Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2023, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
4211eeba048c6e90e7da732ee62ef8c8602b39f55a6b1536a3f48963005506f8.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
4211eeba048c6e90e7da732ee62ef8c8602b39f55a6b1536a3f48963005506f8.exe
Resource
win10v2004-20230621-en
General
-
Target
4211eeba048c6e90e7da732ee62ef8c8602b39f55a6b1536a3f48963005506f8.exe
-
Size
5.8MB
-
MD5
d23e69a7bcbe1f775b68341d9a48ad55
-
SHA1
ea997af665d07f87848dcf83de1468b6e2c6c372
-
SHA256
4211eeba048c6e90e7da732ee62ef8c8602b39f55a6b1536a3f48963005506f8
-
SHA512
8d412031c784e3f94dc60511e9d9471bc943a8d6f274484790e43b8c16040b451b5c00cc9d97f5d1a57cd0b3d0c07a9f09560963481b34bf8c0378743e0d3a61
-
SSDEEP
98304:VALTKkN3jEIZUZW14tYyuNVZpBad8wdqetuejwCgNp52CA0/uZUT1:23KKjX+WStYyAVTBad8w9tDjwCyjRl/f
Malware Config
Extracted
redline
mucha
83.97.73.131:19071
-
auth_value
5d76e123341992ecf110010eb89456f0
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
smoke
83.97.73.131:19071
-
auth_value
aaa47198b84c95fcce9397339e8af9d4
Signatures
-
Detects Healer an antivirus disabler dropper 8 IoCs
resource yara_rule behavioral2/memory/3008-168-0x0000000000600000-0x000000000060A000-memory.dmp healer behavioral2/files/0x0006000000023247-175.dat healer behavioral2/files/0x0006000000023247-176.dat healer behavioral2/memory/3560-177-0x0000000000C20000-0x0000000000C2A000-memory.dmp healer behavioral2/files/0x0006000000023252-240.dat healer behavioral2/memory/5052-281-0x00000000004F0000-0x00000000004FA000-memory.dmp healer behavioral2/files/0x0006000000023252-318.dat healer behavioral2/files/0x0006000000023252-317.dat healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8428249.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b0059191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b0059191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" i9325586.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" i9325586.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" i9325586.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8428249.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b0059191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b0059191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8174497.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8174497.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" i9325586.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8428249.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8428249.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8428249.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b0059191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8174497.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8174497.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" i9325586.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8428249.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b0059191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8174497.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2177513644-1903222820-241662473-1000\Control Panel\International\Geo\Nation e4030853.exe Key value queried \REGISTRY\USER\S-1-5-21-2177513644-1903222820-241662473-1000\Control Panel\International\Geo\Nation rugen.exe Key value queried \REGISTRY\USER\S-1-5-21-2177513644-1903222820-241662473-1000\Control Panel\International\Geo\Nation F2AF.exe -
Executes dropped EXE 22 IoCs
pid Process 2376 v6089112.exe 4916 v1604693.exe 4852 v8050458.exe 3008 a8428249.exe 3560 b0059191.exe 2204 c2061808.exe 336 d5506701.exe 1924 e4030853.exe 1020 rugen.exe 1296 EDBB.exe 4804 EF81.exe 3472 x2106253.exe 1584 f1969875.exe 3008 F2AF.exe 4368 y3378866.exe 5052 k8174497.exe 3856 l3193242.exe 3288 g5459915.exe 2992 i9325586.exe 2228 rugen.exe 3688 n4945939.exe 1896 rugen.exe -
Loads dropped DLL 4 IoCs
pid Process 3736 rundll32.exe 3736 rundll32.exe 336 rundll32.exe 2108 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" i9325586.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8428249.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8428249.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b0059191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8174497.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" EF81.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3378866.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6089112.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6089112.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1604693.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" EDBB.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8050458.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8050458.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y3378866.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4211eeba048c6e90e7da732ee62ef8c8602b39f55a6b1536a3f48963005506f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4211eeba048c6e90e7da732ee62ef8c8602b39f55a6b1536a3f48963005506f8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x2106253.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2106253.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1604693.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce EDBB.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce EF81.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d5506701.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d5506701.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d5506701.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5088 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3008 a8428249.exe 3008 a8428249.exe 3560 b0059191.exe 3560 b0059191.exe 2204 c2061808.exe 2204 c2061808.exe 336 d5506701.exe 336 d5506701.exe 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2896 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 336 d5506701.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3008 a8428249.exe Token: SeDebugPrivilege 3560 b0059191.exe Token: SeDebugPrivilege 2204 c2061808.exe Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeDebugPrivilege 5052 k8174497.exe Token: SeDebugPrivilege 1584 f1969875.exe Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeDebugPrivilege 2992 i9325586.exe Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeDebugPrivilege 3856 l3193242.exe Token: SeShutdownPrivilege 2896 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 e4030853.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2376 2312 4211eeba048c6e90e7da732ee62ef8c8602b39f55a6b1536a3f48963005506f8.exe 86 PID 2312 wrote to memory of 2376 2312 4211eeba048c6e90e7da732ee62ef8c8602b39f55a6b1536a3f48963005506f8.exe 86 PID 2312 wrote to memory of 2376 2312 4211eeba048c6e90e7da732ee62ef8c8602b39f55a6b1536a3f48963005506f8.exe 86 PID 2376 wrote to memory of 4916 2376 v6089112.exe 87 PID 2376 wrote to memory of 4916 2376 v6089112.exe 87 PID 2376 wrote to memory of 4916 2376 v6089112.exe 87 PID 4916 wrote to memory of 4852 4916 v1604693.exe 88 PID 4916 wrote to memory of 4852 4916 v1604693.exe 88 PID 4916 wrote to memory of 4852 4916 v1604693.exe 88 PID 4852 wrote to memory of 3008 4852 v8050458.exe 89 PID 4852 wrote to memory of 3008 4852 v8050458.exe 89 PID 4852 wrote to memory of 3008 4852 v8050458.exe 89 PID 4852 wrote to memory of 3560 4852 v8050458.exe 94 PID 4852 wrote to memory of 3560 4852 v8050458.exe 94 PID 4916 wrote to memory of 2204 4916 v1604693.exe 95 PID 4916 wrote to memory of 2204 4916 v1604693.exe 95 PID 4916 wrote to memory of 2204 4916 v1604693.exe 95 PID 2376 wrote to memory of 336 2376 v6089112.exe 101 PID 2376 wrote to memory of 336 2376 v6089112.exe 101 PID 2376 wrote to memory of 336 2376 v6089112.exe 101 PID 2312 wrote to memory of 1924 2312 4211eeba048c6e90e7da732ee62ef8c8602b39f55a6b1536a3f48963005506f8.exe 102 PID 2312 wrote to memory of 1924 2312 4211eeba048c6e90e7da732ee62ef8c8602b39f55a6b1536a3f48963005506f8.exe 102 PID 2312 wrote to memory of 1924 2312 4211eeba048c6e90e7da732ee62ef8c8602b39f55a6b1536a3f48963005506f8.exe 102 PID 1924 wrote to memory of 1020 1924 e4030853.exe 103 PID 1924 wrote to memory of 1020 1924 e4030853.exe 103 PID 1924 wrote to memory of 1020 1924 e4030853.exe 103 PID 1020 wrote to memory of 5088 1020 rugen.exe 104 PID 1020 wrote to memory of 5088 1020 rugen.exe 104 PID 1020 wrote to memory of 5088 1020 rugen.exe 104 PID 1020 wrote to memory of 468 1020 rugen.exe 106 PID 1020 wrote to memory of 468 1020 rugen.exe 106 PID 1020 wrote to memory of 468 1020 rugen.exe 106 PID 468 wrote to memory of 4100 468 cmd.exe 108 PID 468 wrote to memory of 4100 468 cmd.exe 108 PID 468 wrote to memory of 4100 468 cmd.exe 108 PID 468 wrote to memory of 4528 468 cmd.exe 109 PID 468 wrote to memory of 4528 468 cmd.exe 109 PID 468 wrote to memory of 4528 468 cmd.exe 109 PID 468 wrote to memory of 4452 468 cmd.exe 110 PID 468 wrote to memory of 4452 468 cmd.exe 110 PID 468 wrote to memory of 4452 468 cmd.exe 110 PID 468 wrote to memory of 4132 468 cmd.exe 111 PID 468 wrote to memory of 4132 468 cmd.exe 111 PID 468 wrote to memory of 4132 468 cmd.exe 111 PID 468 wrote to memory of 2112 468 cmd.exe 112 PID 468 wrote to memory of 2112 468 cmd.exe 112 PID 468 wrote to memory of 2112 468 cmd.exe 112 PID 468 wrote to memory of 4532 468 cmd.exe 113 PID 468 wrote to memory of 4532 468 cmd.exe 113 PID 468 wrote to memory of 4532 468 cmd.exe 113 PID 2896 wrote to memory of 1296 2896 Process not Found 116 PID 2896 wrote to memory of 1296 2896 Process not Found 116 PID 2896 wrote to memory of 1296 2896 Process not Found 116 PID 2896 wrote to memory of 4804 2896 Process not Found 118 PID 2896 wrote to memory of 4804 2896 Process not Found 118 PID 2896 wrote to memory of 4804 2896 Process not Found 118 PID 1296 wrote to memory of 3472 1296 EDBB.exe 120 PID 1296 wrote to memory of 3472 1296 EDBB.exe 120 PID 1296 wrote to memory of 3472 1296 EDBB.exe 120 PID 3472 wrote to memory of 1584 3472 x2106253.exe 123 PID 3472 wrote to memory of 1584 3472 x2106253.exe 123 PID 3472 wrote to memory of 1584 3472 x2106253.exe 123 PID 2896 wrote to memory of 3008 2896 Process not Found 124 PID 2896 wrote to memory of 3008 2896 Process not Found 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\4211eeba048c6e90e7da732ee62ef8c8602b39f55a6b1536a3f48963005506f8.exe"C:\Users\Admin\AppData\Local\Temp\4211eeba048c6e90e7da732ee62ef8c8602b39f55a6b1536a3f48963005506f8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6089112.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6089112.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1604693.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1604693.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8050458.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8050458.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8428249.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8428249.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0059191.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0059191.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2061808.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2061808.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5506701.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5506701.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:336
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e4030853.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e4030853.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:5088
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:4528
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:4452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4132
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:2112
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:4532
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EDBB.exeC:\Users\Admin\AppData\Local\Temp\EDBB.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2106253.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2106253.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f1969875.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f1969875.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5459915.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5459915.exe3⤵
- Executes dropped EXE
PID:3288
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9325586.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9325586.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\EF81.exeC:\Users\Admin\AppData\Local\Temp\EF81.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y3378866.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y3378866.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k8174497.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k8174497.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3193242.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3193242.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4945939.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4945939.exe2⤵
- Executes dropped EXE
PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\F2AF.exeC:\Users\Admin\AppData\Local\Temp\F2AF.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:3008 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\Y9YJ0Lu.k2⤵PID:1600
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\Y9YJ0Lu.k3⤵
- Loads dropped DLL
PID:3736 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\Y9YJ0Lu.k4⤵PID:1400
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\Y9YJ0Lu.k5⤵
- Loads dropped DLL
PID:336
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:2228
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:1896
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD57f305d024899e4809fb6f4ae00da304c
SHA1f88a0812d36e0562ede3732ab511f459a09faff8
SHA2568fe1088ad55d05a3c2149648c8c1ce55862e925580308afe4a4ff6cfb089c769
SHA512bc40698582400427cd47cf80dcf39202a74148b69ed179483160b4023368d53301fa12fe6d530d9c7cdfe5f78d19ee87a285681f537950334677f8af8dfeb2ae
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
514KB
MD56cc267fc2d3490f655c052090180789e
SHA179464a2964fba0f7085512e9eeea52a358d05264
SHA2567280867d85444bb7f8a07ff2e8a2d8b0490e95050c08125106c9e19699c3d4a8
SHA512b6cf33cb89a4c07425a87fddc87a21ace7738c0f1c9a9106cff21fe343524aa2d99148fbb76406e3cfd2aafbdeb0fb6aa7c9143450c587cbf27dc793be879007
-
Filesize
514KB
MD56cc267fc2d3490f655c052090180789e
SHA179464a2964fba0f7085512e9eeea52a358d05264
SHA2567280867d85444bb7f8a07ff2e8a2d8b0490e95050c08125106c9e19699c3d4a8
SHA512b6cf33cb89a4c07425a87fddc87a21ace7738c0f1c9a9106cff21fe343524aa2d99148fbb76406e3cfd2aafbdeb0fb6aa7c9143450c587cbf27dc793be879007
-
Filesize
528KB
MD504581e6ca8eef48121b14b1074ad6ebc
SHA11e622657a3fc6e72fd2e9f995c47bef103de03e2
SHA256d4db966b3a58af67860d3165d7453caa9badcfdd94cad4272f1a33dac1a740d1
SHA512b76ab21713d37715dbb8442e5e49bd2db14aaca6725697b007732c2c32b94d3581229120dbe6f6f6c32f4073d7e7598f746dc062d8065aeb6498f0a2cd3fda68
-
Filesize
528KB
MD504581e6ca8eef48121b14b1074ad6ebc
SHA11e622657a3fc6e72fd2e9f995c47bef103de03e2
SHA256d4db966b3a58af67860d3165d7453caa9badcfdd94cad4272f1a33dac1a740d1
SHA512b76ab21713d37715dbb8442e5e49bd2db14aaca6725697b007732c2c32b94d3581229120dbe6f6f6c32f4073d7e7598f746dc062d8065aeb6498f0a2cd3fda68
-
Filesize
1.5MB
MD51c712f852d50ab9149b7c82d67716388
SHA105360da07d35d2ec6f0705f2f775809c4d03fc9d
SHA2564aeaf8f4fc406c1a33358d6f9ce892b85d3e8c5030a5dbcbc8ebc4daae356c06
SHA5123b4af67c4b52b7891aa0a1b12b4f1feec50269823e8e2ff2a57c6a1d0a57e6fac828e27df65ab1f641868a0c95872168220613109556ae75a7d4748f9cf64a29
-
Filesize
1.5MB
MD51c712f852d50ab9149b7c82d67716388
SHA105360da07d35d2ec6f0705f2f775809c4d03fc9d
SHA2564aeaf8f4fc406c1a33358d6f9ce892b85d3e8c5030a5dbcbc8ebc4daae356c06
SHA5123b4af67c4b52b7891aa0a1b12b4f1feec50269823e8e2ff2a57c6a1d0a57e6fac828e27df65ab1f641868a0c95872168220613109556ae75a7d4748f9cf64a29
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
656KB
MD5c9742460203b0c6b63c6ee05cafbf7df
SHA10f6f6d144736bc9c84e3825cd16e564930802355
SHA25679c1c98517ebdf94ee9bcc6469bef04ab7604d6fb9ec2d6d093b8a818ed17654
SHA512da08791c103280507c000e767872647aeaf587299b007a563feb84e8095bab9669b3b73e7b93a77454ee0d50520a7ddf54d889182e096b5458dd0c534a0a2218
-
Filesize
656KB
MD5c9742460203b0c6b63c6ee05cafbf7df
SHA10f6f6d144736bc9c84e3825cd16e564930802355
SHA25679c1c98517ebdf94ee9bcc6469bef04ab7604d6fb9ec2d6d093b8a818ed17654
SHA512da08791c103280507c000e767872647aeaf587299b007a563feb84e8095bab9669b3b73e7b93a77454ee0d50520a7ddf54d889182e096b5458dd0c534a0a2218
-
Filesize
321KB
MD5df74dedc3abda8f6491f24ffff65f498
SHA102c4cbd0d5120c24c2a68c1ad7a5cfc6be6b07b0
SHA256557b47d68cbffa32c4f6b355575815d17656e20b07a999af0b1394a8ce1a4c78
SHA512dac314fc4e01ef0160b07b65fab354c51633532b83e19a5a18070541832dad4b23b8ffb1124a143ebc82fecda3e1e1456c1d0275f5991ba7bab79cf740ce63d8
-
Filesize
321KB
MD5df74dedc3abda8f6491f24ffff65f498
SHA102c4cbd0d5120c24c2a68c1ad7a5cfc6be6b07b0
SHA256557b47d68cbffa32c4f6b355575815d17656e20b07a999af0b1394a8ce1a4c78
SHA512dac314fc4e01ef0160b07b65fab354c51633532b83e19a5a18070541832dad4b23b8ffb1124a143ebc82fecda3e1e1456c1d0275f5991ba7bab79cf740ce63d8
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
264KB
MD5d291105e02d73ab3276f42ef0bff84ea
SHA1a8ec05d6dca8619db4394951d89fd1fa907a9edc
SHA256266c904d7f6f6617fad167a334e76d378ed04ad74f388be0f37447ffc519f7af
SHA512fde15ce6f4be61aad2723d0b2f244f8d20d0fbf57961fe8a66edb0d21a4fe84e0767af93623daf9f2909354eaa517d4a897bde26801732cf9353cb7523197df0
-
Filesize
264KB
MD5d291105e02d73ab3276f42ef0bff84ea
SHA1a8ec05d6dca8619db4394951d89fd1fa907a9edc
SHA256266c904d7f6f6617fad167a334e76d378ed04ad74f388be0f37447ffc519f7af
SHA512fde15ce6f4be61aad2723d0b2f244f8d20d0fbf57961fe8a66edb0d21a4fe84e0767af93623daf9f2909354eaa517d4a897bde26801732cf9353cb7523197df0
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
558KB
MD5b038f1baef74af2f72be6a2386174699
SHA1d9ba47fa45597ed6676ea595c280f4e50c417bfd
SHA256d295605ff1e6c9c4b8c35fa0e6ddca35b56e88da0ad1eb145e4740417767c423
SHA51207c5049145e26ba8bb3b66ac3a5e7e29014e6fcfd96a0dd7fe0db13c0a47d7a71148626354f5bbf2f297a8e196b424ba9ae3e53328cb760ebbd32a9d518314b2
-
Filesize
558KB
MD5b038f1baef74af2f72be6a2386174699
SHA1d9ba47fa45597ed6676ea595c280f4e50c417bfd
SHA256d295605ff1e6c9c4b8c35fa0e6ddca35b56e88da0ad1eb145e4740417767c423
SHA51207c5049145e26ba8bb3b66ac3a5e7e29014e6fcfd96a0dd7fe0db13c0a47d7a71148626354f5bbf2f297a8e196b424ba9ae3e53328cb760ebbd32a9d518314b2
-
Filesize
1.3MB
MD52b5c643b29697ee99f623d8632e0cd0f
SHA1bff108b6543d3a9b69ee02c14426319066e6040b
SHA256693cc0c1d52b899d981bcd5eb6600970775b57205a5a51dfe4d480b56460d137
SHA512ac6d1ab125c72e54ee30e1fc1dcb11080da68a6a73f683a5ce5fe2ed207fd3a2914d651bfd5deee64ffc6652afba7f619ff01f02d7af2d95830c4228fdc1469b
-
Filesize
1.3MB
MD52b5c643b29697ee99f623d8632e0cd0f
SHA1bff108b6543d3a9b69ee02c14426319066e6040b
SHA256693cc0c1d52b899d981bcd5eb6600970775b57205a5a51dfe4d480b56460d137
SHA512ac6d1ab125c72e54ee30e1fc1dcb11080da68a6a73f683a5ce5fe2ed207fd3a2914d651bfd5deee64ffc6652afba7f619ff01f02d7af2d95830c4228fdc1469b
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
227KB
MD5d8265f16f6d209a7ec393252836a0815
SHA1f954cf98471938854f2b9d9805a1a8500657a041
SHA256d5ae17377f15ca41df5a4eb358c6551e2a15d66cecaa55974e02e504222f4711
SHA512c6f6103abcda470c86bbb016d91569fe2d73c27a28652c8adc59e72db2a6ad6bf33cf6054cd6791907fce6352b271fc12f2d74fd00b59b38ba3533535483b4ee
-
Filesize
227KB
MD5d8265f16f6d209a7ec393252836a0815
SHA1f954cf98471938854f2b9d9805a1a8500657a041
SHA256d5ae17377f15ca41df5a4eb358c6551e2a15d66cecaa55974e02e504222f4711
SHA512c6f6103abcda470c86bbb016d91569fe2d73c27a28652c8adc59e72db2a6ad6bf33cf6054cd6791907fce6352b271fc12f2d74fd00b59b38ba3533535483b4ee
-
Filesize
264KB
MD507deae40efa6519fed25eb4b30a4a9d2
SHA182ced988b1d46ff4555f844f1432d710e18c6fc4
SHA25692edd0a9461920376619df72e41ab16ce1d73766e942d446741ffcd13b1ca3af
SHA512a535f3451c0007a20afbbc65ed7c6519c47b30b1d227997f21c8d8e802bf3ce2d9dbe6f69647ddc7d5a65782b05b9a7c2416c931632d5f72aa28f315f1a9c50a
-
Filesize
264KB
MD507deae40efa6519fed25eb4b30a4a9d2
SHA182ced988b1d46ff4555f844f1432d710e18c6fc4
SHA25692edd0a9461920376619df72e41ab16ce1d73766e942d446741ffcd13b1ca3af
SHA512a535f3451c0007a20afbbc65ed7c6519c47b30b1d227997f21c8d8e802bf3ce2d9dbe6f69647ddc7d5a65782b05b9a7c2416c931632d5f72aa28f315f1a9c50a
-
Filesize
176KB
MD5211a06e9ae68ced1234252a48696431b
SHA169950e2ee2fafd177d1a295836713bfd8d18df9c
SHA2560bdca9c84103454e329cfde4e69dc41a0ec0196c078c8fc195b0fa739d2f905d
SHA512b1643ba376075619335b4bdf0d7610aece13b7c9db60eecb508465f97ef3e6a9d5297f9ac8529886efa052cdd8814ac7d4eeab44812f797a1b2dc5fa967ee7eb
-
Filesize
176KB
MD5211a06e9ae68ced1234252a48696431b
SHA169950e2ee2fafd177d1a295836713bfd8d18df9c
SHA2560bdca9c84103454e329cfde4e69dc41a0ec0196c078c8fc195b0fa739d2f905d
SHA512b1643ba376075619335b4bdf0d7610aece13b7c9db60eecb508465f97ef3e6a9d5297f9ac8529886efa052cdd8814ac7d4eeab44812f797a1b2dc5fa967ee7eb
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
102KB
MD500f94b0034f0a8d27cad4b4c9d379554
SHA10df6e9cfbfed1182e1fda75769c5f57ec990a401
SHA256610ec3c888fa5fbc21a81f8553bf65c169d6f095151c758f60616a070cdb0658
SHA5122165fbe9d877e430b5e74b446b369ba2b3df7ba26db5366f45b86f17be26f6a4b546a455906479d29ae0acd963162fe03182bc1f5e276ac9af1db9d8accdfc55
-
Filesize
102KB
MD500f94b0034f0a8d27cad4b4c9d379554
SHA10df6e9cfbfed1182e1fda75769c5f57ec990a401
SHA256610ec3c888fa5fbc21a81f8553bf65c169d6f095151c758f60616a070cdb0658
SHA5122165fbe9d877e430b5e74b446b369ba2b3df7ba26db5366f45b86f17be26f6a4b546a455906479d29ae0acd963162fe03182bc1f5e276ac9af1db9d8accdfc55
-
Filesize
264KB
MD59ef3242c6eee96338bd913e08866ce01
SHA1a6e09b5d3bb338ad794257256196fc112fbb37c4
SHA2561c844afacdebb7335ed7cc1758df753e828bd777eae2398c0d7a4ad520b3988a
SHA5128578ff2af53bc07bded348627a1838c3429c5f29e681f51ff6ce667daba40d005df9a91135be24ba36abf7660d34405ffc29c16de2dea98b30cc92003c91f562
-
Filesize
264KB
MD59ef3242c6eee96338bd913e08866ce01
SHA1a6e09b5d3bb338ad794257256196fc112fbb37c4
SHA2561c844afacdebb7335ed7cc1758df753e828bd777eae2398c0d7a4ad520b3988a
SHA5128578ff2af53bc07bded348627a1838c3429c5f29e681f51ff6ce667daba40d005df9a91135be24ba36abf7660d34405ffc29c16de2dea98b30cc92003c91f562
-
Filesize
264KB
MD59ef3242c6eee96338bd913e08866ce01
SHA1a6e09b5d3bb338ad794257256196fc112fbb37c4
SHA2561c844afacdebb7335ed7cc1758df753e828bd777eae2398c0d7a4ad520b3988a
SHA5128578ff2af53bc07bded348627a1838c3429c5f29e681f51ff6ce667daba40d005df9a91135be24ba36abf7660d34405ffc29c16de2dea98b30cc92003c91f562
-
Filesize
1.6MB
MD5d44db127e6fb82e04f9067b18c70687a
SHA180d9a4080ae2affc3ebc312a50c9f03b6637f092
SHA2561e51991027809ecd29e4533b43731b552b1984e9710103acca84d48c780a0176
SHA512eab8e71f41c2a3a6db33b709692c9ee4273f423c2c68e52a815b20e6e6a4dc0d20cddb09ebfe2107e302715bd5e1c0a245a39ec750135151799390d77a286a80
-
Filesize
1.6MB
MD5d44db127e6fb82e04f9067b18c70687a
SHA180d9a4080ae2affc3ebc312a50c9f03b6637f092
SHA2561e51991027809ecd29e4533b43731b552b1984e9710103acca84d48c780a0176
SHA512eab8e71f41c2a3a6db33b709692c9ee4273f423c2c68e52a815b20e6e6a4dc0d20cddb09ebfe2107e302715bd5e1c0a245a39ec750135151799390d77a286a80
-
Filesize
1.6MB
MD5d44db127e6fb82e04f9067b18c70687a
SHA180d9a4080ae2affc3ebc312a50c9f03b6637f092
SHA2561e51991027809ecd29e4533b43731b552b1984e9710103acca84d48c780a0176
SHA512eab8e71f41c2a3a6db33b709692c9ee4273f423c2c68e52a815b20e6e6a4dc0d20cddb09ebfe2107e302715bd5e1c0a245a39ec750135151799390d77a286a80
-
Filesize
1.6MB
MD5d44db127e6fb82e04f9067b18c70687a
SHA180d9a4080ae2affc3ebc312a50c9f03b6637f092
SHA2561e51991027809ecd29e4533b43731b552b1984e9710103acca84d48c780a0176
SHA512eab8e71f41c2a3a6db33b709692c9ee4273f423c2c68e52a815b20e6e6a4dc0d20cddb09ebfe2107e302715bd5e1c0a245a39ec750135151799390d77a286a80
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d