Analysis
-
max time kernel
37s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 15:16
Behavioral task
behavioral1
Sample
516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe
Resource
win10v2004-20241007-en
General
-
Target
516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe
-
Size
211KB
-
MD5
f42abb7569dbc2ff5faa7e078cb71476
-
SHA1
04530a6165fc29ab536bab1be16f6b87c46288e6
-
SHA256
516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd
-
SHA512
3277534a02435538e144dea3476416e1d9117fcddef3dcb4379b82f33516c3e87767c3b0d2b880e61a3d803b583c96d772a0bdeecbfc109fe66444e9b29216af
-
SSDEEP
6144:zia1vcaEaA+HPsISAzG44DQFu/U3buRKlemZ9DnGAeWBES+:zHctWvVSAx4DQFu/U3buRKlemZ9DnGAn
Malware Config
Extracted
C:\Program Files\Java\jdk1.7.0_80\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Buran family
-
Detects Zeppelin payload 8 IoCs
resource yara_rule behavioral1/files/0x000a000000018710-59.dat family_zeppelin behavioral1/memory/1856-92-0x0000000000B10000-0x0000000000C50000-memory.dmp family_zeppelin behavioral1/memory/2404-107-0x0000000000870000-0x00000000009B0000-memory.dmp family_zeppelin behavioral1/memory/3060-4243-0x0000000000870000-0x00000000009B0000-memory.dmp family_zeppelin behavioral1/memory/2980-12042-0x0000000000870000-0x00000000009B0000-memory.dmp family_zeppelin behavioral1/memory/2980-24878-0x0000000000870000-0x00000000009B0000-memory.dmp family_zeppelin behavioral1/memory/2980-30254-0x0000000000870000-0x00000000009B0000-memory.dmp family_zeppelin behavioral1/memory/3060-30287-0x0000000000870000-0x00000000009B0000-memory.dmp family_zeppelin -
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Zeppelin family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7394) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 1260 notepad.exe -
Executes dropped EXE 3 IoCs
pid Process 3060 csrss.exe 2980 csrss.exe 2404 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 1856 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe 1856 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\csrss.exe\" -start" 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: csrss.exe File opened (read-only) \??\X: csrss.exe File opened (read-only) \??\V: csrss.exe File opened (read-only) \??\T: csrss.exe File opened (read-only) \??\R: csrss.exe File opened (read-only) \??\P: csrss.exe File opened (read-only) \??\M: csrss.exe File opened (read-only) \??\J: csrss.exe File opened (read-only) \??\W: csrss.exe File opened (read-only) \??\O: csrss.exe File opened (read-only) \??\N: csrss.exe File opened (read-only) \??\H: csrss.exe File opened (read-only) \??\E: csrss.exe File opened (read-only) \??\A: csrss.exe File opened (read-only) \??\Z: csrss.exe File opened (read-only) \??\S: csrss.exe File opened (read-only) \??\L: csrss.exe File opened (read-only) \??\I: csrss.exe File opened (read-only) \??\G: csrss.exe File opened (read-only) \??\B: csrss.exe File opened (read-only) \??\U: csrss.exe File opened (read-only) \??\Q: csrss.exe File opened (read-only) \??\K: csrss.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 17 iplogger.org 19 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 geoiptool.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\imap.jar csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101859.BMP.150-61C-A59 csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.SharePoint.BusinessData.Administration.Client.xml.150-61C-A59 csrss.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Title_mainImage-mask.png csrss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf.150-61C-A59 csrss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-application-views.xml csrss.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Khartoum.150-61C-A59 csrss.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe.150-61C-A59 csrss.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_widescreen_Thumbnail.bmp csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00943_.WMF csrss.exe File opened for modification C:\Program Files\7-Zip\readme.txt csrss.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt.150-61C-A59 csrss.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground_PAL.wmv csrss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\feature.properties.150-61C-A59 csrss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.concurrent_1.1.0.v20130327-1442.jar csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLOOK_COL.HXC.150-61C-A59 csrss.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\de-DE\FreeCell.exe.mui.150-61C-A59 csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02071_.WMF csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0090087.WMF csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSPUB_COL.HXC csrss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Currie csrss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-execution.jar.150-61C-A59 csrss.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\vlc.mo csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00117_.WMF csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7wre_en.dub csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\OUTGOING.ICO csrss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\org-netbeans-modules-profiler-attach.jar csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH02166_.WMF csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105530.WMF csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00641_.WMF.150-61C-A59 csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01740_.GIF.150-61C-A59 csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightYellow\HEADER.GIF csrss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Mexico_City csrss.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\es-ES\Solitaire.exe.mui.150-61C-A59 csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0215710.WMF.150-61C-A59 csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME02.CSS csrss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host-remote_ja.jar csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGZIP.DPV csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00705_.WMF csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21300_.GIF csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.TLB.150-61C-A59 csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\QuestionIcon.jpg csrss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Whitehorse csrss.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Kiritimati.150-61C-A59 csrss.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\vlc.mo csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IPIRMV.XML.150-61C-A59 csrss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe.150-61C-A59 csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_FormsHomePageBlank.gif csrss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Makassar csrss.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Zaporozhye.150-61C-A59 csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0145895.JPG csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00373_.WMF csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\CONTACT.CFG csrss.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\Knox csrss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_ja.properties.150-61C-A59 csrss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rcp.intro.ja_5.5.0.165303.jar csrss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-services_zh_CN.jar.150-61C-A59 csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18248_.WMF.150-61C-A59 csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0106208.WMF.150-61C-A59 csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14595_.GIF.150-61C-A59 csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_FileOffMask.bmp csrss.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.CO.TH.XML csrss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2184 vssadmin.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 csrss.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 1856 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe Token: SeDebugPrivilege 1856 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe Token: SeDebugPrivilege 3060 csrss.exe Token: SeIncreaseQuotaPrivilege 1044 WMIC.exe Token: SeSecurityPrivilege 1044 WMIC.exe Token: SeTakeOwnershipPrivilege 1044 WMIC.exe Token: SeLoadDriverPrivilege 1044 WMIC.exe Token: SeSystemProfilePrivilege 1044 WMIC.exe Token: SeSystemtimePrivilege 1044 WMIC.exe Token: SeProfSingleProcessPrivilege 1044 WMIC.exe Token: SeIncBasePriorityPrivilege 1044 WMIC.exe Token: SeCreatePagefilePrivilege 1044 WMIC.exe Token: SeBackupPrivilege 1044 WMIC.exe Token: SeRestorePrivilege 1044 WMIC.exe Token: SeShutdownPrivilege 1044 WMIC.exe Token: SeDebugPrivilege 1044 WMIC.exe Token: SeSystemEnvironmentPrivilege 1044 WMIC.exe Token: SeRemoteShutdownPrivilege 1044 WMIC.exe Token: SeUndockPrivilege 1044 WMIC.exe Token: SeManageVolumePrivilege 1044 WMIC.exe Token: 33 1044 WMIC.exe Token: 34 1044 WMIC.exe Token: 35 1044 WMIC.exe Token: SeIncreaseQuotaPrivilege 1044 WMIC.exe Token: SeSecurityPrivilege 1044 WMIC.exe Token: SeTakeOwnershipPrivilege 1044 WMIC.exe Token: SeLoadDriverPrivilege 1044 WMIC.exe Token: SeSystemProfilePrivilege 1044 WMIC.exe Token: SeSystemtimePrivilege 1044 WMIC.exe Token: SeProfSingleProcessPrivilege 1044 WMIC.exe Token: SeIncBasePriorityPrivilege 1044 WMIC.exe Token: SeCreatePagefilePrivilege 1044 WMIC.exe Token: SeBackupPrivilege 1044 WMIC.exe Token: SeRestorePrivilege 1044 WMIC.exe Token: SeShutdownPrivilege 1044 WMIC.exe Token: SeDebugPrivilege 1044 WMIC.exe Token: SeSystemEnvironmentPrivilege 1044 WMIC.exe Token: SeRemoteShutdownPrivilege 1044 WMIC.exe Token: SeUndockPrivilege 1044 WMIC.exe Token: SeManageVolumePrivilege 1044 WMIC.exe Token: 33 1044 WMIC.exe Token: 34 1044 WMIC.exe Token: 35 1044 WMIC.exe Token: SeBackupPrivilege 2292 vssvc.exe Token: SeRestorePrivilege 2292 vssvc.exe Token: SeAuditPrivilege 2292 vssvc.exe Token: SeDebugPrivilege 3060 csrss.exe Token: SeDebugPrivilege 3060 csrss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 3060 1856 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe 31 PID 1856 wrote to memory of 3060 1856 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe 31 PID 1856 wrote to memory of 3060 1856 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe 31 PID 1856 wrote to memory of 3060 1856 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe 31 PID 1856 wrote to memory of 1260 1856 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe 32 PID 1856 wrote to memory of 1260 1856 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe 32 PID 1856 wrote to memory of 1260 1856 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe 32 PID 1856 wrote to memory of 1260 1856 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe 32 PID 1856 wrote to memory of 1260 1856 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe 32 PID 1856 wrote to memory of 1260 1856 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe 32 PID 1856 wrote to memory of 1260 1856 516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe 32 PID 3060 wrote to memory of 2980 3060 csrss.exe 33 PID 3060 wrote to memory of 2980 3060 csrss.exe 33 PID 3060 wrote to memory of 2980 3060 csrss.exe 33 PID 3060 wrote to memory of 2980 3060 csrss.exe 33 PID 3060 wrote to memory of 2404 3060 csrss.exe 34 PID 3060 wrote to memory of 2404 3060 csrss.exe 34 PID 3060 wrote to memory of 2404 3060 csrss.exe 34 PID 3060 wrote to memory of 2404 3060 csrss.exe 34 PID 3060 wrote to memory of 2412 3060 csrss.exe 35 PID 3060 wrote to memory of 2412 3060 csrss.exe 35 PID 3060 wrote to memory of 2412 3060 csrss.exe 35 PID 3060 wrote to memory of 2412 3060 csrss.exe 35 PID 3060 wrote to memory of 324 3060 csrss.exe 37 PID 3060 wrote to memory of 324 3060 csrss.exe 37 PID 3060 wrote to memory of 324 3060 csrss.exe 37 PID 3060 wrote to memory of 324 3060 csrss.exe 37 PID 3060 wrote to memory of 2160 3060 csrss.exe 39 PID 3060 wrote to memory of 2160 3060 csrss.exe 39 PID 3060 wrote to memory of 2160 3060 csrss.exe 39 PID 3060 wrote to memory of 2160 3060 csrss.exe 39 PID 3060 wrote to memory of 2804 3060 csrss.exe 41 PID 3060 wrote to memory of 2804 3060 csrss.exe 41 PID 3060 wrote to memory of 2804 3060 csrss.exe 41 PID 3060 wrote to memory of 2804 3060 csrss.exe 41 PID 3060 wrote to memory of 1260 3060 csrss.exe 43 PID 3060 wrote to memory of 1260 3060 csrss.exe 43 PID 3060 wrote to memory of 1260 3060 csrss.exe 43 PID 3060 wrote to memory of 1260 3060 csrss.exe 43 PID 3060 wrote to memory of 2292 3060 csrss.exe 45 PID 3060 wrote to memory of 2292 3060 csrss.exe 45 PID 3060 wrote to memory of 2292 3060 csrss.exe 45 PID 3060 wrote to memory of 2292 3060 csrss.exe 45 PID 3060 wrote to memory of 2880 3060 csrss.exe 47 PID 3060 wrote to memory of 2880 3060 csrss.exe 47 PID 3060 wrote to memory of 2880 3060 csrss.exe 47 PID 3060 wrote to memory of 2880 3060 csrss.exe 47 PID 2880 wrote to memory of 1044 2880 cmd.exe 49 PID 2880 wrote to memory of 1044 2880 cmd.exe 49 PID 2880 wrote to memory of 1044 2880 cmd.exe 49 PID 2880 wrote to memory of 1044 2880 cmd.exe 49 PID 3060 wrote to memory of 1196 3060 csrss.exe 52 PID 3060 wrote to memory of 1196 3060 csrss.exe 52 PID 3060 wrote to memory of 1196 3060 csrss.exe 52 PID 3060 wrote to memory of 1196 3060 csrss.exe 52 PID 1196 wrote to memory of 2184 1196 cmd.exe 54 PID 1196 wrote to memory of 2184 1196 cmd.exe 54 PID 1196 wrote to memory of 2184 1196 cmd.exe 54 PID 1196 wrote to memory of 2184 1196 cmd.exe 54 PID 3060 wrote to memory of 1896 3060 csrss.exe 55 PID 3060 wrote to memory of 1896 3060 csrss.exe 55 PID 3060 wrote to memory of 1896 3060 csrss.exe 55 PID 3060 wrote to memory of 1896 3060 csrss.exe 55 PID 3060 wrote to memory of 1896 3060 csrss.exe 55 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe"C:\Users\Admin\AppData\Local\Temp\516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2980
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe" -agent 13⤵
- Executes dropped EXE
PID:2404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵
- System Location Discovery: System Language Discovery
PID:324
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵
- System Location Discovery: System Language Discovery
PID:2160
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete systemstatebackup3⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete systemstatebackup -keepversions:03⤵
- System Location Discovery: System Language Discovery
PID:1260
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete backup3⤵
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2184
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- System Location Discovery: System Language Discovery
PID:1896
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1260
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2292
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD578ebf07a0845d8d5ff75ef67080a28fa
SHA1651125ce189c26db2203829ac2a20d5dae1c5670
SHA256a89180a03f54a9f463fdce5be16d136096237d36d6cb9e16a7a774a87c4b4f8f
SHA512b6a9783bc3bb45c0001fa2657663646588b1aac2e61b050701f83ba7e17692b0caa4b762f9acfa2fec37e5ad0b7f533a4aee0b60a9d56d9ce4c73e3f5175c565
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB.txt
Filesize29KB
MD5195063820e8a53629b04ae94d3ab8879
SHA1b70bb13521b50a7bd3f83721cfef2d5be8fd79be
SHA25690f9b5b5aac5aa19faef8a22536fc035c64ad401e0744eb5bc79d82b815b950b
SHA51221097b2eb14dac91a80eb31d33a0f359df711c11c8e86df9c0a662190194e1350bfb3dd1c1a677e383d74b4d0cbe318fa66ced998befb017e6829484b307843e
-
Filesize
125KB
MD5c250681850cbe31b7724f82946e43080
SHA1786c8d7eddbf6f3c9adee888b3d5bd2ec679e3d9
SHA2562fbb5555ec7046824be4317ea2f4a3adaafb488a52dd92a335b7e2ead5008ee7
SHA512ddece1aa885be35fdbf9c56a9934331100a14f885a6d3c5822bef73ca5ee7fdde6f452a662973c7adf508126b25c40620fc3d728a8d0c3240b36bac5b4edc85a
-
Filesize
7KB
MD54de3b8f3cec91663f2522939d741d5c9
SHA197b2148d7baa8a352b620cf1749bbf07cfcf6a7b
SHA256f3b19bf7b9a98c8d5e2eecc395bb92bc1b46cdf2900c08931b2992e4d157d52b
SHA512f79cccb8e16e590fcc0cc4902a7ff0d8c83f3a76d3347a3b63551e06aaecffd9d188b9c00557fc2ddbe40236daca88cf3102cefc7acc02095c8a201967fff670
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_OffMask.bmp
Filesize8KB
MD5b8f9f011edeeaa1354826be8ec60fb9d
SHA1ef3488dbcb40d929d55765213b26c8d4a64a0f51
SHA25667f80541994f1f9f789eaa560c057736b40cc733396cd37cb16f96fa9d58510c
SHA5122291def818c604d818aed1b3d7b62129cfb0a388493e141740e307fb09cc9f3ca4f160f717a4dadaa3374518722de95ef82ebe20fad684a45c932c497e0d3733
-
Filesize
78KB
MD59e779fb04581d3869fbda7bb079f0bc2
SHA12bd0b949f18d276027e6d301ba511450dbfa0ded
SHA256d9494d03207647bf04f21a68e7bdd10dc68c8304536f1b77188368b396b08404
SHA51208e4eedef4d6e81359922168d2597bb6c921fcc3a066a5b2557cc23fb63dc8a86b4f3649dce3e2c9bee96c14aae3e55ca0b323f5d2ec58e39c03e38e07ef63d5
-
C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\Microsoft.Office.InfoPath.xml
Filesize249KB
MD519728993eabdd6bb6211a1f81b09f1ed
SHA1350330e777e50d15ed8a08a6abc39472570bdfb1
SHA2566185f28c1b4a689a8b98ccca4a41bf531c66d663e5bbb4e4d52a618248228d96
SHA512b4ab70233b5630d8ad4242144453b8de7f0a9308dd1b0105ed363b6e8e817bd49554973d2d99845efc56b09daa91bb7cc092c131b4e45449e748cd7329000814
-
Filesize
78KB
MD57ef0888e9ea2d06b24b7479bae281fc6
SHA1512cd192c51132c50197d29d6f0152380743ad34
SHA256b36530eb69b00f1b8e5eb138f61c0557c11d7bc4d8c75cfc43098196f69c9942
SHA512d1d41804b606df037bfcdc404cf557374ad2c9110f36375f21391d9f1266ff1b27dedd9260a24b6520405edc8bf11af15f51b7ce59a5967db839059608d58c5e
-
Filesize
78KB
MD5987b5edfcca294b31d8374893e404746
SHA18b847be43da63f3a146dec234c61d445e122d98e
SHA2562718b2e1a9d698c7d51a4fd321d78681349a56e2c0feb4f9273d6f419b268edf
SHA5125e316fbb38b74a8a20953f5ee4f288e7ed90dbd98a0adecaa50960367917f855167359d1ae36951e688981268de65f5d128823c04f3d0a2fa3ffcb80249a4b93
-
Filesize
985B
MD5cca6c3787f42eba927af5977299d25b2
SHA10bca2a31079873c6d97199a0a1780d863a721a77
SHA256885c366e10b6b846fbd3aa4ee1c33b9f38b34b416b84b4b18cac5e47e8009ebd
SHA512603bfebf138e42370999bd98cfa5037d61ad79cdb0c1d2b7bb4c59865cab1dfffce79dcab495042cc7dbec434668af90875048df780a8fb6dd1e2b42a6baaebf
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\license.html
Filesize7KB
MD5b022028c02ec755b5ece57d97456b50e
SHA19b108932a86cfd1ef53f640164854b45a75a49d1
SHA2563b62f0807f724c18f4690302cb6b9cef60761c4d0fb46cc5a05a4c830d0d1998
SHA5126d190e9e30aa1c60464d0db1307471dbc3a7cc1bb49e725046288d15b93557688f394508ec885028db0ea3ac61de8a46f663fc8325d9686c29a3f157f5749358
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize10KB
MD518c8e263b800a94e9e481819f7f26db6
SHA1ba057eda54820f4db412b11714dc37697077d67b
SHA256e155f0d8f7fccea2d57bf7d53a7d973049faaadd64fac23bc64b6340d2e5725e
SHA512c1118d5873184ef4f8f44e08148a272606e74ca6e1a8db7b00471d1099a2ac20bc151f92df633230c5e7600a232dd9c8d355efe1814a72f754a4ebcf6ae3adc8
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA
Filesize9KB
MD5b3490e7f672edf0d4e62b9295c7a6e70
SHA1ee85147c339972a83d4d419f2b94b82e2d4b402a
SHA2566c6e3ebea33b35e38fa78ffeeb2a5e01fce190cd674512dc2f4d863f2f970a97
SHA5127301eb0bf689f91794a64aa30d3f78f7a7ff9abc498639375f8a0617d48a88f9cbc439dc56e54878b51122723020ac9777e190bbb24dd4aec5d37e7bea61d2fc
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\license.html
Filesize10KB
MD5d9707ed9514d8d6f8ce13c73d2827eee
SHA17e600b937c0865c2af7da62e1fce75219154f9d3
SHA2563a3b1a839f4b9020b079f6b9c653cdfb336662321bc85c7c2441a6be419be174
SHA512a3d2f89c4a6f0e2d6f43192e32c70f98b516460bd0088de4e695f2a4d993b08a2e05b2550a53c63092a82e9803ce18f5a6ad7d3c0542d5d13e3d505690aaa8f1
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\epl-v10.html
Filesize13KB
MD51a8b13723736d31490451d9da084a3cd
SHA1542286faef978b16ef723acc9618728257f6dbb0
SHA2568de668e1727a764d1a3fca82b4fd5bd04e5b7600527b96b3f8b10288896dc69d
SHA51267bda51f1c97bee6923dd7f4f7ca7856aa3efa4ad73f0c61d3e3a2805eb24cbb2d858ef1c4b73eb190a6e6b6a16e35e640ceb9b15db6f9822ad7c16fd58e4e7e
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\license.html
Filesize10KB
MD5cbb99aa70abc59fe3838416571a2a575
SHA1852f503b453f3ffb05e91ea50e00be75c82f6877
SHA256c53ec6b4151bbd66f05eada6c1db2953f64c80ccd6fc52ea2757bdb1f9636409
SHA5126fe98e8dc6f7c587c5dfe9a2b6468c6b05686c46b61107c53e976ee80284dd809bbe7a8ca54542acf879f11b8e519bf388f22f8324d5067bf0b80b8bb66fb2b0
-
Filesize
586KB
MD5e38eabde759374e704dc5035d7dcef84
SHA13f0fc31f3863dbcd8318b6a23dc4759920088d6a
SHA2568a511d8304776fc977bd3c1217d1513f34ad518f8f934b659265580e964c133c
SHA5126b70476af8169d7cca0aded0a7c9976c472f86e4b7c2f8daf3e79d889a37a49ac2d531ad4aa726e747be684a31c3ff02414bbb347cd7b4272bd24245629acb5b
-
Filesize
615KB
MD5b8af454d2b1b477beebfa932b145de18
SHA15dfed3e9f7fe19eaf6da986bd3897e1a235ae293
SHA2568768c4e6914da5cfa03023d3d68dea241b570eda811b649d4eeba38521850719
SHA51213c79bc47d2fe50bf106a6d2c22df42e155c44dcc26a8b630d5fec83591f1c1fb9b6e9ce6b953cef9152ed1bc0bf9b0797837f5f7ba8c522b60a1a9d7e7a1abf
-
Filesize
612KB
MD5af6f9ae55fc4c9dc577507532d36b8ad
SHA116aaa85a4bea97266800a140a14cc4af97ba9a1e
SHA256a247961a7c8dedccd9991cc6ac1b4cb8e5c93acb09227add2001d145db0994ee
SHA512bb613da4709c763a548fba903830d78179617907b1a9c937fbcf83857fd6db65f15615e1fd195cccf3197d4e87acddef36020ae4d69cefeef4edd4731caf8f5f
-
Filesize
579KB
MD52e0bc06b556dce243a830062ac6e5acf
SHA1b6b444f833f14cdc8948245e0dd17ee55042b1f7
SHA25699e18f1cf78a5172bfd75eaa51659c04e81e4c1aa93ad276df8ea577a48b76c1
SHA512ef2cf2a84a549baf97441dfdd22d49491413d40357bfa2bc58c68ea435434b0ba15345040134b4822fb1dc3d3e204d595a881ce435b18006b4ae866f3c589840
-
Filesize
615KB
MD5708b5b21570d3939e078b889bf787d79
SHA1c0f471b1668e6ff57c5e84b2ec0c07aacd8792b1
SHA256b47dfccc3560289f4151ed61143ed83d25c81b078821d08b45fb1e9dc458fde1
SHA5129b3d6ebff40edde1b0455548310ddb3fc4f4ceb368b1ac83d4b9fbfe6f50c643dd1d6f8efbabde3fda2e1a500667d4a99b804b682e8a14a5a19302d5ce6adc36
-
Filesize
614KB
MD5d5a24ca5a36c705fa8ba25dfcd29b0bf
SHA129f88c618dcbedafc523f08504eb6b50a38bb5fa
SHA256e4802c5f5b2c8a552cae1821cc72e39b2b8f9520fb6102860987b6ff5091ef19
SHA512195961a38ef0b382b99b42c7c1d8d01762e3f6e7ad863b3210abfd1ddf2e41f91d8d315a459c8beb0aa4e49654007ce01e75b7f8b9db384e75ca12b127a1d339
-
Filesize
552KB
MD5a990c65ace507cfa5c9cf5829e1b7b7c
SHA18642dec7da1679a31a30cf67450d73506a067fa8
SHA25610a65e43591cc019ddd35087c65d18c96addc7a2ff491985261c48f7f428dc7e
SHA5120f6b3fec85ce3deb12224fa112aa407ddd596a1acfee25f6af64a6b5afe5119567a79029821d472272fbe7ad22aa3b74a5b440290be9f518561e62b18163b7f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
Filesize2KB
MD55791ce14d938759d04fa9b6177950ffb
SHA1d93e5ae271f0c1c50aa448be646d606bef2abc2b
SHA256d9be1a1f9466a0d0e20b2e86c18a6649274c2b53481e4b26a6103e187c12c7bf
SHA512a4ca9467b2365e099b3367396f1021a2b126ae9ed3fd55c364bdadf26306f5add5f89729b9a9b334b2de2e005b0037946fdc3f123d8c22360ea47ae600dc160c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_268232F9B7ADFD0751C3D83F667CFB78
Filesize472B
MD5fdc68739fed73d2f3ec23e2496e08bd0
SHA17aec7970c7c67b20d870a14d19cf7f3d881ce39f
SHA256e82a98381f6a0142afa46437513240ccca7a9276c42f98c903525650e5ce152f
SHA5124dfc1dcd188e9f3d058423645d77dd0a33688ec77904a7952a3afd13444b7b8a00fe32b342d844a4c16b1c57eb87234f1f22baddf1001f68a8163e862eaffec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5ddd38f42b2cefd1c087996b24ce737c1
SHA1899b6c716a394bea43689ef8adce532a225f1b4e
SHA256079a1ea15cdf7325070eaa4f84b78cb6f7d2f0bced7bb1f796a5a1bd0cad6353
SHA512644f93a7ec0e76f8fd2d1a2a8aebe1ccacb8c7613bab0af475fa96e342f03e234992150ddd9109a2218042b7f30376eb56d8a826f1f4c1730eb09523e49f534b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
Filesize484B
MD5f537c2b4baa3d2f6636cad5d4dcc20c4
SHA14ff632da638ab5307dac24ca35789a27705195f9
SHA256e97c2338b608b1a17b17b5132ee2b1b827a978d1bc21a5db9ea0cdb2bb6df0e8
SHA5129160877d40eb49104cd5356bafa9bd14798ea0786b7af2f20e1c01a48186665dd9b17127fa7b8c874e352e9b1056ebadf6f9ccae0248df4310b235a8564f757a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_268232F9B7ADFD0751C3D83F667CFB78
Filesize488B
MD58f4ae82d2810b72fb7d0e2951b59bdc7
SHA14b2c72bf91d83f43ab9fc0722c80b33f74218686
SHA256df82aced0f05621aa984d7fefb166174d5a7e6fcd930f0920b642ba642f00dc8
SHA51251ee519123d365c3af2e86ae6f984e076ff98b3f5f33627fe44e727481315b86bd47e9c73d51bc3de261aeeb78e9bc0680900bcd87e7882a18bc40aef1f56cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5328c118254061f4acd59f8b8df93c52c
SHA1f972645417cc94cfb197039fa8145533e888cd44
SHA256d85478e0c76cb237617a16a9b9fe12cd816a36ad02a07a7989f6081120ec13d8
SHA512ee71bee2387984b6e4a8f5b0961670ead7a288c9ef3a565711c550d3c078a3db75d5aaad1d4339c0f4372756ff42722cfd1605ca600f08a81a5da2716f15c5c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD591cec5dca3d86dbdaa16d2e60b2f2468
SHA192c165c092bb86569f3d03920933b2daf0b9651a
SHA256f427321a240dd65340dfd85c5e5df789d1f856c95fd6a0692bb506f0ab1bf4dd
SHA512ba243db45fe65eaa95f041d22750389624a5bf8bed68be6b7004f8365737fccee155c6340295ef7341ab5c7b445dec3a03c7db4cfefb6670065788acd457f10c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\RSSV85TT.htm
Filesize190B
MD56ebbeb8c70d5f8ffc3fb501950468594
SHA1c06e60a316e48f5c35d39bcf7ed7e6254957ac9e
SHA256a563426e24d132cd87b70d9cb5cd3d57c2e1428873a3f3eb94649cf42e37b6a1
SHA51275cfab1c9f5a05c892cf3b564aed06d351c6dc40048faea03ae163154ff7635252817d66b72a6ef51c4f895eebf7728f302df51148acce2a0c285502bf13652c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LW44N8OS\RPURAA7H.htm
Filesize18KB
MD599a5ced9dfb5824225a0fab4c74a7b46
SHA1f0ebed42f94fabe0c10dcf1eb3eb084a904e144a
SHA25644b3cbfb57079b2570e5ae94942d8e00ce0291c26317c2649a41101018bab25a
SHA5122966164e08f60aaa0078dbfee9f4d5521b5c02525dbbad4ac14df0d6be948ba98ae1da33e05ceec07abd6d8a18278c399629621803acdccc91019372fa3152ce
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
374KB
MD507ff1e23bfd70f181077857615cf205d
SHA129e79ec1dedd92fc330722e7e632a98af229211b
SHA2563275fd1abd31599e6428fcc9bde87e8154e0d14b1fe60fa3c1dd3850563dafa6
SHA512034e87935084e8ba409a2de4654ef2a90a36eb16ad3e38e8e42f9c87266a348d87ee3d972bdc0fce550a58c49fd8285c59258c329a6c4c281947c2cd5e51e3ff
-
Filesize
350KB
MD5d5cd7b2718c4fba72d440fa43fc95351
SHA11a5a3202eaec32f4d7be51fd3cb5319ecf371f8d
SHA25615027dddf22e7c63cacbd58faad67ea4e646d9a4e3707e1c9e60ee83cae66773
SHA5125c10dfdf86b70c88ee51a494e39376cb8a13d86b7d3069aba3e9961af5d23dcec7dd0eaa3c9188c44d360624c696946e5b13861db717dc8077ac605c19f4b365
-
Filesize
653KB
MD5d669973e125c281633f96249f038cf75
SHA1bc2863a1e283d9fae5b5aba2bff47f3471ebe2bc
SHA256f4d1028b70ba560a6b9c816218cde8e3523ad49881b5da7b2d91ad03fde531f7
SHA512e9b1ac3e3087fe7e93f73e9d44c0514c73368fd9667e218cdde45d17178a994864cfff86a63589d948ca49263087d9d0370f2b4f1ce769f24e0f4210a0f6eda8
-
Filesize
560KB
MD58dd7ce79cd6006dfba18c27c36bd11f6
SHA1c32deb42a458943e873ef33efad1be49bd6e6f6d
SHA2561e6258b84488c9dcf6b23b7b216dbd2b12f3d59e631c9f9297affe98c3c5a7dc
SHA512a1444d4bd6d065560e0a29796d17d5f0bb58a022a113c7dadb854b3cccf70d7afb3daffdfa613da0d8ab99596c6945b86b97981652f780ae14be51d87b365040
-
Filesize
304KB
MD5b49c1222230709aa497648e6a9e2f6cd
SHA1816e6f5db317ac045b2f862bc9f9e9477634fae9
SHA25605b725b6a70e8c637669a93028a28c45fa841ef590c4cd7787738abb9001fd5a
SHA512f1d9ab09cbfa5e814de99cea2c964d60fcfd293d2d2c3d83276fbcecc40ae6f35e99268cd62cc9d3674e0cf33dba90a3defd92aa9b3b19b453532a5afa8ec505
-
Filesize
327KB
MD54585d34a6d0800c7f17f925544e3a25b
SHA15772d1b8a7dc68e8da3b40476eaaf445a68b2fde
SHA2564615fd1f67c07912a78820513a72b7d20c91fa886461b2e8bd81ef6d5edc8a4f
SHA512006f589befc67ef92105ae666ad25cec2eb5f631dcce84ec07823fff92828dae792bf1e2221e4a16cf788bd45c3658e4ea9980205ce464f97d37cf523e400158
-
Filesize
606KB
MD59e13937ae3dcee1bbb91aa07788a213f
SHA15c920f590c66c387b66a3b380a51a2bfca049bb4
SHA256943a504b51a4008788b445eb7333bef9d07aac7e4d375014276f914fa98b0706
SHA5120e0964e1accf62a129d0c6a6fc05693813ae4659c378110fdd67f784d476b59733027f44c1e97a92b62dbf5513713ccbe219d02792640f4bfbf346b3032e0906
-
Filesize
536KB
MD593de0800e04d6b8066c3810bbb3c3897
SHA18c44abe590e5a7c984831481aa8559ac875c019f
SHA25648f2dbe64c73df8994d05a71129a12c5fd9b58949060802443912d86ba2bb012
SHA512a6ab6c634c3dbaed5fc39d681910fc10890648170d3329e73ce3f0664c0fa0c6972e8ea130b752f009638ebbd45460312e54c89cea1a3202290b159831da1ada
-
Filesize
1002KB
MD511ffae086fcf545121c67cad81d84818
SHA166e366a09a8b9c8b6aa6b2ce057075a22dd6f025
SHA2566020aedc535785b22f74964d9caa9b42cc4a76084fbbc2bdd3b6446b73f9ea7e
SHA512faad283d4118263ccdb61d2f290d10a52b5fbcc403d39bee89d7fcec3fa6d850d5773b07cd83c65927c304a568960a1e12478109e9448b3011e5bc72497b2522
-
Filesize
699KB
MD5b92e7e10ad8c5583084ab864071347dd
SHA11b5db5b0ac3c86e7fd902ec06a1207118c0cfff9
SHA256059ff9413f7ecd46dd8918488410bfb1b15972d72021df9657283e22f40881bc
SHA5120179bded1829a893ca2da716fe37a9a6bc3659c30ca601c84a70e7276ccd7764f98c24b14847fa4f78e8e540c53d902cefda72221e5808f134480dc3febee4f1
-
Filesize
16KB
MD58c7f34f69f88c534a87957c2b25987f2
SHA1d2575bcfc4664aaae1603def708013dea83ccda4
SHA2565bc0297924eccde4297a2170506501dfe1852cf7bbde84c2c8e35baa9ba711d4
SHA512a18633f490e51b47727534732142078c6f7761c12b96c576c85f5b6cf6c026f938c82e70f5c0bcdbaf3011328db5fe7d523edba6b610a4884ed5f20d36c22e32
-
Filesize
583KB
MD50bcc3cdc255e8ccf7d8ef94f2ee8bd94
SHA1b39bd28c342010fb54a8eae3fc0daf20d694b9e9
SHA256380bba97e9a4c5ec0d0f6d1bb3c3c8169133d5a8e4ff76810037c6629011ada3
SHA5123ee94f209120b43906321137c2df24828dee4aca8f3aff379c44abba06d256baf4e513368b364190a429649658554ad15945d5e114cbdddd2317a2eb8e13949c
-
Filesize
443KB
MD542a47c744208bdaf2170eb9f1cc8f687
SHA14a68436ab60fcb2edfabd63bc791aa696cd3dfaa
SHA256bef511a61174fa7e47d088e74a815ed5056666f122ff158c81c7a5e719e90568
SHA51230d8de85fb87102d2f746ae77d43a97b4d75ad9ff5678cac335eceadd8324d6d685713e8ad774b313490745fa64a63c65b2f660aa962a340777f6e1565427dd8
-
Filesize
490KB
MD5df0f538cab957e3cf2e6b02a6ba51db8
SHA16e187521363f2c5cce4f39a3070d39a487045190
SHA256024dca7a9bd2b9ef6cd311cc9ab68b965f68821c9893d2e573534a65c8d57544
SHA512e7256c837efe5e423349b5e9b70550e917c3bdfec8f2e433b1da567587af75f76a545151ed7655d9c79f2070b8fe95a46ca7387ad5a1478455e8529eb54d44d8
-
Filesize
420KB
MD5b2b3d7a5a31e2a0a7d8a08ca46e0761d
SHA14f3c3fac6ee757e165753134cba8d243dbd2383c
SHA2563f77619442c81a69f68d17b2dd4a4a147fe2cf70bead6cb6299b4c6759a03c43
SHA51207253500c1f9d8b7ff6f0d6e47e15c3c7ece3d2e90a35954b8efe54e4935da28a102d6fb570ec6ae8692539d89da0260bf7a4f6068438a830b44a8f5603e099f
-
Filesize
15KB
MD51f5d9e10cde569fe3561c1c86e45ecea
SHA1a4bec929f71087d6a19fc98bb54905f408fcc418
SHA256f2841303e8609d24bdd77a0718af352124027f38a9e61f3a5ccc94252788815d
SHA512e44550bc135781b123f035778da25625c8eb3d442ca6a1a9a8fec2cf8eaddb80956244d17902f4d887f24063db812678f8cff80fd70cd63a5634e48e3dc0ed13
-
Filesize
397KB
MD5e2e464dd10a1a180991d3e86bc9999b4
SHA183e32b2c569171d579c556c663c0cc513dc4e900
SHA256653b17e8ca05e294a11b166cf5a28b43b773ddf124277fb87f4669527be0cdd3
SHA5120aa52c85f13d893b1f2890e74f8e0df130a20b913099939367bf63cd500ccbf6bd67332fa2886dd62a9d413b53f0e6df452713a221d792e3a302dd4654f189ac
-
Filesize
513KB
MD5114a30518469dd6f46aa2f73d78aeeeb
SHA11f95a43f7ceac2030013ab8b3da4e9bb281bfb5f
SHA256d3b24922bd82687751296a7bb87788d2120c425e9ea640f6bd9146939b11970e
SHA512ac938de473c4f82b4ddb1eceabd9b07519d46300ac9fb21211950d5a584b81f6ce46658e758867cc251a15b31e6932ec3be2c57952aa227b0a2010ac8bd0bd54
-
Filesize
257KB
MD5c0bfc5a87e86fb4a49b169047d6b61f6
SHA1e88bc60dc13d66f9ae4f7b5c1da118d910b93677
SHA256e84e3860c3890d2e56e1105de95ce8261c6eb013a214ccd6f1b6c048183cc334
SHA51225211d740783a5dc8d452b33d4a33f2b3c913f9aa1c80d295c8b07c26ce305cbdc54563ce409e56de3944639c82e06e04711ea4f80e78107dbe1ceb07e348699
-
Filesize
10KB
MD58dc670282436e2bbb0bd3ea5d452752c
SHA1b0c27a92ae5f9d23d1e349f7108787e9b2a57708
SHA25627e883c22909f405ca7ebada945abe8bd76d8ec27a98bb029b4b3562b36da002
SHA51262d8f3c283f22dcb461318e8b86bf3c7eba999c08b6ce3d452655d204805e3956ad6161019a39e06f36fa342ceed69046c1b6a3d03480876819cd3d6f8a8bec7
-
Filesize
13KB
MD5c23ba7ec1a07e041f3afb65eeb07dc61
SHA17f9e36c35db832f36ade80b830b81438d8b4ec20
SHA256518c89e021c0a0f2a4930574494b75256edf306464b8b2561260bd32690f1d2a
SHA51200701d8a1ef1a86ad695da15979688a4b8562b9d0726423ed7a6ffb13b5b2b9f0dcd476b04f31f3caca443ab9eea8dba5779faa1c98b64553f703f97bec903a2
-
Filesize
467KB
MD5effb78f6a4006067efc361a40450a1d9
SHA18fcef61ba83074035000c84fea9dc169d0a10d53
SHA256c4995ce91522328e4ecfe18ece57de9ba7dfbef84f324c6dc4748a2b23b9b22a
SHA512baa84c5a6237971779dcf75665ac000e94e5aa7cd298793e68f773f0a2f91f86dec966c338f921c6d8e6074f2ec60b92f0b9478a75d13c9c5b93575b3fc7b65a
-
Filesize
723KB
MD5f28901303414b7de81f419cfec042e28
SHA1f2b86227e28ef73e79e0c209aa17d88e0accdd12
SHA256ee21153f7ee40d85bffc4c53eceba146df640ad8c1859038dcfa57127c0cbf3d
SHA5124223b3c70d4f86d48b280103d78f2c4087de03703c0fe2226035472a37392a57b14d09d7b53436f37b7a3a9d5ff4beb40c4041e72660c724296005a2e16fd3cb
-
Filesize
280KB
MD585d3a72553309212c072088e6f069823
SHA183f392ecb94d2d60658794c06280d6c0d17c9441
SHA25631d711563802cfc3cd56dd34825bbe34cdeac077e065760dc8314da8be5c817c
SHA512c27ab0a32776662593123318d184fc8fcf4e15b88558937585e41c8523c328ed79334c08704b1fd179107b0665410dc8ba7b64579f77fbe91354a83710e32d05
-
Filesize
676KB
MD523c9a70c0133988f7b119102011eecbc
SHA1eee081e6e9dc449d14cc52716968b4c5984f3e0d
SHA2564b78b527ae9fb60f05d78f22acb52d85c9b1b7d1ee9c6f48260440808a3942e5
SHA51270611729435fda7f5cfb6d9aeb82248e749bdeeee592903f339b8f680a75545567de92faa9e9ef3316c06a2d9493a1ac88ced3405cd00be9ef2162f7a769cba1
-
Filesize
83KB
MD5dd83adc497ae5f7db7c9ba81b453d966
SHA1ce81e3ab73c9d736fb1e14fa782d04dd73d543fb
SHA2560d0c9be3ca0129b62210866e6e29b530df4dafc34cc503a3e19bbbabf3ae1ffd
SHA512cc00c460c78cf30ecce49a13b51213ab3c607be9e5c8dcc1ae9226119f54dd02f18266f581934ee858cf7c382780ac6e3b8d5564f3cea069000b67a1fdc2de91
-
Filesize
211KB
MD5f42abb7569dbc2ff5faa7e078cb71476
SHA104530a6165fc29ab536bab1be16f6b87c46288e6
SHA256516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd
SHA5123277534a02435538e144dea3476416e1d9117fcddef3dcb4379b82f33516c3e87767c3b0d2b880e61a3d803b583c96d772a0bdeecbfc109fe66444e9b29216af