Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2023 18:36
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan-Downloader.Win32.Zenlod.gen-a62e5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
HEUR-Trojan-Downloader.Win32.Zenlod.gen-a62e5.exe
Resource
win10v2004-20221111-en
General
-
Target
HEUR-Trojan-Downloader.Win32.Zenlod.gen-a62e5.exe
-
Size
3.1MB
-
MD5
57d5f9084e85136726b91aeea40d6855
-
SHA1
4df0f013eff1c16fd0bfae00c4738a433b11b866
-
SHA256
a62e5c321acf5b890bd7a235ea62b8a4061e9ceb1273310ac5ccae57d583cc5e
-
SHA512
55f52e180cabe91bd978266aa58ffcda0fb58ae3fffba04956fdc4a61264f97978382d4dc8f90b56ff8b19fa36f2c65013fdda806287219138cf5da10e242722
-
SSDEEP
49152:EgmUPjwG716Gij9smMXGeX9kgS49XCWNB1LbsVRNwVFrysBPY5sHXZT1laZqs8dq:JHjy5smnea9W7dsVRNwVFrysfJnaMsv3
Malware Config
Extracted
nullmixer
http://razino.xyz/
Extracted
vidar
39.4
706
https://sergeevih43.tumblr.com/
-
profile_id
706
Extracted
redline
DomAni2
flestriche.xyz:80
Extracted
amadey
3.66
62.204.41.27/9djZdj09/index.php
Extracted
redline
Andriii_ff
185.244.181.112:33056
-
auth_value
0318e100e6da39f286482d897715196b
Extracted
raccoon
64b445f2d85b7aeb3d5c7b23112d6ac3
http://45.15.156.209/
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.210.137.6:47909
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Extracted
redline
gula
62.204.41.211:4065
-
auth_value
4bef3143c3de8ce351d43c906a88fb8a
Extracted
redline
Medi2
167.235.156.206:6218
-
auth_value
415e49528666a4468e12b696ddda231f
Extracted
redline
1
librchichelpai.shop:81
rniwondunuifac.shop:81
-
auth_value
b6c86adb7106e9ee7247628f59e06830
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Fabookie payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\sotema_4.exe family_fabookie C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\sotema_4.txt family_fabookie -
Detects Smokeloader packer 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3168-203-0x0000000004520000-0x0000000004529000-memory.dmp family_smokeloader behavioral2/memory/3632-370-0x00000000001C0000-0x00000000001C9000-memory.dmp family_smokeloader behavioral2/memory/4216-383-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/876-387-0x0000000000580000-0x0000000000589000-memory.dmp family_smokeloader behavioral2/memory/4216-400-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
Processes:
sotema_6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sotema_6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sotema_6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sotema_6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" sotema_6.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection sotema_6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sotema_6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sotema_6.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4104-219-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/4104-220-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
pRG0gvEmESQD_7061N1lCnvr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ pRG0gvEmESQD_7061N1lCnvr.exe -
Nirsoft 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4700-208-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/4848-230-0x0000000000400000-0x0000000000422000-memory.dmp Nirsoft behavioral2/memory/4848-232-0x0000000000400000-0x0000000000422000-memory.dmp Nirsoft -
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1092-215-0x0000000004970000-0x0000000004A0D000-memory.dmp family_vidar behavioral2/memory/1092-218-0x0000000000400000-0x000000000442B000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\setup_install.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\setup_install.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\libcurl.dll aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 37 IoCs
Processes:
setup_installer.exesetup_install.exesotema_1.exesotema_2.exesotema_4.exesotema_5.exesotema_3.exesotema_7.exesotema_6.exejfiag3g_gg.exesotema_7.exejfiag3g_gg.exeJKW84x_hLXL9S8vwbUeX8ftt.exeiHGCniowQKSKChWWe4hoKSoL.exejTv06kcTCs2UKcFUsoENmQXU.exedwVjwTs85h2vZWB9JFmQHb_C.exeqiI93H7BC8AgqrrfGDfR_k4F.exe_o5EMFhHGV_Y7c97ALdVxvi1.exeiHGCniowQKSKChWWe4hoKSoL.tmpArYwSoPTPdZOhOc3f19EsNtR.exenbveek.exeQq2L6mrT7VabjJL6S20peA7_.exefinalrecovery.exeMJdJ1KSACyuwB6GZPSimMgg9.exenv27pXSf6IUIMhZZK_vlxNYK.exepRG0gvEmESQD_7061N1lCnvr.exe123.exe321.exeObGo5X.exegula.exenbveek.exebrost.exenbveek.exebrown.exebrown1.exedwVjwTs85h2vZWB9JFmQHb_C.exenbveek.exepid process 4516 setup_installer.exe 2004 setup_install.exe 1252 sotema_1.exe 3168 sotema_2.exe 372 sotema_4.exe 1544 sotema_5.exe 1092 sotema_3.exe 1552 sotema_7.exe 1576 sotema_6.exe 4700 jfiag3g_gg.exe 4104 sotema_7.exe 4848 jfiag3g_gg.exe 1324 JKW84x_hLXL9S8vwbUeX8ftt.exe 716 iHGCniowQKSKChWWe4hoKSoL.exe 3136 jTv06kcTCs2UKcFUsoENmQXU.exe 3632 dwVjwTs85h2vZWB9JFmQHb_C.exe 1996 qiI93H7BC8AgqrrfGDfR_k4F.exe 876 _o5EMFhHGV_Y7c97ALdVxvi1.exe 3984 iHGCniowQKSKChWWe4hoKSoL.tmp 4700 ArYwSoPTPdZOhOc3f19EsNtR.exe 1004 nbveek.exe 5020 Qq2L6mrT7VabjJL6S20peA7_.exe 3056 finalrecovery.exe 3824 MJdJ1KSACyuwB6GZPSimMgg9.exe 4052 nv27pXSf6IUIMhZZK_vlxNYK.exe 1544 pRG0gvEmESQD_7061N1lCnvr.exe 1648 123.exe 1836 321.exe 4348 ObGo5X.exe 860 gula.exe 3820 nbveek.exe 3792 brost.exe 4872 nbveek.exe 3028 brown.exe 2352 brown1.exe 4216 dwVjwTs85h2vZWB9JFmQHb_C.exe 4576 nbveek.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx behavioral2/memory/4700-208-0x0000000000400000-0x000000000045B000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx behavioral2/memory/4848-230-0x0000000000400000-0x0000000000422000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx behavioral2/memory/4848-232-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Processes:
resource yara_rule C:\Users\Admin\Documents\ArYwSoPTPdZOhOc3f19EsNtR.exe vmprotect C:\Users\Admin\Documents\ArYwSoPTPdZOhOc3f19EsNtR.exe vmprotect behavioral2/memory/4700-266-0x0000000140000000-0x000000014061C000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
pRG0gvEmESQD_7061N1lCnvr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion pRG0gvEmESQD_7061N1lCnvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion pRG0gvEmESQD_7061N1lCnvr.exe -
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
sotema_1.exeqiI93H7BC8AgqrrfGDfR_k4F.exenbveek.exenv27pXSf6IUIMhZZK_vlxNYK.exefinalrecovery.exeHEUR-Trojan-Downloader.Win32.Zenlod.gen-a62e5.exesetup_installer.exesotema_6.exeJKW84x_hLXL9S8vwbUeX8ftt.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation sotema_1.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation qiI93H7BC8AgqrrfGDfR_k4F.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation nbveek.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation nv27pXSf6IUIMhZZK_vlxNYK.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation finalrecovery.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Downloader.Win32.Zenlod.gen-a62e5.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation sotema_6.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation JKW84x_hLXL9S8vwbUeX8ftt.exe -
Loads dropped DLL 11 IoCs
Processes:
setup_install.exerUNdlL32.eXesotema_2.exeiHGCniowQKSKChWWe4hoKSoL.tmpregsvr32.exepid process 2004 setup_install.exe 2004 setup_install.exe 2004 setup_install.exe 2004 setup_install.exe 2004 setup_install.exe 2004 setup_install.exe 204 rUNdlL32.eXe 3168 sotema_2.exe 3984 iHGCniowQKSKChWWe4hoKSoL.tmp 3096 regsvr32.exe 3096 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/1544-302-0x0000000000A50000-0x00000000010BA000-memory.dmp themida behavioral2/memory/1544-351-0x0000000000A50000-0x00000000010BA000-memory.dmp themida -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
nbveek.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\brost.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000003051\\brost.exe" nbveek.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
pRG0gvEmESQD_7061N1lCnvr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pRG0gvEmESQD_7061N1lCnvr.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 66 ipinfo.io 67 ipinfo.io 11 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
pRG0gvEmESQD_7061N1lCnvr.exepid process 1544 pRG0gvEmESQD_7061N1lCnvr.exe -
Suspicious use of SetThreadContext 11 IoCs
Processes:
sotema_7.exeQq2L6mrT7VabjJL6S20peA7_.exeMJdJ1KSACyuwB6GZPSimMgg9.exe123.exe321.exepRG0gvEmESQD_7061N1lCnvr.exenbveek.exedwVjwTs85h2vZWB9JFmQHb_C.exebrown1.exedescription pid process target process PID 1552 set thread context of 4104 1552 sotema_7.exe sotema_7.exe PID 5020 set thread context of 4300 5020 Qq2L6mrT7VabjJL6S20peA7_.exe vbc.exe PID 3824 set thread context of 4892 3824 MJdJ1KSACyuwB6GZPSimMgg9.exe AppLaunch.exe PID 1648 set thread context of 4768 1648 123.exe vbc.exe PID 1836 set thread context of 2472 1836 321.exe vbc.exe PID 1544 set thread context of 3560 1544 pRG0gvEmESQD_7061N1lCnvr.exe InstallUtil.exe PID 1004 set thread context of 3820 1004 nbveek.exe nbveek.exe PID 1004 set thread context of 4872 1004 nbveek.exe nbveek.exe PID 3632 set thread context of 4216 3632 dwVjwTs85h2vZWB9JFmQHb_C.exe dwVjwTs85h2vZWB9JFmQHb_C.exe PID 2352 set thread context of 2344 2352 brown1.exe AppLaunch.exe PID 1004 set thread context of 4576 1004 nbveek.exe nbveek.exe -
Drops file in Program Files directory 9 IoCs
Processes:
iHGCniowQKSKChWWe4hoKSoL.tmpdescription ioc process File created C:\Program Files (x86)\MeetsoftFR\FinalRecovery\unins000.dat iHGCniowQKSKChWWe4hoKSoL.tmp File created C:\Program Files (x86)\MeetsoftFR\FinalRecovery\is-8FDEE.tmp iHGCniowQKSKChWWe4hoKSoL.tmp File created C:\Program Files (x86)\MeetsoftFR\FinalRecovery\is-13LT5.tmp iHGCniowQKSKChWWe4hoKSoL.tmp File created C:\Program Files (x86)\MeetsoftFR\FinalRecovery\is-FOF2U.tmp iHGCniowQKSKChWWe4hoKSoL.tmp File created C:\Program Files (x86)\MeetsoftFR\FinalRecovery\data\is-GUL29.tmp iHGCniowQKSKChWWe4hoKSoL.tmp File opened for modification C:\Program Files (x86)\MeetsoftFR\FinalRecovery\finalrecovery.exe iHGCniowQKSKChWWe4hoKSoL.tmp File created C:\Program Files (x86)\MeetsoftFR\FinalRecovery\is-2FH4U.tmp iHGCniowQKSKChWWe4hoKSoL.tmp File created C:\Program Files (x86)\MeetsoftFR\FinalRecovery\is-9HVD4.tmp iHGCniowQKSKChWWe4hoKSoL.tmp File opened for modification C:\Program Files (x86)\MeetsoftFR\FinalRecovery\unins000.dat iHGCniowQKSKChWWe4hoKSoL.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4904 204 WerFault.exe rUNdlL32.eXe 3048 2004 WerFault.exe setup_install.exe 4832 1092 WerFault.exe sotema_3.exe 4332 5020 WerFault.exe Qq2L6mrT7VabjJL6S20peA7_.exe 3572 1648 WerFault.exe 123.exe 4012 1836 WerFault.exe 321.exe 4240 876 WerFault.exe _o5EMFhHGV_Y7c97ALdVxvi1.exe 1488 1004 WerFault.exe nbveek.exe 2220 3136 WerFault.exe jTv06kcTCs2UKcFUsoENmQXU.exe 5544 3792 WerFault.exe brost.exe 5580 4872 WerFault.exe nbveek.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
dwVjwTs85h2vZWB9JFmQHb_C.exesotema_2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dwVjwTs85h2vZWB9JFmQHb_C.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dwVjwTs85h2vZWB9JFmQHb_C.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dwVjwTs85h2vZWB9JFmQHb_C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sotema_2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sotema_2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sotema_2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 5804 taskkill.exe -
Modifies registry class 5 IoCs
Processes:
msedge.exesotema_1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sotema_1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
sotema_2.exejfiag3g_gg.exepid process 3168 sotema_2.exe 3168 sotema_2.exe 4848 jfiag3g_gg.exe 4848 jfiag3g_gg.exe 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 2540 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2540 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
sotema_2.exedwVjwTs85h2vZWB9JFmQHb_C.exepid process 3168 sotema_2.exe 4216 dwVjwTs85h2vZWB9JFmQHb_C.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
Processes:
msedge.exepid process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
sotema_5.exesotema_7.exedescription pid process Token: SeDebugPrivilege 1544 sotema_5.exe Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeDebugPrivilege 4104 sotema_7.exe Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
msedge.exepid process 5072 msedge.exe 2540 2540 5072 msedge.exe 2540 5072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
HEUR-Trojan-Downloader.Win32.Zenlod.gen-a62e5.exesetup_installer.exesetup_install.execmd.exesotema_1.execmd.execmd.execmd.execmd.execmd.execmd.exesotema_7.exesotema_4.exedescription pid process target process PID 3488 wrote to memory of 4516 3488 HEUR-Trojan-Downloader.Win32.Zenlod.gen-a62e5.exe setup_installer.exe PID 3488 wrote to memory of 4516 3488 HEUR-Trojan-Downloader.Win32.Zenlod.gen-a62e5.exe setup_installer.exe PID 3488 wrote to memory of 4516 3488 HEUR-Trojan-Downloader.Win32.Zenlod.gen-a62e5.exe setup_installer.exe PID 4516 wrote to memory of 2004 4516 setup_installer.exe setup_install.exe PID 4516 wrote to memory of 2004 4516 setup_installer.exe setup_install.exe PID 4516 wrote to memory of 2004 4516 setup_installer.exe setup_install.exe PID 2004 wrote to memory of 3412 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 3412 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 3412 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 2028 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 2028 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 2028 2004 setup_install.exe cmd.exe PID 3412 wrote to memory of 1252 3412 cmd.exe sotema_1.exe PID 3412 wrote to memory of 1252 3412 cmd.exe sotema_1.exe PID 3412 wrote to memory of 1252 3412 cmd.exe sotema_1.exe PID 1252 wrote to memory of 204 1252 sotema_1.exe rUNdlL32.eXe PID 1252 wrote to memory of 204 1252 sotema_1.exe rUNdlL32.eXe PID 1252 wrote to memory of 204 1252 sotema_1.exe rUNdlL32.eXe PID 2028 wrote to memory of 3168 2028 cmd.exe sotema_2.exe PID 2028 wrote to memory of 3168 2028 cmd.exe sotema_2.exe PID 2028 wrote to memory of 3168 2028 cmd.exe sotema_2.exe PID 2004 wrote to memory of 4716 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 4716 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 4716 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 5100 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 5100 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 5100 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 1860 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 1860 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 1860 2004 setup_install.exe cmd.exe PID 5100 wrote to memory of 372 5100 cmd.exe sotema_4.exe PID 5100 wrote to memory of 372 5100 cmd.exe sotema_4.exe PID 5100 wrote to memory of 372 5100 cmd.exe sotema_4.exe PID 2004 wrote to memory of 3320 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 3320 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 3320 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 2496 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 2496 2004 setup_install.exe cmd.exe PID 2004 wrote to memory of 2496 2004 setup_install.exe cmd.exe PID 1860 wrote to memory of 1544 1860 cmd.exe sotema_5.exe PID 1860 wrote to memory of 1544 1860 cmd.exe sotema_5.exe PID 4716 wrote to memory of 1092 4716 cmd.exe sotema_3.exe PID 4716 wrote to memory of 1092 4716 cmd.exe sotema_3.exe PID 4716 wrote to memory of 1092 4716 cmd.exe sotema_3.exe PID 3320 wrote to memory of 1576 3320 cmd.exe sotema_6.exe PID 3320 wrote to memory of 1576 3320 cmd.exe sotema_6.exe PID 3320 wrote to memory of 1576 3320 cmd.exe sotema_6.exe PID 2496 wrote to memory of 1552 2496 cmd.exe sotema_7.exe PID 2496 wrote to memory of 1552 2496 cmd.exe sotema_7.exe PID 2496 wrote to memory of 1552 2496 cmd.exe sotema_7.exe PID 1552 wrote to memory of 4104 1552 sotema_7.exe sotema_7.exe PID 1552 wrote to memory of 4104 1552 sotema_7.exe sotema_7.exe PID 1552 wrote to memory of 4104 1552 sotema_7.exe sotema_7.exe PID 372 wrote to memory of 4700 372 sotema_4.exe jfiag3g_gg.exe PID 372 wrote to memory of 4700 372 sotema_4.exe jfiag3g_gg.exe PID 372 wrote to memory of 4700 372 sotema_4.exe jfiag3g_gg.exe PID 1552 wrote to memory of 4104 1552 sotema_7.exe sotema_7.exe PID 1552 wrote to memory of 4104 1552 sotema_7.exe sotema_7.exe PID 1552 wrote to memory of 4104 1552 sotema_7.exe sotema_7.exe PID 1552 wrote to memory of 4104 1552 sotema_7.exe sotema_7.exe PID 1552 wrote to memory of 4104 1552 sotema_7.exe sotema_7.exe PID 372 wrote to memory of 4848 372 sotema_4.exe jfiag3g_gg.exe PID 372 wrote to memory of 4848 372 sotema_4.exe jfiag3g_gg.exe PID 372 wrote to memory of 4848 372 sotema_4.exe jfiag3g_gg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Downloader.Win32.Zenlod.gen-a62e5.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Downloader.Win32.Zenlod.gen-a62e5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_1.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\sotema_1.exesotema_1.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",getmft6⤵
- Loads dropped DLL
PID:204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 204 -s 6007⤵
- Program crash
PID:4904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_2.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\sotema_2.exesotema_2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_3.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\sotema_3.exesotema_3.exe5⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 16326⤵
- Program crash
PID:4832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_4.exe4⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\sotema_4.exesotema_4.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_5.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\sotema_5.exesotema_5.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_7.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\sotema_7.exesotema_7.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\sotema_7.exeC:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\sotema_7.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_6.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\7zS4A1C9766\sotema_6.exesotema_6.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Checks computer location settings
PID:1576 -
C:\Users\Admin\Documents\JKW84x_hLXL9S8vwbUeX8ftt.exe"C:\Users\Admin\Documents\JKW84x_hLXL9S8vwbUeX8ftt.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\nbveek.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1004 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\nbveek.exe" /F8⤵
- Creates scheduled task(s)
PID:2352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "Admin:N"&&CACLS "nbveek.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit8⤵PID:4716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"9⤵PID:4200
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:N"9⤵PID:4968
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:R" /E9⤵PID:3256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"9⤵PID:4908
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"9⤵PID:3680
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E9⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\1000001051\gula.exe"C:\Users\Admin\AppData\Local\Temp\1000001051\gula.exe"8⤵
- Executes dropped EXE
PID:860 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\nbveek.exe"8⤵
- Executes dropped EXE
PID:3820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=nbveek.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.09⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffca9ae46f8,0x7ffca9ae4708,0x7ffca9ae471810⤵PID:4920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,11240093171852436159,7754935875118064014,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:210⤵PID:1772
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,11240093171852436159,7754935875118064014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:310⤵PID:3776
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,11240093171852436159,7754935875118064014,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:810⤵PID:4384
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11240093171852436159,7754935875118064014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:110⤵PID:3040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11240093171852436159,7754935875118064014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:110⤵PID:3528
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11240093171852436159,7754935875118064014,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:110⤵PID:4260
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11240093171852436159,7754935875118064014,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:110⤵PID:3388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2152,11240093171852436159,7754935875118064014,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5980 /prefetch:810⤵PID:3444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11240093171852436159,7754935875118064014,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6444 /prefetch:110⤵PID:2380
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11240093171852436159,7754935875118064014,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6488 /prefetch:110⤵PID:3780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11240093171852436159,7754935875118064014,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6804 /prefetch:110⤵PID:2864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11240093171852436159,7754935875118064014,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6816 /prefetch:110⤵PID:1228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11240093171852436159,7754935875118064014,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6928 /prefetch:110⤵PID:1756
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11240093171852436159,7754935875118064014,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:110⤵PID:5368
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11240093171852436159,7754935875118064014,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:110⤵PID:5532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=nbveek.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.09⤵PID:3876
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffca9ae46f8,0x7ffca9ae4708,0x7ffca9ae471810⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\1000003051\brost.exe"C:\Users\Admin\AppData\Local\Temp\1000003051\brost.exe"8⤵
- Executes dropped EXE
PID:3792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 12529⤵
- Program crash
PID:5544 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\nbveek.exe"8⤵
- Executes dropped EXE
PID:4872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 12449⤵
- Program crash
PID:5580 -
C:\Users\Admin\AppData\Local\Temp\1000005001\brown.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\brown.exe"8⤵
- Executes dropped EXE
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\1000006001\brown1.exe"C:\Users\Admin\AppData\Local\Temp\1000006001\brown1.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2352 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"9⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\nbveek.exe"8⤵
- Executes dropped EXE
PID:4576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=nbveek.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.09⤵PID:3900
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffca9ae46f8,0x7ffca9ae4708,0x7ffca9ae471810⤵PID:1636
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=nbveek.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.09⤵PID:5304
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca9ae46f8,0x7ffca9ae4708,0x7ffca9ae471810⤵PID:5324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1004 -s 16328⤵
- Program crash
PID:1488 -
C:\Users\Admin\Documents\iHGCniowQKSKChWWe4hoKSoL.exe"C:\Users\Admin\Documents\iHGCniowQKSKChWWe4hoKSoL.exe"6⤵
- Executes dropped EXE
PID:716 -
C:\Users\Admin\AppData\Local\Temp\is-1M089.tmp\iHGCniowQKSKChWWe4hoKSoL.tmp"C:\Users\Admin\AppData\Local\Temp\is-1M089.tmp\iHGCniowQKSKChWWe4hoKSoL.tmp" /SL5="$1101F0,1573876,54272,C:\Users\Admin\Documents\iHGCniowQKSKChWWe4hoKSoL.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:3984 -
C:\Program Files (x86)\MeetsoftFR\FinalRecovery\finalrecovery.exe"C:\Program Files (x86)\MeetsoftFR\FinalRecovery\finalrecovery.exe"8⤵
- Executes dropped EXE
- Checks computer location settings
PID:3056 -
C:\Users\Admin\AppData\Roaming\{6e1ce040-6208-11ed-b5ce-806e6f6e6963}\ObGo5X.exe
- Executes dropped EXE
PID:4348 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "finalrecovery.exe" /f & erase "C:\Program Files (x86)\MeetsoftFR\FinalRecovery\finalrecovery.exe" & exit9⤵PID:5732
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "finalrecovery.exe" /f10⤵
- Kills process with taskkill
PID:5804 -
C:\Users\Admin\Documents\jTv06kcTCs2UKcFUsoENmQXU.exe"C:\Users\Admin\Documents\jTv06kcTCs2UKcFUsoENmQXU.exe"6⤵
- Executes dropped EXE
PID:3136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 12327⤵
- Program crash
PID:2220 -
C:\Users\Admin\Documents\dwVjwTs85h2vZWB9JFmQHb_C.exe"C:\Users\Admin\Documents\dwVjwTs85h2vZWB9JFmQHb_C.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3632 -
C:\Users\Admin\Documents\dwVjwTs85h2vZWB9JFmQHb_C.exe"C:\Users\Admin\Documents\dwVjwTs85h2vZWB9JFmQHb_C.exe"7⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4216 -
C:\Users\Admin\Documents\qiI93H7BC8AgqrrfGDfR_k4F.exe"C:\Users\Admin\Documents\qiI93H7BC8AgqrrfGDfR_k4F.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
PID:1996 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -u -s N9YON.VXA7⤵
- Loads dropped DLL
PID:3096 -
C:\Users\Admin\Documents\_o5EMFhHGV_Y7c97ALdVxvi1.exe"C:\Users\Admin\Documents\_o5EMFhHGV_Y7c97ALdVxvi1.exe"6⤵
- Executes dropped EXE
PID:876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 876 -s 3447⤵
- Program crash
PID:4240 -
C:\Users\Admin\Documents\ArYwSoPTPdZOhOc3f19EsNtR.exe"C:\Users\Admin\Documents\ArYwSoPTPdZOhOc3f19EsNtR.exe"6⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\Documents\MJdJ1KSACyuwB6GZPSimMgg9.exe"C:\Users\Admin\Documents\MJdJ1KSACyuwB6GZPSimMgg9.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4892
-
C:\Users\Admin\Documents\Qq2L6mrT7VabjJL6S20peA7_.exe"C:\Users\Admin\Documents\Qq2L6mrT7VabjJL6S20peA7_.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"7⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 3007⤵
- Program crash
PID:4332 -
C:\Users\Admin\Documents\pRG0gvEmESQD_7061N1lCnvr.exe"C:\Users\Admin\Documents\pRG0gvEmESQD_7061N1lCnvr.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:1544 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"7⤵PID:3560
-
C:\Users\Admin\Documents\nv27pXSf6IUIMhZZK_vlxNYK.exe"C:\Users\Admin\Documents\nv27pXSf6IUIMhZZK_vlxNYK.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
PID:4052 -
C:\Windows\Temp\123.exe"C:\Windows\Temp\123.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"8⤵PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 1408⤵
- Program crash
PID:3572 -
C:\Windows\Temp\321.exe"C:\Windows\Temp\321.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"8⤵PID:2472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\bebra.exe9⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 1408⤵
- Program crash
PID:4012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 4764⤵
- Program crash
PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 204 -ip 2041⤵PID:2212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2004 -ip 20041⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1092 -ip 10921⤵PID:2012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5020 -ip 50201⤵PID:3256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1648 -ip 16481⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1836 -ip 18361⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 876 -ip 8761⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1004 -ip 10041⤵PID:2652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3136 -ip 31361⤵PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3792 -ip 37921⤵PID:5432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4872 -ip 48721⤵PID:5508
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Modify Registry
2Scripting
1Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD51c95a6da0e1255fba10dcc38f8ada271
SHA18a6d955b973777b86d34c1636170e80b1f46a024
SHA25679d3312ce1a5a318d17e61a20a7847c2d9160c92b004e3569db23a7b8f77c5b2
SHA512fa0542f879c283667267bbc9bdb4541a92b173b11b22d4181443649ba65057f52126982b1f8939343dc06e4c0aa661d829e0687a3bcdbfcf268622b242538c71
-
Filesize
235KB
MD577e0a0a90e0231493bd421f4cdab0668
SHA1b09f8951b42a2993b637df9e41f6a25be106c2cb
SHA25675520c76a4051b2be15db8625f35d4c1c63d93686bf849e6fc67f4e62d2fd000
SHA512d6a1c3ebe00c5d236dccab9fe867c8a87dea2a71cf54900cfe47cacf0c1d7a8e2dfbe91b466cad318144976fce340ba6f5e5da9a5c0cae71c1666ba09e6510e4
-
Filesize
235KB
MD577e0a0a90e0231493bd421f4cdab0668
SHA1b09f8951b42a2993b637df9e41f6a25be106c2cb
SHA25675520c76a4051b2be15db8625f35d4c1c63d93686bf849e6fc67f4e62d2fd000
SHA512d6a1c3ebe00c5d236dccab9fe867c8a87dea2a71cf54900cfe47cacf0c1d7a8e2dfbe91b466cad318144976fce340ba6f5e5da9a5c0cae71c1666ba09e6510e4
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
287KB
MD5d88597e2a4750d771dcc66b11d3b2289
SHA1810152a9ab8af26d7c013c273348aa277c3722c2
SHA25669e2fa36a24746586c5745c05473d0955bfc4167c7b4d0ef120c428fcbeea109
SHA5126fbf2081293e14685ee912c4cc0967988d55841e4facba695b4a7292512b1d57b344b6ef9e2c3ab4b31efdd1144fc43e12d4af55fd1d49fc7f7042ee613f776f
-
Filesize
287KB
MD5d88597e2a4750d771dcc66b11d3b2289
SHA1810152a9ab8af26d7c013c273348aa277c3722c2
SHA25669e2fa36a24746586c5745c05473d0955bfc4167c7b4d0ef120c428fcbeea109
SHA5126fbf2081293e14685ee912c4cc0967988d55841e4facba695b4a7292512b1d57b344b6ef9e2c3ab4b31efdd1144fc43e12d4af55fd1d49fc7f7042ee613f776f
-
Filesize
675KB
MD56e487aa1b2d2b9ef05073c11572925f2
SHA1b2b58a554b75029cd8bdf5ffd012611b1bfe430b
SHA25677eec57eba8ad26c2fd97cc4240a13732f301c775e751ee72079f656296d9597
SHA512b7512fcf5dcfbe1c1807d85dfff39bd0cac57adf2696b7129a8c9d70ea7f8249c301a97ecba0f190eb622a216530215585ce6d8d8ce9b112e5728792ecace739
-
Filesize
675KB
MD56e487aa1b2d2b9ef05073c11572925f2
SHA1b2b58a554b75029cd8bdf5ffd012611b1bfe430b
SHA25677eec57eba8ad26c2fd97cc4240a13732f301c775e751ee72079f656296d9597
SHA512b7512fcf5dcfbe1c1807d85dfff39bd0cac57adf2696b7129a8c9d70ea7f8249c301a97ecba0f190eb622a216530215585ce6d8d8ce9b112e5728792ecace739
-
Filesize
264KB
MD59d52e0b43234444cc861a252f7d24b10
SHA13b7f7d849000c86e91797ed482f54ea39636a543
SHA256ad7b561f6a6d5714516ac0c36b85a76cb78b2554c80752ff0c847b6b6dbdea4f
SHA5125a4015d774ab58f256a2edceb18941c7fcfa0d5867649893fb40c77522ef93ff42cb140c85c917c1ae41894f4364d46b4a3d0f8b4dd68c6d4bed9a5bb2c46bf3
-
Filesize
264KB
MD59d52e0b43234444cc861a252f7d24b10
SHA13b7f7d849000c86e91797ed482f54ea39636a543
SHA256ad7b561f6a6d5714516ac0c36b85a76cb78b2554c80752ff0c847b6b6dbdea4f
SHA5125a4015d774ab58f256a2edceb18941c7fcfa0d5867649893fb40c77522ef93ff42cb140c85c917c1ae41894f4364d46b4a3d0f8b4dd68c6d4bed9a5bb2c46bf3
-
Filesize
629KB
MD5d91768fa0c2a83ec2793c1df2d291709
SHA1b161a5699b2402f1a7c6d6896148e65ceb58c14a
SHA256cc554490c09b1e5e7e6494142b79c438ef720c322668adac0857c40945cda946
SHA512ea306890e9307913459841d20dfab0f0c081e4e957917b0d9ee37fc5cca52f56c5b55968b2187112b045eaa772c05cf75fc4078e10097507f08d16c1595e2b63
-
Filesize
629KB
MD5d91768fa0c2a83ec2793c1df2d291709
SHA1b161a5699b2402f1a7c6d6896148e65ceb58c14a
SHA256cc554490c09b1e5e7e6494142b79c438ef720c322668adac0857c40945cda946
SHA512ea306890e9307913459841d20dfab0f0c081e4e957917b0d9ee37fc5cca52f56c5b55968b2187112b045eaa772c05cf75fc4078e10097507f08d16c1595e2b63
-
Filesize
972KB
MD55668cb771643274ba2c375ec6403c266
SHA1dd78b03428b99368906fe62fc46aaaf1db07a8b9
SHA256d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
SHA512135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a
-
Filesize
972KB
MD55668cb771643274ba2c375ec6403c266
SHA1dd78b03428b99368906fe62fc46aaaf1db07a8b9
SHA256d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
SHA512135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a
-
Filesize
160KB
MD56c3e0a1c839e28ca5b7c12695bd50c9d
SHA1f3c2177fabb8dee68cad911a56e221bae930a12f
SHA2562a1feb403763df26a3c2be574e79c8743ecb40d169cfbee3fbcd87fe15baca12
SHA512980940730f8227de7337cd698aa9aa41eb8581dad02ad0e9c3ca0586fc94245e3892ce8d9d84b1d312eebe6576faf0e1872994d32a75e7706589afd68189af53
-
Filesize
160KB
MD56c3e0a1c839e28ca5b7c12695bd50c9d
SHA1f3c2177fabb8dee68cad911a56e221bae930a12f
SHA2562a1feb403763df26a3c2be574e79c8743ecb40d169cfbee3fbcd87fe15baca12
SHA512980940730f8227de7337cd698aa9aa41eb8581dad02ad0e9c3ca0586fc94245e3892ce8d9d84b1d312eebe6576faf0e1872994d32a75e7706589afd68189af53
-
Filesize
773KB
MD5987d0f92ed9871031e0061e16e7bbac4
SHA1b69f3badc82b6da0ff311f9dc509bac244464332
SHA256adb98685d3d6a8fa5e90b6fd9d458601d874718d5815f8aab66728ba9d067440
SHA512f4ecf0bd996fd9aab99eba225bed9dbe2af3f8857a32bc9f0eda2c2fe8b468f5f853e68e96c029cf4cfd161409e072777db92a7502b58b541e0057b449f79770
-
Filesize
773KB
MD5987d0f92ed9871031e0061e16e7bbac4
SHA1b69f3badc82b6da0ff311f9dc509bac244464332
SHA256adb98685d3d6a8fa5e90b6fd9d458601d874718d5815f8aab66728ba9d067440
SHA512f4ecf0bd996fd9aab99eba225bed9dbe2af3f8857a32bc9f0eda2c2fe8b468f5f853e68e96c029cf4cfd161409e072777db92a7502b58b541e0057b449f79770
-
Filesize
378KB
MD55632c0cda7da1c5b57aeffeead5c40b7
SHA1533805ba88fbd008457616ae2c3b585c952d3afe
SHA2562b4a3c6d5d62270440c34e1ea75ba2878523eccc4ef85692c0e9497b6f1a8f43
SHA512e86a2c0eb84b41bae94a1d29cc26c069d7ba0da8ed06f26192bd4e601b1c0168b2396734e17f585da531976125178f9a230ef7071cbd616cb070c44bcc16b990
-
Filesize
378KB
MD55632c0cda7da1c5b57aeffeead5c40b7
SHA1533805ba88fbd008457616ae2c3b585c952d3afe
SHA2562b4a3c6d5d62270440c34e1ea75ba2878523eccc4ef85692c0e9497b6f1a8f43
SHA512e86a2c0eb84b41bae94a1d29cc26c069d7ba0da8ed06f26192bd4e601b1c0168b2396734e17f585da531976125178f9a230ef7071cbd616cb070c44bcc16b990
-
Filesize
378KB
MD55632c0cda7da1c5b57aeffeead5c40b7
SHA1533805ba88fbd008457616ae2c3b585c952d3afe
SHA2562b4a3c6d5d62270440c34e1ea75ba2878523eccc4ef85692c0e9497b6f1a8f43
SHA512e86a2c0eb84b41bae94a1d29cc26c069d7ba0da8ed06f26192bd4e601b1c0168b2396734e17f585da531976125178f9a230ef7071cbd616cb070c44bcc16b990
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
1.3MB
MD554f0c757834f57d5d3788798820ebfff
SHA1ab97d6edb8946d39b847f64953f2dff7473b9358
SHA256b8720c4e366d41f7dbcc9124de077897191a8248114038b6fe8ef71cb6fc274f
SHA5128f270a4e2956f3a28fadf5e0d29c38dd0fdf4e0c7e73772d94d9880f8c7c2bedcecc9d3c826c31f9f34dc3b17f8479f80825ac2292419ffc5887f39a57a04202
-
Filesize
1.3MB
MD554f0c757834f57d5d3788798820ebfff
SHA1ab97d6edb8946d39b847f64953f2dff7473b9358
SHA256b8720c4e366d41f7dbcc9124de077897191a8248114038b6fe8ef71cb6fc274f
SHA5128f270a4e2956f3a28fadf5e0d29c38dd0fdf4e0c7e73772d94d9880f8c7c2bedcecc9d3c826c31f9f34dc3b17f8479f80825ac2292419ffc5887f39a57a04202
-
Filesize
1.3MB
MD554f0c757834f57d5d3788798820ebfff
SHA1ab97d6edb8946d39b847f64953f2dff7473b9358
SHA256b8720c4e366d41f7dbcc9124de077897191a8248114038b6fe8ef71cb6fc274f
SHA5128f270a4e2956f3a28fadf5e0d29c38dd0fdf4e0c7e73772d94d9880f8c7c2bedcecc9d3c826c31f9f34dc3b17f8479f80825ac2292419ffc5887f39a57a04202
-
Filesize
551KB
MD513abe7637d904829fbb37ecda44a1670
SHA1de26b60d2c0b1660220caf3f4a11dfabaa0e7b9f
SHA2567a20b34c0f9b516007d40a570eafb782028c5613138e8b9697ca398b0b3420d6
SHA5126e02ca1282f3d1bbbb684046eb5dcef412366a0ed2276c1f22d2f16b978647c0e35a8d728a0349f022295b0aba30139b2b8bb75b92aa5fdcc18aae9dcf357d77
-
Filesize
44KB
MD57b61795697b50fb19d1f20bd8a234b67
SHA15134692d456da79579e9183c50db135485e95201
SHA256d37e99805cee2a2a4d59542b88d1dfc23c7b166186666feef51f8751e940b174
SHA512903f0e4a5d676be49abf5464e12a58b3908406a159ceb1b41534dc9b0a29854e6fa0b9bb471b68d802a1a1d773523490381ef5cebdd9f27aeb26947bc4970a35
-
Filesize
44KB
MD57b61795697b50fb19d1f20bd8a234b67
SHA15134692d456da79579e9183c50db135485e95201
SHA256d37e99805cee2a2a4d59542b88d1dfc23c7b166186666feef51f8751e940b174
SHA512903f0e4a5d676be49abf5464e12a58b3908406a159ceb1b41534dc9b0a29854e6fa0b9bb471b68d802a1a1d773523490381ef5cebdd9f27aeb26947bc4970a35
-
Filesize
31B
MD5b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
Filesize
929B
MD547cb88e1b28a0b5f5a64f29eb28eff05
SHA169dcb801d6cdd7256c373d468f1be891cf27ec1f
SHA256b35615d8c55569601f66e95cfcda0abb27f9053a67918d93f63e30b4e93c4f14
SHA512611ee323b168973512ee07641400c8a44a7cf47b523e6e9afb95b490264fb7463e7167f0e2538fa14ae053e901546f0ffc50c8dd83295ab7c991a68d3bc95d0d
-
Filesize
696KB
MD5e3dcae5ee7ee62e603d2a37128861468
SHA1c68f71703f544ec31d1670c09a597c06c827fb46
SHA256b1aa9fab8bd7c68246c60587cda7709166be3c1af95e17eeda73722ad08c0e8d
SHA512f21cd0348762fd711c8de4cf56c98f7d9517856ed1f4f00f9ce62740bd26ee64943f5752132b459476dfa05a777fa2f5f5a5bd4dbfff0456a13b059642fe4d1c
-
Filesize
696KB
MD5e3dcae5ee7ee62e603d2a37128861468
SHA1c68f71703f544ec31d1670c09a597c06c827fb46
SHA256b1aa9fab8bd7c68246c60587cda7709166be3c1af95e17eeda73722ad08c0e8d
SHA512f21cd0348762fd711c8de4cf56c98f7d9517856ed1f4f00f9ce62740bd26ee64943f5752132b459476dfa05a777fa2f5f5a5bd4dbfff0456a13b059642fe4d1c
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
184KB
MD57fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
Filesize
184KB
MD57fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
Filesize
61KB
MD5a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
Filesize
61KB
MD5a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
Filesize
3.1MB
MD569c92564bb3061db02c7bd1671e86d4c
SHA122133ec51f6b60b389a3d023741a3bc23476e967
SHA256c109431818f3989550ac0f9aa29033918f20c2bba34bf57ec786899e9e143b4a
SHA5121acbd2c37341282c24ea95d26d30ed3165539870b4b9a8c18494aadb3dda773ec0ee5e3c0eb5ba82ece928088ad87a20ee8003f7a43a7204a2e21612f49c5523
-
Filesize
3.1MB
MD569c92564bb3061db02c7bd1671e86d4c
SHA122133ec51f6b60b389a3d023741a3bc23476e967
SHA256c109431818f3989550ac0f9aa29033918f20c2bba34bf57ec786899e9e143b4a
SHA5121acbd2c37341282c24ea95d26d30ed3165539870b4b9a8c18494aadb3dda773ec0ee5e3c0eb5ba82ece928088ad87a20ee8003f7a43a7204a2e21612f49c5523
-
Filesize
3.5MB
MD563a108a632acb736061f0d822abbbff5
SHA1db15a56cae0fc0599a1b11274316572d22b843cc
SHA2563b2ce9a1150f1c2152a7ee369f6d53586eeefa07db477782f8e5f5594907d759
SHA512bcdf5d270bd0e8fa5c8fdc864e7160b87caeb8d4011bfc2fae5d26d1758606f0ce959fa13899caad1ad329783e6b461e9c695eaa9d5ceff237e946eae66cc8b3
-
Filesize
3.5MB
MD563a108a632acb736061f0d822abbbff5
SHA1db15a56cae0fc0599a1b11274316572d22b843cc
SHA2563b2ce9a1150f1c2152a7ee369f6d53586eeefa07db477782f8e5f5594907d759
SHA512bcdf5d270bd0e8fa5c8fdc864e7160b87caeb8d4011bfc2fae5d26d1758606f0ce959fa13899caad1ad329783e6b461e9c695eaa9d5ceff237e946eae66cc8b3
-
Filesize
235KB
MD577e0a0a90e0231493bd421f4cdab0668
SHA1b09f8951b42a2993b637df9e41f6a25be106c2cb
SHA25675520c76a4051b2be15db8625f35d4c1c63d93686bf849e6fc67f4e62d2fd000
SHA512d6a1c3ebe00c5d236dccab9fe867c8a87dea2a71cf54900cfe47cacf0c1d7a8e2dfbe91b466cad318144976fce340ba6f5e5da9a5c0cae71c1666ba09e6510e4
-
Filesize
235KB
MD577e0a0a90e0231493bd421f4cdab0668
SHA1b09f8951b42a2993b637df9e41f6a25be106c2cb
SHA25675520c76a4051b2be15db8625f35d4c1c63d93686bf849e6fc67f4e62d2fd000
SHA512d6a1c3ebe00c5d236dccab9fe867c8a87dea2a71cf54900cfe47cacf0c1d7a8e2dfbe91b466cad318144976fce340ba6f5e5da9a5c0cae71c1666ba09e6510e4
-
Filesize
630KB
MD534bbf0bb497b1a3842e44db74b56a0c8
SHA112551529c0c4933eef62ea7b03fbe0607a7b4130
SHA256d53567fb8d6515ff606514f2905491b1cbbd94413d04c69990eeba32ca93220f
SHA512a61d11dcd6a408bcd4cbc161d933f3cbf0043b9064e05248cc690a2cedee0a79539e2b0c610570926f4b327ffd7781315f7d29767c091e71ac263cbc20a97095
-
Filesize
223KB
MD515d7d8d29917f9f1d4ab9d2046e621ca
SHA10ff077e011254b64089bd246e7f69cecf6cee76a
SHA25610ea85c992d5bc686475b85c23caa967145eb98e849622629125f69b6e62c19f
SHA5121951697da0cffc48a3a98d86763eaddf8a37bca06d61333c3fc7d60b47c8a23348a9b16d8c2f6d49902b71d6df4aa5acdc5e56cb4beb158e27cf71547ae73998
-
Filesize
223KB
MD515d7d8d29917f9f1d4ab9d2046e621ca
SHA10ff077e011254b64089bd246e7f69cecf6cee76a
SHA25610ea85c992d5bc686475b85c23caa967145eb98e849622629125f69b6e62c19f
SHA5121951697da0cffc48a3a98d86763eaddf8a37bca06d61333c3fc7d60b47c8a23348a9b16d8c2f6d49902b71d6df4aa5acdc5e56cb4beb158e27cf71547ae73998
-
Filesize
222KB
MD5468901c1274bf759bd0f1b947c962294
SHA1910770b0fee3308405452a4b9fa1565cf65a067e
SHA2566d4851b2c2ad4bef6bb60bdd8e1cddc629511107c1e22b45110ce839f721908d
SHA5127a96512091acf1b90228f1d6025f9f5dd778099a8810a78bf46a95371110c2cc70c1d6a8560b858a07ee841375fe464b8dafb40b3d89a2fe2b67f163eaee579c
-
Filesize
222KB
MD5468901c1274bf759bd0f1b947c962294
SHA1910770b0fee3308405452a4b9fa1565cf65a067e
SHA2566d4851b2c2ad4bef6bb60bdd8e1cddc629511107c1e22b45110ce839f721908d
SHA5127a96512091acf1b90228f1d6025f9f5dd778099a8810a78bf46a95371110c2cc70c1d6a8560b858a07ee841375fe464b8dafb40b3d89a2fe2b67f163eaee579c
-
Filesize
1.7MB
MD5d4ae7b0a506e0b4954052d719938af06
SHA1d6a7e2c4d3aa7be61f3b557d765623a96321e842
SHA256581a5404f0508077c5a81667915693aa223630c36a8ff45eb63af793e4096c75
SHA512b2cecbb9992a92e5a25566d64234af82c7ccf6968505582096a108f981b3a4be343425718a11ddc51295e297b190becc18ba681dd9a31777f37ddb57275bf430
-
Filesize
1.7MB
MD5d4ae7b0a506e0b4954052d719938af06
SHA1d6a7e2c4d3aa7be61f3b557d765623a96321e842
SHA256581a5404f0508077c5a81667915693aa223630c36a8ff45eb63af793e4096c75
SHA512b2cecbb9992a92e5a25566d64234af82c7ccf6968505582096a108f981b3a4be343425718a11ddc51295e297b190becc18ba681dd9a31777f37ddb57275bf430
-
Filesize
355KB
MD5ace725c92070dd3abcaa0ecf41658b74
SHA1c7ef560abc993e2c7c1521fbb2966f1d11cab828
SHA256dce9ed526503c5deb7b82bc5fe65abcaeaea1fab8ddc2bb6390fdbf38a1264f3
SHA51266cc522f836f57d5bfa5fdf10493515f8e3860e3475dee9512f900f6cac56de1f5f198ff0a811f6c4988d24663fd8bbc465b83b127498ff61abf96a9c8b9ec53
-
Filesize
355KB
MD5ace725c92070dd3abcaa0ecf41658b74
SHA1c7ef560abc993e2c7c1521fbb2966f1d11cab828
SHA256dce9ed526503c5deb7b82bc5fe65abcaeaea1fab8ddc2bb6390fdbf38a1264f3
SHA51266cc522f836f57d5bfa5fdf10493515f8e3860e3475dee9512f900f6cac56de1f5f198ff0a811f6c4988d24663fd8bbc465b83b127498ff61abf96a9c8b9ec53
-
Filesize
1.3MB
MD573780456a4de9c14b753d6e1a427b373
SHA15c0b7de53137449ce9962216edc008dbd7994589
SHA256e7a45ecbb85d4e4fb289e5bc752adee0b6326792e3a4104bd078b46bfe35f9c8
SHA512ad8fe9801921fd7252a62fad4937eb191abc692669edf3933ce4937e395b548b5b13d267317b27a88eed4890963e9d9a17951df59f43593a2fed5cf6fe8874d7
-
Filesize
1.3MB
MD573780456a4de9c14b753d6e1a427b373
SHA15c0b7de53137449ce9962216edc008dbd7994589
SHA256e7a45ecbb85d4e4fb289e5bc752adee0b6326792e3a4104bd078b46bfe35f9c8
SHA512ad8fe9801921fd7252a62fad4937eb191abc692669edf3933ce4937e395b548b5b13d267317b27a88eed4890963e9d9a17951df59f43593a2fed5cf6fe8874d7