Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2023, 17:52
Static task
static1
General
-
Target
70ea5f964daee7c1bfaeb0853777985865bbabc4e68d4bc12e40e588648a0423.exe
-
Size
735KB
-
MD5
6d0e72258a7b010a12a30f9929db63dd
-
SHA1
da9292e095ffa070b6a26511b99e27408fc9a664
-
SHA256
70ea5f964daee7c1bfaeb0853777985865bbabc4e68d4bc12e40e588648a0423
-
SHA512
60a305813629e6c58452ae04e65e524be90328e66c419602403bbbd9362db3d0e41989530417a65639fddc237a85ec913b34faff3f1dbb2c30dcaa7735e4aa86
-
SSDEEP
12288:qMr9y90mSDHB5IPdh5H/xKYLhwxH3pnoDJY+HGhNwqnWA0Zjf0:Hy5q5IPdL4YGh3pSDKd0Bf0
Malware Config
Extracted
redline
dedo
83.97.73.130:19061
-
auth_value
ac76f7438fbe49011f900c651cb85e26
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
grega
83.97.73.130:19061
-
auth_value
16e2fbc2847b2270b3f0679e2dd76c8d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g2234704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g2234704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0489509.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection j0738429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" j0738429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0489509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0489509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0489509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0489509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" j0738429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g2234704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g2234704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0489509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" j0738429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0489509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0489509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" j0738429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g2234704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0489509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" j0738429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0489509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" j0738429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" j0738429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" j0738429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" j0738429.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k0489509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" j0738429.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation m8791925.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 27 IoCs
pid Process 4900 y9050962.exe 208 y0131471.exe 4912 y9739847.exe 2144 j0738429.exe 3988 k0489509.exe 1564 l5600318.exe 4484 m8791925.exe 3100 rugen.exe 3076 n0166577.exe 1320 foto164.exe 3992 x9483357.exe 3216 x1095622.exe 988 f8232250.exe 1056 fotod75.exe 3872 y9050962.exe 4468 y0131471.exe 2268 y9739847.exe 3964 j0738429.exe 3728 g2234704.exe 3952 k0489509.exe 4516 h1186620.exe 4940 i4792905.exe 5020 l5600318.exe 1544 m8791925.exe 4320 n0166577.exe 3084 rugen.exe 368 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 4392 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features j0738429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" j0738429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k0489509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" j0738429.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g2234704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k0489509.exe -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x9483357.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1095622.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fotod75.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" fotod75.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" y9050962.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y0131471.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9739847.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y9739847.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup6 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP006.TMP\\\"" y0131471.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fotod75.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000008051\\fotod75.exe" rugen.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce foto164.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\foto164.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000007051\\foto164.exe" rugen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9483357.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1095622.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9050962.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 70ea5f964daee7c1bfaeb0853777985865bbabc4e68d4bc12e40e588648a0423.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 70ea5f964daee7c1bfaeb0853777985865bbabc4e68d4bc12e40e588648a0423.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9050962.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0131471.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9050962.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0131471.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" foto164.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9739847.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup7 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP007.TMP\\\"" y9739847.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1284 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2144 j0738429.exe 2144 j0738429.exe 3988 k0489509.exe 3988 k0489509.exe 1564 l5600318.exe 1564 l5600318.exe 3964 j0738429.exe 3964 j0738429.exe 3076 n0166577.exe 3076 n0166577.exe 988 f8232250.exe 988 f8232250.exe 3728 g2234704.exe 3728 g2234704.exe 3952 k0489509.exe 3952 k0489509.exe 4940 i4792905.exe 5020 l5600318.exe 5020 l5600318.exe 4940 i4792905.exe 4320 n0166577.exe 4320 n0166577.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2144 j0738429.exe Token: SeDebugPrivilege 3988 k0489509.exe Token: SeDebugPrivilege 1564 l5600318.exe Token: SeDebugPrivilege 3964 j0738429.exe Token: SeDebugPrivilege 3076 n0166577.exe Token: SeDebugPrivilege 988 f8232250.exe Token: SeDebugPrivilege 3728 g2234704.exe Token: SeDebugPrivilege 3952 k0489509.exe Token: SeDebugPrivilege 4940 i4792905.exe Token: SeDebugPrivilege 5020 l5600318.exe Token: SeDebugPrivilege 4320 n0166577.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4484 m8791925.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2772 wrote to memory of 4900 2772 70ea5f964daee7c1bfaeb0853777985865bbabc4e68d4bc12e40e588648a0423.exe 87 PID 2772 wrote to memory of 4900 2772 70ea5f964daee7c1bfaeb0853777985865bbabc4e68d4bc12e40e588648a0423.exe 87 PID 2772 wrote to memory of 4900 2772 70ea5f964daee7c1bfaeb0853777985865bbabc4e68d4bc12e40e588648a0423.exe 87 PID 4900 wrote to memory of 208 4900 y9050962.exe 88 PID 4900 wrote to memory of 208 4900 y9050962.exe 88 PID 4900 wrote to memory of 208 4900 y9050962.exe 88 PID 208 wrote to memory of 4912 208 y0131471.exe 89 PID 208 wrote to memory of 4912 208 y0131471.exe 89 PID 208 wrote to memory of 4912 208 y0131471.exe 89 PID 4912 wrote to memory of 2144 4912 y9739847.exe 90 PID 4912 wrote to memory of 2144 4912 y9739847.exe 90 PID 4912 wrote to memory of 2144 4912 y9739847.exe 90 PID 4912 wrote to memory of 3988 4912 y9739847.exe 96 PID 4912 wrote to memory of 3988 4912 y9739847.exe 96 PID 208 wrote to memory of 1564 208 y0131471.exe 99 PID 208 wrote to memory of 1564 208 y0131471.exe 99 PID 208 wrote to memory of 1564 208 y0131471.exe 99 PID 4900 wrote to memory of 4484 4900 y9050962.exe 101 PID 4900 wrote to memory of 4484 4900 y9050962.exe 101 PID 4900 wrote to memory of 4484 4900 y9050962.exe 101 PID 4484 wrote to memory of 3100 4484 m8791925.exe 102 PID 4484 wrote to memory of 3100 4484 m8791925.exe 102 PID 4484 wrote to memory of 3100 4484 m8791925.exe 102 PID 2772 wrote to memory of 3076 2772 70ea5f964daee7c1bfaeb0853777985865bbabc4e68d4bc12e40e588648a0423.exe 103 PID 2772 wrote to memory of 3076 2772 70ea5f964daee7c1bfaeb0853777985865bbabc4e68d4bc12e40e588648a0423.exe 103 PID 2772 wrote to memory of 3076 2772 70ea5f964daee7c1bfaeb0853777985865bbabc4e68d4bc12e40e588648a0423.exe 103 PID 3100 wrote to memory of 1284 3100 rugen.exe 105 PID 3100 wrote to memory of 1284 3100 rugen.exe 105 PID 3100 wrote to memory of 1284 3100 rugen.exe 105 PID 3100 wrote to memory of 3528 3100 rugen.exe 107 PID 3100 wrote to memory of 3528 3100 rugen.exe 107 PID 3100 wrote to memory of 3528 3100 rugen.exe 107 PID 3528 wrote to memory of 1368 3528 cmd.exe 109 PID 3528 wrote to memory of 1368 3528 cmd.exe 109 PID 3528 wrote to memory of 1368 3528 cmd.exe 109 PID 3528 wrote to memory of 4512 3528 cmd.exe 110 PID 3528 wrote to memory of 4512 3528 cmd.exe 110 PID 3528 wrote to memory of 4512 3528 cmd.exe 110 PID 3528 wrote to memory of 532 3528 cmd.exe 111 PID 3528 wrote to memory of 532 3528 cmd.exe 111 PID 3528 wrote to memory of 532 3528 cmd.exe 111 PID 3528 wrote to memory of 1576 3528 cmd.exe 112 PID 3528 wrote to memory of 1576 3528 cmd.exe 112 PID 3528 wrote to memory of 1576 3528 cmd.exe 112 PID 3528 wrote to memory of 2588 3528 cmd.exe 113 PID 3528 wrote to memory of 2588 3528 cmd.exe 113 PID 3528 wrote to memory of 2588 3528 cmd.exe 113 PID 3528 wrote to memory of 972 3528 cmd.exe 114 PID 3528 wrote to memory of 972 3528 cmd.exe 114 PID 3528 wrote to memory of 972 3528 cmd.exe 114 PID 3100 wrote to memory of 1320 3100 rugen.exe 115 PID 3100 wrote to memory of 1320 3100 rugen.exe 115 PID 3100 wrote to memory of 1320 3100 rugen.exe 115 PID 1320 wrote to memory of 3992 1320 foto164.exe 116 PID 1320 wrote to memory of 3992 1320 foto164.exe 116 PID 1320 wrote to memory of 3992 1320 foto164.exe 116 PID 3992 wrote to memory of 3216 3992 x9483357.exe 117 PID 3992 wrote to memory of 3216 3992 x9483357.exe 117 PID 3992 wrote to memory of 3216 3992 x9483357.exe 117 PID 3216 wrote to memory of 988 3216 x1095622.exe 118 PID 3216 wrote to memory of 988 3216 x1095622.exe 118 PID 3216 wrote to memory of 988 3216 x1095622.exe 118 PID 3100 wrote to memory of 1056 3100 rugen.exe 119 PID 3100 wrote to memory of 1056 3100 rugen.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\70ea5f964daee7c1bfaeb0853777985865bbabc4e68d4bc12e40e588648a0423.exe"C:\Users\Admin\AppData\Local\Temp\70ea5f964daee7c1bfaeb0853777985865bbabc4e68d4bc12e40e588648a0423.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9050962.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9050962.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0131471.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0131471.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y9739847.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y9739847.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j0738429.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j0738429.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k0489509.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k0489509.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5600318.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5600318.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m8791925.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m8791925.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:1284
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1368
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:4512
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:532
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1576
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:2588
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:972
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000007051\foto164.exe"C:\Users\Admin\AppData\Local\Temp\1000007051\foto164.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9483357.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9483357.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1095622.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1095622.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\f8232250.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\f8232250.exe8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2234704.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2234704.exe8⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h1186620.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h1186620.exe7⤵
- Executes dropped EXE
PID:4516
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i4792905.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i4792905.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000008051\fotod75.exe"C:\Users\Admin\AppData\Local\Temp\1000008051\fotod75.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\y9050962.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\y9050962.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\y0131471.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\y0131471.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\y9739847.exeC:\Users\Admin\AppData\Local\Temp\IXP006.TMP\y9739847.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\j0738429.exeC:\Users\Admin\AppData\Local\Temp\IXP007.TMP\j0738429.exe9⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\k0489509.exeC:\Users\Admin\AppData\Local\Temp\IXP007.TMP\k0489509.exe9⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\l5600318.exeC:\Users\Admin\AppData\Local\Temp\IXP006.TMP\l5600318.exe8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\m8791925.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\m8791925.exe7⤵
- Executes dropped EXE
PID:1544
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\n0166577.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\n0166577.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4392
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0166577.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0166577.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3076
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3084
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:368
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD528d7fcc2b910da5e67ebb99451a5f598
SHA1a5bf77a53eda1208f4f37d09d82da0b9915a6747
SHA2562391511d0a66ed9f84ae54254f51c09e43be01ad685db80da3201ec880abd49c
SHA5122d8eb65cbf04ca506f4ef3b9ae13ccf05ebefab702269ba70ffd1ce9e6c615db0a3ee3ac0e81a06f546fc3250b7b76155dd51241c41b507a441b658c8e761df6
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
2KB
MD50eab9cbc81b630365ed87e70a3bcf348
SHA1d6ce2097af6c58fe41f98e1b0f9c264aa552d253
SHA256e8f1178d92ce896b5f45c707050c3e84527db102bc3687e1e7208dbd34cd7685
SHA5121417409eee83f2c8d4a15f843374c826cc2250e23dc4d46648643d02bfbf8c463d6aa8b43274bf68be1e780f81d506948bf84903a7a1044b46b12813d67c9498
-
Filesize
583KB
MD527ed6afeaa5f347349ad8a89e4434ce6
SHA1062f99ef7373fbe49f663edb70741c712251ebdc
SHA2566d026ce1634b42f7a1db3cbd3cf68e328036d420035c33eed37fea46f0962bf1
SHA512a136afd1f89919666a5f77ffe2e89da533d244b1d0ba1041fb5de08a6fe62acd73b886639ac61d6805f9c243ddaa9221fb62c04341708b0a73a2df1106c06051
-
Filesize
583KB
MD527ed6afeaa5f347349ad8a89e4434ce6
SHA1062f99ef7373fbe49f663edb70741c712251ebdc
SHA2566d026ce1634b42f7a1db3cbd3cf68e328036d420035c33eed37fea46f0962bf1
SHA512a136afd1f89919666a5f77ffe2e89da533d244b1d0ba1041fb5de08a6fe62acd73b886639ac61d6805f9c243ddaa9221fb62c04341708b0a73a2df1106c06051
-
Filesize
583KB
MD527ed6afeaa5f347349ad8a89e4434ce6
SHA1062f99ef7373fbe49f663edb70741c712251ebdc
SHA2566d026ce1634b42f7a1db3cbd3cf68e328036d420035c33eed37fea46f0962bf1
SHA512a136afd1f89919666a5f77ffe2e89da533d244b1d0ba1041fb5de08a6fe62acd73b886639ac61d6805f9c243ddaa9221fb62c04341708b0a73a2df1106c06051
-
Filesize
735KB
MD56d0e72258a7b010a12a30f9929db63dd
SHA1da9292e095ffa070b6a26511b99e27408fc9a664
SHA25670ea5f964daee7c1bfaeb0853777985865bbabc4e68d4bc12e40e588648a0423
SHA51260a305813629e6c58452ae04e65e524be90328e66c419602403bbbd9362db3d0e41989530417a65639fddc237a85ec913b34faff3f1dbb2c30dcaa7735e4aa86
-
Filesize
735KB
MD56d0e72258a7b010a12a30f9929db63dd
SHA1da9292e095ffa070b6a26511b99e27408fc9a664
SHA25670ea5f964daee7c1bfaeb0853777985865bbabc4e68d4bc12e40e588648a0423
SHA51260a305813629e6c58452ae04e65e524be90328e66c419602403bbbd9362db3d0e41989530417a65639fddc237a85ec913b34faff3f1dbb2c30dcaa7735e4aa86
-
Filesize
735KB
MD56d0e72258a7b010a12a30f9929db63dd
SHA1da9292e095ffa070b6a26511b99e27408fc9a664
SHA25670ea5f964daee7c1bfaeb0853777985865bbabc4e68d4bc12e40e588648a0423
SHA51260a305813629e6c58452ae04e65e524be90328e66c419602403bbbd9362db3d0e41989530417a65639fddc237a85ec913b34faff3f1dbb2c30dcaa7735e4aa86
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
267KB
MD57bebdf29826fae00fa63f0402576a063
SHA18abe516f217c04399092d1b695e2a33380643d16
SHA256fe77d4691b7c3b0385a022f841fc5b37f0baa87c1b9c779366eb29691918201a
SHA5129f90d343c8783e938f173b6a771ec5a5a8afa0d4a290ae1ddf78aa749e4017428ac9e9da78d476ffdeb9116c2848dc481c1afaa6114534039d84fa4b43720ad4
-
Filesize
267KB
MD57bebdf29826fae00fa63f0402576a063
SHA18abe516f217c04399092d1b695e2a33380643d16
SHA256fe77d4691b7c3b0385a022f841fc5b37f0baa87c1b9c779366eb29691918201a
SHA5129f90d343c8783e938f173b6a771ec5a5a8afa0d4a290ae1ddf78aa749e4017428ac9e9da78d476ffdeb9116c2848dc481c1afaa6114534039d84fa4b43720ad4
-
Filesize
529KB
MD5c4e47074adb42b4c6a888ce67ced11ee
SHA1a70bb186a7cd64e478abbd91d3c99192736275a0
SHA256a9b6647489cfb8dd89c3c76f8669e9bc5a4e4bd31c5a8efa40a8f17a32cbbd86
SHA5129479643b2bf9ed86966ae61e49e2d4ad5c63bd73a5688ddf7fc74eff3103c1d063183be3d5c75727c761cdffeea6f269c8587486d67736817c60e491232c9dc2
-
Filesize
529KB
MD5c4e47074adb42b4c6a888ce67ced11ee
SHA1a70bb186a7cd64e478abbd91d3c99192736275a0
SHA256a9b6647489cfb8dd89c3c76f8669e9bc5a4e4bd31c5a8efa40a8f17a32cbbd86
SHA5129479643b2bf9ed86966ae61e49e2d4ad5c63bd73a5688ddf7fc74eff3103c1d063183be3d5c75727c761cdffeea6f269c8587486d67736817c60e491232c9dc2
-
Filesize
267KB
MD5c7a496588060f679f2dd5e4adeaea04e
SHA1fcc921a383348a1e9fc22de6d182fa61e3e84a41
SHA256c03c7e5add4771885745db0439474d63d2a11b73a06ba0df43570b3379afbd36
SHA51213e1e20ddef5f8c5011688f7dac1ff2e57bf150b727a8d56a18d5d6135f9c9f1ea3ff13ef8921149d7995c8cae84cc2cf4c88ea32320cecd80748337d74e57a4
-
Filesize
267KB
MD5c7a496588060f679f2dd5e4adeaea04e
SHA1fcc921a383348a1e9fc22de6d182fa61e3e84a41
SHA256c03c7e5add4771885745db0439474d63d2a11b73a06ba0df43570b3379afbd36
SHA51213e1e20ddef5f8c5011688f7dac1ff2e57bf150b727a8d56a18d5d6135f9c9f1ea3ff13ef8921149d7995c8cae84cc2cf4c88ea32320cecd80748337d74e57a4
-
Filesize
267KB
MD5c7a496588060f679f2dd5e4adeaea04e
SHA1fcc921a383348a1e9fc22de6d182fa61e3e84a41
SHA256c03c7e5add4771885745db0439474d63d2a11b73a06ba0df43570b3379afbd36
SHA51213e1e20ddef5f8c5011688f7dac1ff2e57bf150b727a8d56a18d5d6135f9c9f1ea3ff13ef8921149d7995c8cae84cc2cf4c88ea32320cecd80748337d74e57a4
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
377KB
MD52728fd727af57dd83a07f35e985da0b0
SHA1d7d165b3b172cc81755111ca3e72d6818fcfd10b
SHA25641c1e35ce06c88b036be5142b5960a7cbdb168f6993d1d45ba54c9010eaece35
SHA512d87a9532548f35ccbfd97fcfe057389c461bb8c8a8e1e66ea34c1eefdd66bf21c93fdd28f5fa92bd2750a1555e508c5d4adcaefbf7df739313e68830ff87d89a
-
Filesize
377KB
MD52728fd727af57dd83a07f35e985da0b0
SHA1d7d165b3b172cc81755111ca3e72d6818fcfd10b
SHA25641c1e35ce06c88b036be5142b5960a7cbdb168f6993d1d45ba54c9010eaece35
SHA512d87a9532548f35ccbfd97fcfe057389c461bb8c8a8e1e66ea34c1eefdd66bf21c93fdd28f5fa92bd2750a1555e508c5d4adcaefbf7df739313e68830ff87d89a
-
Filesize
357KB
MD53fce92f0eb7fda506a0cd4b25d6f9412
SHA119fd646dfb3e987863958a366cab57ae50afb6e8
SHA256e0c2d75ec47b5c84689c9449bd7daf4c868b6cbd54edb88a5b7ec4d72743d603
SHA512888112ca41ad96a517d28b436989cd8971541c083cf05a37c8678ea7bd52b764faadb708876f1ec5aee6dddde673b9f7fc4933b8f6fee2198050528eaf33c1bc
-
Filesize
357KB
MD53fce92f0eb7fda506a0cd4b25d6f9412
SHA119fd646dfb3e987863958a366cab57ae50afb6e8
SHA256e0c2d75ec47b5c84689c9449bd7daf4c868b6cbd54edb88a5b7ec4d72743d603
SHA512888112ca41ad96a517d28b436989cd8971541c083cf05a37c8678ea7bd52b764faadb708876f1ec5aee6dddde673b9f7fc4933b8f6fee2198050528eaf33c1bc
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
172KB
MD5c65cc30841fba59720466b03fe58a665
SHA1fc5ebc953b98a8c44439673bab4150dc796461ea
SHA256dfe69a53a236dc75fa66816293c94ac69a571ca2b9f40c9c44f1297bf46ef4ed
SHA512f94d446cb55316133073e1c80f8cce5a580053cc2fe152fa0422c2ae876e58492634db6afec75847773fd3d08f1e643ce55fc763b1c2119c407a757bc84528c5
-
Filesize
172KB
MD5c65cc30841fba59720466b03fe58a665
SHA1fc5ebc953b98a8c44439673bab4150dc796461ea
SHA256dfe69a53a236dc75fa66816293c94ac69a571ca2b9f40c9c44f1297bf46ef4ed
SHA512f94d446cb55316133073e1c80f8cce5a580053cc2fe152fa0422c2ae876e58492634db6afec75847773fd3d08f1e643ce55fc763b1c2119c407a757bc84528c5
-
Filesize
205KB
MD5ea85e887e449cbe624532d37ee198c8b
SHA1ec04f1aa439077c4471cc4e6e9dfd2163c737892
SHA25678e1ba798cf7c443b7a67adc2c7e95f6216db5af08830d00512fdc8d4a36463c
SHA5126ebfe7a13cf41331d5c07943009265aed4d869c3d9abc8e8d37234d2d45d219aedec66b1cf17233c0a2f06f5fc8d04427c1f45c889aa1c17b842c43790970136
-
Filesize
205KB
MD5ea85e887e449cbe624532d37ee198c8b
SHA1ec04f1aa439077c4471cc4e6e9dfd2163c737892
SHA25678e1ba798cf7c443b7a67adc2c7e95f6216db5af08830d00512fdc8d4a36463c
SHA5126ebfe7a13cf41331d5c07943009265aed4d869c3d9abc8e8d37234d2d45d219aedec66b1cf17233c0a2f06f5fc8d04427c1f45c889aa1c17b842c43790970136
-
Filesize
202KB
MD5f7e4f521c0d8a409ad3f22b79c3c9414
SHA1081b2dcf1759968615819d7de9b2c7ecad6ce3d5
SHA25636e92edf7325b6c6dbc61527eb9d33fbd1bf12d9235241d690c4414ecfe95e50
SHA5121e9e50d3a340807a62cfc6d2242e4c31dd63a1927e5051815cc94cc65ab5472b1512db986cd7f48bbe401068309a06ae4f539c98a56aa08ae0381a44d6172b19
-
Filesize
202KB
MD5f7e4f521c0d8a409ad3f22b79c3c9414
SHA1081b2dcf1759968615819d7de9b2c7ecad6ce3d5
SHA25636e92edf7325b6c6dbc61527eb9d33fbd1bf12d9235241d690c4414ecfe95e50
SHA5121e9e50d3a340807a62cfc6d2242e4c31dd63a1927e5051815cc94cc65ab5472b1512db986cd7f48bbe401068309a06ae4f539c98a56aa08ae0381a44d6172b19
-
Filesize
172KB
MD52822dd829bb5d30c95f4b680b73a6742
SHA11b297cc15b39e903b1658d0afe05b0b476305859
SHA256dae7eb576539133ca43558d23fd69dae00d117cf6996eb00e32cfe2bd4c4096b
SHA51244be99a75b99884461d7bd16efb28ebb32423ea1f83fc339a64c2aa1f9849c7b87931cddfcbfbce97be2433a1f6ff765377c31d79c849a11344a769a6bf7646c
-
Filesize
172KB
MD52822dd829bb5d30c95f4b680b73a6742
SHA11b297cc15b39e903b1658d0afe05b0b476305859
SHA256dae7eb576539133ca43558d23fd69dae00d117cf6996eb00e32cfe2bd4c4096b
SHA51244be99a75b99884461d7bd16efb28ebb32423ea1f83fc339a64c2aa1f9849c7b87931cddfcbfbce97be2433a1f6ff765377c31d79c849a11344a769a6bf7646c
-
Filesize
172KB
MD52822dd829bb5d30c95f4b680b73a6742
SHA11b297cc15b39e903b1658d0afe05b0b476305859
SHA256dae7eb576539133ca43558d23fd69dae00d117cf6996eb00e32cfe2bd4c4096b
SHA51244be99a75b99884461d7bd16efb28ebb32423ea1f83fc339a64c2aa1f9849c7b87931cddfcbfbce97be2433a1f6ff765377c31d79c849a11344a769a6bf7646c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
105KB
MD59d1ec1c2160bb635826341d3adfb022e
SHA10745f7b9180be5cbfc786bff287503bd0c3d0f7d
SHA2569e6dad0a790381410ae697828d5a65c780a06ae04d3b65084c77302f72d90fc1
SHA5128edbec24a406490dc7854502039c754e6c6a3e52bf5c18d9729be024c5c575aa491e5f7ea3a2ccc0c2b0dca1097a07f9216869f56a6684aeff03fee86b71e440
-
Filesize
105KB
MD59d1ec1c2160bb635826341d3adfb022e
SHA10745f7b9180be5cbfc786bff287503bd0c3d0f7d
SHA2569e6dad0a790381410ae697828d5a65c780a06ae04d3b65084c77302f72d90fc1
SHA5128edbec24a406490dc7854502039c754e6c6a3e52bf5c18d9729be024c5c575aa491e5f7ea3a2ccc0c2b0dca1097a07f9216869f56a6684aeff03fee86b71e440
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
267KB
MD57bebdf29826fae00fa63f0402576a063
SHA18abe516f217c04399092d1b695e2a33380643d16
SHA256fe77d4691b7c3b0385a022f841fc5b37f0baa87c1b9c779366eb29691918201a
SHA5129f90d343c8783e938f173b6a771ec5a5a8afa0d4a290ae1ddf78aa749e4017428ac9e9da78d476ffdeb9116c2848dc481c1afaa6114534039d84fa4b43720ad4
-
Filesize
267KB
MD57bebdf29826fae00fa63f0402576a063
SHA18abe516f217c04399092d1b695e2a33380643d16
SHA256fe77d4691b7c3b0385a022f841fc5b37f0baa87c1b9c779366eb29691918201a
SHA5129f90d343c8783e938f173b6a771ec5a5a8afa0d4a290ae1ddf78aa749e4017428ac9e9da78d476ffdeb9116c2848dc481c1afaa6114534039d84fa4b43720ad4
-
Filesize
529KB
MD5c4e47074adb42b4c6a888ce67ced11ee
SHA1a70bb186a7cd64e478abbd91d3c99192736275a0
SHA256a9b6647489cfb8dd89c3c76f8669e9bc5a4e4bd31c5a8efa40a8f17a32cbbd86
SHA5129479643b2bf9ed86966ae61e49e2d4ad5c63bd73a5688ddf7fc74eff3103c1d063183be3d5c75727c761cdffeea6f269c8587486d67736817c60e491232c9dc2
-
Filesize
529KB
MD5c4e47074adb42b4c6a888ce67ced11ee
SHA1a70bb186a7cd64e478abbd91d3c99192736275a0
SHA256a9b6647489cfb8dd89c3c76f8669e9bc5a4e4bd31c5a8efa40a8f17a32cbbd86
SHA5129479643b2bf9ed86966ae61e49e2d4ad5c63bd73a5688ddf7fc74eff3103c1d063183be3d5c75727c761cdffeea6f269c8587486d67736817c60e491232c9dc2
-
Filesize
529KB
MD5c4e47074adb42b4c6a888ce67ced11ee
SHA1a70bb186a7cd64e478abbd91d3c99192736275a0
SHA256a9b6647489cfb8dd89c3c76f8669e9bc5a4e4bd31c5a8efa40a8f17a32cbbd86
SHA5129479643b2bf9ed86966ae61e49e2d4ad5c63bd73a5688ddf7fc74eff3103c1d063183be3d5c75727c761cdffeea6f269c8587486d67736817c60e491232c9dc2
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
357KB
MD53fce92f0eb7fda506a0cd4b25d6f9412
SHA119fd646dfb3e987863958a366cab57ae50afb6e8
SHA256e0c2d75ec47b5c84689c9449bd7daf4c868b6cbd54edb88a5b7ec4d72743d603
SHA512888112ca41ad96a517d28b436989cd8971541c083cf05a37c8678ea7bd52b764faadb708876f1ec5aee6dddde673b9f7fc4933b8f6fee2198050528eaf33c1bc
-
Filesize
357KB
MD53fce92f0eb7fda506a0cd4b25d6f9412
SHA119fd646dfb3e987863958a366cab57ae50afb6e8
SHA256e0c2d75ec47b5c84689c9449bd7daf4c868b6cbd54edb88a5b7ec4d72743d603
SHA512888112ca41ad96a517d28b436989cd8971541c083cf05a37c8678ea7bd52b764faadb708876f1ec5aee6dddde673b9f7fc4933b8f6fee2198050528eaf33c1bc
-
Filesize
357KB
MD53fce92f0eb7fda506a0cd4b25d6f9412
SHA119fd646dfb3e987863958a366cab57ae50afb6e8
SHA256e0c2d75ec47b5c84689c9449bd7daf4c868b6cbd54edb88a5b7ec4d72743d603
SHA512888112ca41ad96a517d28b436989cd8971541c083cf05a37c8678ea7bd52b764faadb708876f1ec5aee6dddde673b9f7fc4933b8f6fee2198050528eaf33c1bc
-
Filesize
172KB
MD5c65cc30841fba59720466b03fe58a665
SHA1fc5ebc953b98a8c44439673bab4150dc796461ea
SHA256dfe69a53a236dc75fa66816293c94ac69a571ca2b9f40c9c44f1297bf46ef4ed
SHA512f94d446cb55316133073e1c80f8cce5a580053cc2fe152fa0422c2ae876e58492634db6afec75847773fd3d08f1e643ce55fc763b1c2119c407a757bc84528c5
-
Filesize
172KB
MD5c65cc30841fba59720466b03fe58a665
SHA1fc5ebc953b98a8c44439673bab4150dc796461ea
SHA256dfe69a53a236dc75fa66816293c94ac69a571ca2b9f40c9c44f1297bf46ef4ed
SHA512f94d446cb55316133073e1c80f8cce5a580053cc2fe152fa0422c2ae876e58492634db6afec75847773fd3d08f1e643ce55fc763b1c2119c407a757bc84528c5
-
Filesize
202KB
MD5f7e4f521c0d8a409ad3f22b79c3c9414
SHA1081b2dcf1759968615819d7de9b2c7ecad6ce3d5
SHA25636e92edf7325b6c6dbc61527eb9d33fbd1bf12d9235241d690c4414ecfe95e50
SHA5121e9e50d3a340807a62cfc6d2242e4c31dd63a1927e5051815cc94cc65ab5472b1512db986cd7f48bbe401068309a06ae4f539c98a56aa08ae0381a44d6172b19
-
Filesize
202KB
MD5f7e4f521c0d8a409ad3f22b79c3c9414
SHA1081b2dcf1759968615819d7de9b2c7ecad6ce3d5
SHA25636e92edf7325b6c6dbc61527eb9d33fbd1bf12d9235241d690c4414ecfe95e50
SHA5121e9e50d3a340807a62cfc6d2242e4c31dd63a1927e5051815cc94cc65ab5472b1512db986cd7f48bbe401068309a06ae4f539c98a56aa08ae0381a44d6172b19
-
Filesize
202KB
MD5f7e4f521c0d8a409ad3f22b79c3c9414
SHA1081b2dcf1759968615819d7de9b2c7ecad6ce3d5
SHA25636e92edf7325b6c6dbc61527eb9d33fbd1bf12d9235241d690c4414ecfe95e50
SHA5121e9e50d3a340807a62cfc6d2242e4c31dd63a1927e5051815cc94cc65ab5472b1512db986cd7f48bbe401068309a06ae4f539c98a56aa08ae0381a44d6172b19
-
Filesize
105KB
MD59d1ec1c2160bb635826341d3adfb022e
SHA10745f7b9180be5cbfc786bff287503bd0c3d0f7d
SHA2569e6dad0a790381410ae697828d5a65c780a06ae04d3b65084c77302f72d90fc1
SHA5128edbec24a406490dc7854502039c754e6c6a3e52bf5c18d9729be024c5c575aa491e5f7ea3a2ccc0c2b0dca1097a07f9216869f56a6684aeff03fee86b71e440
-
Filesize
105KB
MD59d1ec1c2160bb635826341d3adfb022e
SHA10745f7b9180be5cbfc786bff287503bd0c3d0f7d
SHA2569e6dad0a790381410ae697828d5a65c780a06ae04d3b65084c77302f72d90fc1
SHA5128edbec24a406490dc7854502039c754e6c6a3e52bf5c18d9729be024c5c575aa491e5f7ea3a2ccc0c2b0dca1097a07f9216869f56a6684aeff03fee86b71e440
-
Filesize
105KB
MD59d1ec1c2160bb635826341d3adfb022e
SHA10745f7b9180be5cbfc786bff287503bd0c3d0f7d
SHA2569e6dad0a790381410ae697828d5a65c780a06ae04d3b65084c77302f72d90fc1
SHA5128edbec24a406490dc7854502039c754e6c6a3e52bf5c18d9729be024c5c575aa491e5f7ea3a2ccc0c2b0dca1097a07f9216869f56a6684aeff03fee86b71e440
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5