbae828b41c316301a
-
Filesize
2.7MB
MD5ced4531f553504ed6770d999f9c82cb9
SHA13405a3118bb6479413b9a749ce4c0b395622883c
SHA25677f1bd3192d9e8b15dd23adb15a3f83e92e9474df9a30450247fbe9e96b71736
SHA512df98b27470b30377928bcea23e18b0c3d8e7929d0d7ee6862887440f6ef577e5172fcb02b82a20b4903ce9eb7e1d00cfb8e1785476cbaaee3da92354f701dcbc
-
Filesize
7.0MB
MD565781efc205f808159563cb526332e28
SHA1771cfa537a523cad8987179a0211c653cda30c68
SHA2567244b065771674bf963d998acefad1ee0c93ababfaf667724c4ea3c6bf4f0bce
SHA512fadd974e9353575ec3e5f631643e246bfbbb0da30c90225fb18c587517603b4f279b0d5f1cab86e47844edb46f6832fda2a338e9717b1534faec7e76bd4d2304
-
Filesize
947KB
MD5a097b71d3afbc8e27dc4f577ed6ce0f1
SHA17ef05f005ee2dc7f0676d4b9fe22ee5dab86bb85
SHA2564d4d9965174560fb8d9be778c2344deca655717a772bb549f57244cc92b58617
SHA51270a96835180790e6f0c8ea99e2d16ef2484bea187a958a433340aedcec7a277b7b8ccfa82653be9bc7de5b0a4eb1962342a049749bc3357e15629bac3cd55649
-
Filesize
141KB
MD54ecac5dda76d1060de28f45ae3746723
SHA1f147bc6d65142fd8fb055ad8882c4099856bdc50
SHA256c0896506288e3da386d0674fec374272a6785cb982b3b6fdcd2214fc6c431f69
SHA512d6623ee3f50714db5acc6b40f46eec0677ea80136f078d8fd65a56b95ea4a24a13a0c54e9b01d856db152287bafde7474307a00cbde477cbcc7c7c50e57e478d
-
Filesize
8.3MB
MD5c300fa804a97c846a13f098a22934502
SHA13c3909fbdb64fd3a62134c3c634c7f2ded16ef36
SHA256b7af3bc93e2905e336886805553dec7313e4567886f7f2ac5981778cdd67173b
SHA512e45f011c10831c0f9542f1374d12e199403aab9e3291cb086a08bf119be2241faebe461af30f2235ff3b7af5267e1b4479d692bde46656a7145b61544f013dc1
-
Filesize
582KB
MD5825b515b5694b55982c4f7d004a94ad4
SHA17430898bb90f9e98bc85e0b172889c9bd63b5dc6
SHA256d7f56abfc93e7d4d5c79b568222f09ffeecdd08f4c18c2c17dfab00114dd40a0
SHA5121ae16ef69878efa975693f77498355a16622d4dbc619a674b5178d367c5cf82c64504cc8762033f2da4512c537afa20542dbdfd61a0fad91d44be87263d37993
-
Filesize
8.8MB
MD5b037b86cd074ea2a216bbd4b7b489c9c
SHA1bc6b32e01e03887b06e297009efcf965083aa435
SHA2562f0c2a362f2ef318ce80e03e914981ad42a1751c74b534725a6bf3cf50ce03a3
SHA51239472c8ba41dbe53e180568ca61472fd3b912ea55227bbc75e9e2889f9d18551b971079824e9102afe0f132782b20c42f2b7c06b576eba2509c36e5f77b6572b
-
Filesize
432KB
MD5ffd0b3e6a95ac68a7a534f932677b6e9
SHA1e2b365833ba1125d2e41082e2f50564b437fc684
SHA256a6b8f3b595bdd486143e80040dca1bc96390c0fc866e80c4a3a373c8b6a14b4e
SHA5123590d4ed40f71a3f1028e806bf66a5d972132551d7f6c8056dee4d85126aa9ed3ecbc6c648310114179122fa71e419d237190ec404593b5dfb36ca54961ec26c
-
Filesize
131B
MD5d2cf96786ce59e93a2feb2178603a27f
SHA17478dfedcd7ac1795bf4ff2732ef716ec82b061a
SHA256b6f63056ade6925aa070d3b2bd4133d26e80df4ea2719e81ad90027e19661ae8
SHA5124fcde288c6a690728f919b70308b3bb2ead62c40223bea14e52ec5f3ef74f5467b1930f419df77d78b8d50e84ec81a1fe78cc9a3b42c4a6d261ba77c654a1714
-
Filesize
55KB
MD5bc48935d7fb9d87eed3994024f1071f8
SHA19cea445364aae84a38d3e79b5aabdffd4229a284
SHA2566fccb1c95c2198d15d818e640d7849af9215e741ebbaceecfee3f3315f90b0ae
SHA51295dc78983ba867883766a3d2a988d56bd9c9a6252e8231e631a294c5a9cee3647862909f0282284d6c5d734d41685b8ca53823538bb23a7549098e5477676720
-
Filesize
140B
MD5659ed029afaeabbe4235968ff5292736
SHA1565ceba5b695eebbf28030965ee5929c2a5a2346
SHA2567b404175bb8e2b0d3822e75320c8d6d09c61bb53f4513c235a7d04ac7d34fd57
SHA51241fcb039c054c7decb9fc7ca198f3218dc0965813758b66c5b8b174b732040a33f2d3f54037aec7a9c48af5cd3bcc798ddd41c7458924b8c9bdd49a38846195b
-
Filesize
922KB
MD5b64cdbba8f86ad1570980766ba01fc04
SHA1f22fb76a9240414408cf732561a7306d1b49c49f
SHA2569e7ae57b5f45ebca1f9130a238850910fb3d0124eaf69c219d94db0e74ec4c99
SHA51213b03e6e0ee0c9497002ffe16956c498b4d6d5d40168e208d35039de58578a7d1b3d37dc3133344dec34072f0ec53a84f9e3061df97c0399fe825ac8aa77ebf1
-
Filesize
122B
MD5c434589591a9b33cbe88891afbb7c144
SHA142476fb63f3cf463b4bb03b47048aa0918e588b5
SHA2568d88b81547e1573f8c91df998ea82608e0a79770b014c82f760a67388b41945a
SHA5125a09830970ea37942166c1e5e5ce0fe452290eb9cd662ffaa9858bdb61806caa03b1016d30c98871a7b6c8fdfa369e29e3940a5f9779d967b98ede5901f4d30f
-
Filesize
157KB
MD5aaa6f063228fe0f039fbfbdd71350b52
SHA10191185074bd6ae95910a9abc33245d68501fd01
SHA2569ce4c676795449331955fbe0475b0ced2672d9f2e3693df06dae8a354306614c
SHA5120f5626fa285c914407debbb815c8a867da19cc50f0e08303d67783d57a5cb5ed73cdcbde7273b4cd19a576bb4dcfbf4b88d1e2b00003e3519c61e6a89681a31d
-
Filesize
156KB
MD50cd5e6423509f722a14ea18cdbff9131
SHA1f7e3dfbf13cf500d66239c6ebbace4d5b596c9d3
SHA256196b17ace66fcba78ca81ed6bf26071b4d953a7c6d86604305080cfcd8130b2b
SHA512d42bef1c5a5ece868171e4944a008e9c58ba4dfbe55fba4814c903c9eec5c651ad2a9b579c7fa06171f498ed8789954e91215e3d10369bfe8e7c3098777b85a4
-
Filesize
96KB
MD50e84e74db3c3c6318b1e436cbc3bc9bd
SHA12417d9359b8d77523647bccc3de9f469846cd4a2
SHA256aab86d4b897a38043f79c01ddbb5655e838dc3f907d9579ccce2b4a4299cd588
SHA512dbeeb50f7955d912436353a9063b1ede40d2e60594896569ea64950c85f69c8cf5e1f2bfe297a09da24b891fe351a53f4d519dc19a5b976e6a81898d384afe3f
-
Filesize
96KB
MD5d4f3874acb16d7da9b47e03166f738f7
SHA1c113e2508c1c919123659dcd9c121ffd79e27516
SHA256dab35f7cf1241ed3cec03bd7fe21c19e188308dd271b71307b2b135c7ea6befb
SHA5124ea7192d5f9204dcb82916e7405c87ef857db9040b863c39cf2e6d2ec826bcfd7dffa3ddd9dc3bc9b88cfe5f20c36a5e203eca0346d739cd11a491809c3203f7
-
Filesize
81KB
MD51323ccaa656e019b2cf3ce8604527bb1
SHA17c0a04f58cc920aa75d655acfb857cf40fa643f8
SHA25609fa3fb14c3f2d5e0703bb4a7c0294b0fa43d0804e894fc428bcdcde5605cf27
SHA512cf5fda6564259b8a570b491c19fee6c9e52d6226d6085c9bbe29a648978c70421e37d6dd94b77608495e5e8127db6e31f14c937d55fbcd1152ead98a4df4cb60
-
Filesize
476KB
MD59fb6482c0659d0a441a54b81232d64e1
SHA1f0697271cc8f618d1305c0ed882d46791c42de68
SHA256b15aeacee8e9d5490ee222c84ea2505e2c44893228e2b07e08158cdb9e01e6ab
SHA51204546439ce8d9420549ac1bc670e71e7b5aa6c7cbc36e0d8e20900f0d582c62f967939e780680b02906c96f644f962b106f24a8521eb4019a638ac76118c3685
-
Filesize
72KB
MD585d6831f35b51c402fa8d3e669f6fbcc
SHA1432429d425c44cf42b24cbeb46ef9f5767ecb6ce
SHA256de24ec415cd1bdbeaff32f10f5cad3315cc548b4de2acd8ed3a0386a8c772aae
SHA51231fb7a5148831e01a41b5f819b362306204e3125cf89e09c296220252d0e09181c3b31eb767e5159b29bceef055fbc616102ad7e2c1ebcc90ff3d8e72ce6ebc5
-
Filesize
68KB
MD58ddae0d848400076e87bc9eb7b012feb
SHA142d85b443c5a2466c6389b17a622607d02969b48
SHA2568eaf9d6e983b86b17aa7231b661d0ae17047239d9eaffc873fcfb1ee8f006a72
SHA51244fb65a92e9a5032849c29a738d6cf2807c4fcbd767a136ef1823f67958a186c97c29fc4b7197f24d6aa1b51a11f6a0998418bd2675a95e368337c78d1b140e2
-
Filesize
67KB
MD576ca2612c03f2fd2f54dee7d217786c2
SHA1ffc184e6e5b69fc7afeb0ec9104b18dbba34cfad
SHA256d1903311c33a9f29af3b9a71f6f2534f1dca03627214d032133064586aa34b3e
SHA512f23a0cce9ae220234730629e95be4db3b8d8faeec6dc9e3cece3bf8c424af4777f7311a0608b90ad1302eec537711291fee21350e403140d86f60c1f8edce3d0
-
Filesize
3.1MB
MD597b0d80c9ac831207fa1d80fdbc1f4ca
SHA124f63bb64e4c098a07b84603b9db31d2faf747dc
SHA2564c754c7b92fe58d8432ad438597a799a724aec949baf481a162da996b9e4d301
SHA512b5de053b48d7d94d1dbf78d79e3cca19a36f1e797b4e28c238fb5e3df4e226486b31562958e64164db2e18a851d1f2c36ecd0df93573dd85ce8d7c91de9aa490
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
1.5MB
MD5051973a1420749e10d007049f15a30ab
SHA127141d4e7847e16f3cedd487dd3f074811556ff1
SHA256672458902acead23b1a4dbca8b26e51324e88948196bc30d68703d45547898e8
SHA5120f105ba29af981afe3a43e6d789f5df8a501c252d3f46bf730d5c92c98358c6656cbdc7bd7d5a0d4c5357ae0acb1144828358b07cf2b1515512ca9b4d3f047fa
-
Filesize
46KB
MD5ed53eee1623a43e9ae174262169f0f2e
SHA14bf7e9fa40878e19d6d7b8277982ed958681af86
SHA2560b5532f93126db45689d7e3162cfc6951f78738a182e52712bb2c71980468f23
SHA512dce1bc89033313934323e9ad1fd0ef7a525df0fd8f2f7c64b5ca8f5e7780b5526ce9e1fff408f8a00b46f718763d492eae059b7d11d873eea3186e8584dca53c
-
Filesize
2.9MB
MD510de385a50aba297f8b92fb2eeaca1a3
SHA1b1506e0f27f0661e3c46d2389159b8fc1fdc704b
SHA256bd092da50a3d1d5113d0f5404bc8854faabc4875dd3247c81c4267fe8599e338
SHA51229e8781cf4c98a2ea4d97cc0dd5f8bcfc8825caec55bd5d82c7124a4668c6823605910ac4f14d1a26fe46dfadc9bc8957c3c69b35d81837f8fc1f8d958e41f2c
-
Filesize
332KB
MD5f17db40c8253fab8642753677453c49c
SHA1db14600290a48153481e5d84a378b08d8c55bcfb
SHA2565e6bfaf6dcd4446ff34a6a385652923c470037963235072e624887d1bca98565
SHA512b9ab3f59dd87e3f0752fcceec596ffa306b0bba6cba9864760e1a9b87ebbe0fc9c22adf8181bf6ec45973d774f91dbb6dc439809eea892cf92b7334a11212a29
-
Filesize
4.5MB
MD5dc000b09ac02561d809167d744dcfa87
SHA1620402730218a23e9c9986fedb2109876d1e58f7
SHA25608e5e3968546df321e444557a7376aaa61307f66b49276e82d94c3d3032d2af7
SHA512d8344c260caf50f15e2f9ed607061b91111bc2de6aca752e4c6d347727af028c9e72187f4427d67dfd7d35b7d730a4d71c45f039b1657284963add912cfaa15f
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133730082025033486.txt
Filesize75KB
MD5829802a891b973a4e617e5b1bda16c95
SHA12ab297ac53753fba2216ae6fa173dc291a83e0ae
SHA256590eac77eb5fdead9b215b2379732260286a1a9ab043e84f5d088a3460b1d8e0
SHA5127c9032b946e1e4c72530b674a2b4bfe878eb26669816bb81bf0469da2d0418add231df4101ff2c07312d2b803049f2f92befc413046433519bc8f226c4315f03
-
Filesize
15KB
MD5d095b082b7c5ba4665d40d9c5042af6d
SHA12220277304af105ca6c56219f56f04e894b28d27
SHA256b2091205e225fc07daf1101218c64ce62a4690cacac9c3d0644d12e93e4c213c
SHA51261fb5cf84028437d8a63d0fda53d9fe0f521d8fe04e96853a5b7a22050c4c4fb5528ff0cdbb3ae6bc74a5033563fc417fc7537e4778227c9fd6633ae844c47d9
-
Filesize
12KB
MD54add245d4ba34b04f213409bfe504c07
SHA1ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
SHA2569111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
SHA5121bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d
-
Filesize
1KB
MD52cc61cd6effd0549fc42f12ef08563f9
SHA13d00db2b894d68dc0ba257866e3002ae11612b15
SHA2569230ab22ded9cd414eed65e29541584bcbc81ee9711663afd9848829b5b684c0
SHA512449024e2520ae23eec79935b4a86fd5b1cd89f80b56109295f4a98bb9fbc5df58ee71510e64bb2854dd4fbafe15de1332072277c7442d925e3e843cb162dfe45
-
Filesize
1KB
MD5484b34321d9fd647a7e668c1d4f04f5a
SHA18c8115361cb2b27160d2568a6d3b376472e24b4e
SHA256497c2ab91342a697d2dbecf253eabbee07df8b6f0bfd1c5b609c4e61ce19f28f
SHA5124f31d4ef71cafe4adf28621831ac11ec2f782dd16a9f5ad7dc611db349f341cee52f49cd5384b07c36e65136972b81b212394b02c09522e358d7399429e7e0b9
-
Filesize
1KB
MD54b9c083cb00b65ed200db148decf55a6
SHA13b17cb23743a801df7091dace2759067377f44f4
SHA2568f65cf7fee2f19501f24086222d08137c00aa6eed779d7faaa8d12e9613915b8
SHA512f127f1022ddb0e73914d446ffdbc40126ba40296e71c565c6218c013372bbcedd53f032d8e9a0d89b4f070c0aaa2a190684fbd2be7f910172d7702635fecd0c9