Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2023 02:45
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230621-en
General
-
Target
file.exe
-
Size
830KB
-
MD5
2c727c79f3f34eaea02b79addd481e1c
-
SHA1
fbdd70853f3ec36b3469eaf2e22267192c88728b
-
SHA256
7a595d276df83ddea093a3c12ade59dd3777a40414371ef50141999d730f2b04
-
SHA512
009aa5752025eff31649f13b8bcb2560b6b87ba98a28ae1bc55eda8f0eff344368bd07f484ce2ee87a8e23b24987696ac40e6f48003dbd4ed15278a933d9599f
-
SSDEEP
24576:WcV4+4k1K9QOwckpto5WNVx0MeTHqEJzG5c:Wcq+Xq9kptoQNVyRHJqO
Malware Config
Extracted
redline
narko
83.97.73.134:19071
-
auth_value
a9d8c6db81c7e486f5832bc2ee48cb84
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
bruno
83.97.73.134:19071
-
auth_value
b23e240c277e85ce9d49d6165c0a2b48
Signatures
-
Detects Healer an antivirus disabler dropper 8 IoCs
resource yara_rule behavioral2/memory/1556-168-0x00000000001F0000-0x00000000001FA000-memory.dmp healer behavioral2/files/0x00060000000231f1-175.dat healer behavioral2/files/0x00060000000231f1-176.dat healer behavioral2/memory/4552-177-0x0000000000A70000-0x0000000000A7A000-memory.dmp healer behavioral2/files/0x00080000000231ed-246.dat healer behavioral2/memory/568-276-0x00000000001F0000-0x00000000001FA000-memory.dmp healer behavioral2/files/0x00080000000231ed-287.dat healer behavioral2/files/0x00080000000231ed-288.dat healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b8906645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k6171738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k6171738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" i4407098.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" i4407098.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" i4407098.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5731110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5731110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5731110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k6171738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" i4407098.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5731110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b8906645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k6171738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k6171738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5731110.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b8906645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b8906645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b8906645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b8906645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" i4407098.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5731110.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\Control Panel\International\Geo\Nation rugen.exe Key value queried \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\Control Panel\International\Geo\Nation e7849421.exe -
Executes dropped EXE 21 IoCs
pid Process 1336 v9903136.exe 4732 v0886373.exe 4008 v9889339.exe 1556 a5731110.exe 4552 b8906645.exe 4208 c0139935.exe 448 d8560931.exe 1280 e7849421.exe 4952 rugen.exe 828 rugen.exe 1908 9C11.exe 3636 9D6A.exe 4604 y8119539.exe 1404 x1784478.exe 2092 f8014223.exe 568 k6171738.exe 1452 g7062022.exe 1888 i4407098.exe 2696 l5939593.exe 464 n9002122.exe 4620 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 2664 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5731110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5731110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b8906645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k6171738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" i4407098.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9903136.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9C11.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8119539.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y8119539.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0886373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" 9D6A.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1784478.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9D6A.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1784478.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9903136.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9889339.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v9889339.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0886373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9C11.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d8560931.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d8560931.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d8560931.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4240 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1556 a5731110.exe 1556 a5731110.exe 4552 b8906645.exe 4552 b8906645.exe 4208 c0139935.exe 4208 c0139935.exe 448 d8560931.exe 448 d8560931.exe 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3176 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 448 d8560931.exe -
Suspicious use of AdjustPrivilegeToken 61 IoCs
description pid Process Token: SeDebugPrivilege 1556 a5731110.exe Token: SeDebugPrivilege 4552 b8906645.exe Token: SeDebugPrivilege 4208 c0139935.exe Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeDebugPrivilege 568 k6171738.exe Token: SeDebugPrivilege 2092 f8014223.exe Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeDebugPrivilege 1888 i4407098.exe Token: SeDebugPrivilege 2696 l5939593.exe Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1280 e7849421.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1336 1988 file.exe 87 PID 1988 wrote to memory of 1336 1988 file.exe 87 PID 1988 wrote to memory of 1336 1988 file.exe 87 PID 1336 wrote to memory of 4732 1336 v9903136.exe 88 PID 1336 wrote to memory of 4732 1336 v9903136.exe 88 PID 1336 wrote to memory of 4732 1336 v9903136.exe 88 PID 4732 wrote to memory of 4008 4732 v0886373.exe 89 PID 4732 wrote to memory of 4008 4732 v0886373.exe 89 PID 4732 wrote to memory of 4008 4732 v0886373.exe 89 PID 4008 wrote to memory of 1556 4008 v9889339.exe 90 PID 4008 wrote to memory of 1556 4008 v9889339.exe 90 PID 4008 wrote to memory of 1556 4008 v9889339.exe 90 PID 4008 wrote to memory of 4552 4008 v9889339.exe 97 PID 4008 wrote to memory of 4552 4008 v9889339.exe 97 PID 4732 wrote to memory of 4208 4732 v0886373.exe 98 PID 4732 wrote to memory of 4208 4732 v0886373.exe 98 PID 4732 wrote to memory of 4208 4732 v0886373.exe 98 PID 1336 wrote to memory of 448 1336 v9903136.exe 101 PID 1336 wrote to memory of 448 1336 v9903136.exe 101 PID 1336 wrote to memory of 448 1336 v9903136.exe 101 PID 1988 wrote to memory of 1280 1988 file.exe 103 PID 1988 wrote to memory of 1280 1988 file.exe 103 PID 1988 wrote to memory of 1280 1988 file.exe 103 PID 1280 wrote to memory of 4952 1280 e7849421.exe 104 PID 1280 wrote to memory of 4952 1280 e7849421.exe 104 PID 1280 wrote to memory of 4952 1280 e7849421.exe 104 PID 4952 wrote to memory of 4240 4952 rugen.exe 105 PID 4952 wrote to memory of 4240 4952 rugen.exe 105 PID 4952 wrote to memory of 4240 4952 rugen.exe 105 PID 4952 wrote to memory of 1508 4952 rugen.exe 107 PID 4952 wrote to memory of 1508 4952 rugen.exe 107 PID 4952 wrote to memory of 1508 4952 rugen.exe 107 PID 1508 wrote to memory of 396 1508 cmd.exe 109 PID 1508 wrote to memory of 396 1508 cmd.exe 109 PID 1508 wrote to memory of 396 1508 cmd.exe 109 PID 1508 wrote to memory of 3028 1508 cmd.exe 110 PID 1508 wrote to memory of 3028 1508 cmd.exe 110 PID 1508 wrote to memory of 3028 1508 cmd.exe 110 PID 1508 wrote to memory of 1392 1508 cmd.exe 111 PID 1508 wrote to memory of 1392 1508 cmd.exe 111 PID 1508 wrote to memory of 1392 1508 cmd.exe 111 PID 1508 wrote to memory of 1028 1508 cmd.exe 112 PID 1508 wrote to memory of 1028 1508 cmd.exe 112 PID 1508 wrote to memory of 1028 1508 cmd.exe 112 PID 1508 wrote to memory of 2132 1508 cmd.exe 113 PID 1508 wrote to memory of 2132 1508 cmd.exe 113 PID 1508 wrote to memory of 2132 1508 cmd.exe 113 PID 1508 wrote to memory of 1996 1508 cmd.exe 114 PID 1508 wrote to memory of 1996 1508 cmd.exe 114 PID 1508 wrote to memory of 1996 1508 cmd.exe 114 PID 3176 wrote to memory of 1908 3176 Process not Found 116 PID 3176 wrote to memory of 1908 3176 Process not Found 116 PID 3176 wrote to memory of 1908 3176 Process not Found 116 PID 3176 wrote to memory of 3636 3176 Process not Found 118 PID 3176 wrote to memory of 3636 3176 Process not Found 118 PID 3176 wrote to memory of 3636 3176 Process not Found 118 PID 3636 wrote to memory of 4604 3636 9D6A.exe 121 PID 3636 wrote to memory of 4604 3636 9D6A.exe 121 PID 3636 wrote to memory of 4604 3636 9D6A.exe 121 PID 1908 wrote to memory of 1404 1908 9C11.exe 120 PID 1908 wrote to memory of 1404 1908 9C11.exe 120 PID 1908 wrote to memory of 1404 1908 9C11.exe 120 PID 1404 wrote to memory of 2092 1404 x1784478.exe 122 PID 1404 wrote to memory of 2092 1404 x1784478.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9903136.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9903136.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0886373.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0886373.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9889339.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9889339.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5731110.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5731110.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8906645.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8906645.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0139935.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0139935.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8560931.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8560931.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:448
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e7849421.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e7849421.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:4240
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:396
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:3028
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:1392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1028
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:2132
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:1996
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:828
-
C:\Users\Admin\AppData\Local\Temp\9C11.exeC:\Users\Admin\AppData\Local\Temp\9C11.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1784478.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1784478.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8014223.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8014223.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7062022.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7062022.exe3⤵
- Executes dropped EXE
PID:1452
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4407098.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4407098.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\9D6A.exeC:\Users\Admin\AppData\Local\Temp\9D6A.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8119539.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8119539.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k6171738.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k6171738.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:568
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l5939593.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l5939593.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n9002122.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n9002122.exe2⤵
- Executes dropped EXE
PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD59b756bc85e5324eb8f87a69e3f9959ab
SHA11778b2e2d6a00c421578a284db1e743931611d66
SHA256e347a39e49ca8c835cc47d3f039230969e7c4156089f2e83e8a0aed1df88016e
SHA512c897af3307e3c3163762021f49934ac5fbeab27f123e814bc390bdf1f0ed46671afeadcc87a8a4b18ddf13f4abd0d8ef00343af91ff999d7d447c96505d866d8
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
527KB
MD569eefd86d4174607564bb0263278def1
SHA1cbf00e3de7e9287f6bf06535aedd5e36092cbab7
SHA256c4a9297125ff41c77b276ed01da8c3932fd3b9043328db87751b57cf6fb4538f
SHA512ea50863716b03162b992b6016fcea6a6668f9ea94836dbb03a915bc96939d775a5be8574fd6e776e7523edff6d37d8f0a6c06a0eb4abb328dfa400dff12a565a
-
Filesize
527KB
MD569eefd86d4174607564bb0263278def1
SHA1cbf00e3de7e9287f6bf06535aedd5e36092cbab7
SHA256c4a9297125ff41c77b276ed01da8c3932fd3b9043328db87751b57cf6fb4538f
SHA512ea50863716b03162b992b6016fcea6a6668f9ea94836dbb03a915bc96939d775a5be8574fd6e776e7523edff6d37d8f0a6c06a0eb4abb328dfa400dff12a565a
-
Filesize
540KB
MD5d759e8daef82f84668360222441508e7
SHA1386967a2c044d12e71e7bf913e04ddccf91c79c4
SHA2567a9984a44a868c7206e0b6a7187d0e3c0012b5469ee2c7916582ca90df5f987a
SHA51289fa69df7083c95b709df8d4359fa0a16ae24f0139595e119b2e5c15d081d8f5cb21e58ba3702adb934faa3d44e90c57e9b10cf3145cfb33474f5ceff7bb6554
-
Filesize
540KB
MD5d759e8daef82f84668360222441508e7
SHA1386967a2c044d12e71e7bf913e04ddccf91c79c4
SHA2567a9984a44a868c7206e0b6a7187d0e3c0012b5469ee2c7916582ca90df5f987a
SHA51289fa69df7083c95b709df8d4359fa0a16ae24f0139595e119b2e5c15d081d8f5cb21e58ba3702adb934faa3d44e90c57e9b10cf3145cfb33474f5ceff7bb6554
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
555KB
MD52043bdea89523b1087b47fbc183f4bb8
SHA19c71d444cbc61b14b211f97c78164ec9e5754c83
SHA256dde93a555150cda697800493c54e346cf9fd7638458cb5459dfcf92ee421e49e
SHA512b1ab12651f30ac6c936839b21c562a6955b4073f4bf790effadddbd2ff2a93d3d345b0a772ee7f99a3addf296cf1385a8991066944e7ea0532242d84613b4472
-
Filesize
555KB
MD52043bdea89523b1087b47fbc183f4bb8
SHA19c71d444cbc61b14b211f97c78164ec9e5754c83
SHA256dde93a555150cda697800493c54e346cf9fd7638458cb5459dfcf92ee421e49e
SHA512b1ab12651f30ac6c936839b21c562a6955b4073f4bf790effadddbd2ff2a93d3d345b0a772ee7f99a3addf296cf1385a8991066944e7ea0532242d84613b4472
-
Filesize
323KB
MD5d1daae44b7719ff78053661b810a2477
SHA185b80e87327a89471f90025590b150d8d14a5bd1
SHA256cf3e3af5a94221e6e3c2e88d43eb619f3a6f4f91028e5cce92a5cee6bacb1161
SHA5120d63294e5d4fbe38f98069dd7b13c7890a95276b891378b1a0c4b5449e0fd19ab9e50a7689531c61d48b63d485b3a51e860352af25f5f667524f8901ddff7178
-
Filesize
323KB
MD5d1daae44b7719ff78053661b810a2477
SHA185b80e87327a89471f90025590b150d8d14a5bd1
SHA256cf3e3af5a94221e6e3c2e88d43eb619f3a6f4f91028e5cce92a5cee6bacb1161
SHA5120d63294e5d4fbe38f98069dd7b13c7890a95276b891378b1a0c4b5449e0fd19ab9e50a7689531c61d48b63d485b3a51e860352af25f5f667524f8901ddff7178
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
430KB
MD5808696dff251fcb4e2756646eb85ffcd
SHA168037f534eaab9fd5c7991df4df95799ecc4b1b9
SHA256c9e21cbf77b22e40b36f044d6da31ba61de00d401cf75bd0797636b1083b693a
SHA51294c7c7b89f324ca34b26dbf9dc0a9d34bc7ed199054a296aa4db722f04bb267d426fccba925c1fcdac341823c4a6c9a4544ce3c3e63ac6c124c421a017020afb
-
Filesize
430KB
MD5808696dff251fcb4e2756646eb85ffcd
SHA168037f534eaab9fd5c7991df4df95799ecc4b1b9
SHA256c9e21cbf77b22e40b36f044d6da31ba61de00d401cf75bd0797636b1083b693a
SHA51294c7c7b89f324ca34b26dbf9dc0a9d34bc7ed199054a296aa4db722f04bb267d426fccba925c1fcdac341823c4a6c9a4544ce3c3e63ac6c124c421a017020afb
-
Filesize
265KB
MD5eb0d769941a9a6eea699bbeece6d5dba
SHA1fadc7489681d1ca2ff99e91854444ed19cdc08a3
SHA25694a1e78b0182caca109abc54542d8e6ed8f0db98e9d7e1f04dde7f33b53d90da
SHA512eb131584c8f21b8913148310c0d6884ba3efec8c2e8de989c6e3ed341093f2252369dad6b38a378d010cf8e5acb36bb76545ae27f7f021e3f7b69586c4311040
-
Filesize
265KB
MD5eb0d769941a9a6eea699bbeece6d5dba
SHA1fadc7489681d1ca2ff99e91854444ed19cdc08a3
SHA25694a1e78b0182caca109abc54542d8e6ed8f0db98e9d7e1f04dde7f33b53d90da
SHA512eb131584c8f21b8913148310c0d6884ba3efec8c2e8de989c6e3ed341093f2252369dad6b38a378d010cf8e5acb36bb76545ae27f7f021e3f7b69586c4311040
-
Filesize
275KB
MD5249f511a69d38f929dd61b455ed2a2eb
SHA1fe3ae03ec3277b705e976570046079a314cc0b15
SHA2560fa629ecca1731d6989f368446ab8ce69480facbc8c5c91a87057a1957a9b5bc
SHA51248338fdd0a778edf7d2d3befbd47ea415e8372f371b5f519733781434fc45e9c3e052dfd29e2ec6a06ee9c1067da125fa1f294b77519486a0ec062431067f7e6
-
Filesize
275KB
MD5249f511a69d38f929dd61b455ed2a2eb
SHA1fe3ae03ec3277b705e976570046079a314cc0b15
SHA2560fa629ecca1731d6989f368446ab8ce69480facbc8c5c91a87057a1957a9b5bc
SHA51248338fdd0a778edf7d2d3befbd47ea415e8372f371b5f519733781434fc45e9c3e052dfd29e2ec6a06ee9c1067da125fa1f294b77519486a0ec062431067f7e6
-
Filesize
276KB
MD5e8263be9ab2c29fa20810341e88bdb1f
SHA11931eb707004e42a85c56b444118414b93692a8d
SHA256c67142b997d1c4c5f6e1f4710e2e2c415c3931e6ad7dc1cc001e687efdfb0ff8
SHA5121c3ad9f8ddd9590d448df6bbb24f3f666e5dcfa1fbd3419b68671ee3161acfb7dbcda329a511c6823569ded4dce9ef86e40a4b83854e19df728d4429db50ce41
-
Filesize
276KB
MD5e8263be9ab2c29fa20810341e88bdb1f
SHA11931eb707004e42a85c56b444118414b93692a8d
SHA256c67142b997d1c4c5f6e1f4710e2e2c415c3931e6ad7dc1cc001e687efdfb0ff8
SHA5121c3ad9f8ddd9590d448df6bbb24f3f666e5dcfa1fbd3419b68671ee3161acfb7dbcda329a511c6823569ded4dce9ef86e40a4b83854e19df728d4429db50ce41
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
227KB
MD5c17a7b386042a4ee7f2fe515d6fa590d
SHA1e8471758c2af062d85383406db88559422667d6a
SHA256aa0b9a56530a186582a69eb694ab10fcf4531dc1660e469386691f920b56d47a
SHA512f7f662fd5bad2c986b3c62963f69192be44814732d1641d02638b4048e32a658784650ea7b6a3fdaf4be2140919c633c5ad805aaded88bc2554bfb5b406c591b
-
Filesize
227KB
MD5c17a7b386042a4ee7f2fe515d6fa590d
SHA1e8471758c2af062d85383406db88559422667d6a
SHA256aa0b9a56530a186582a69eb694ab10fcf4531dc1660e469386691f920b56d47a
SHA512f7f662fd5bad2c986b3c62963f69192be44814732d1641d02638b4048e32a658784650ea7b6a3fdaf4be2140919c633c5ad805aaded88bc2554bfb5b406c591b
-
Filesize
176KB
MD5211a06e9ae68ced1234252a48696431b
SHA169950e2ee2fafd177d1a295836713bfd8d18df9c
SHA2560bdca9c84103454e329cfde4e69dc41a0ec0196c078c8fc195b0fa739d2f905d
SHA512b1643ba376075619335b4bdf0d7610aece13b7c9db60eecb508465f97ef3e6a9d5297f9ac8529886efa052cdd8814ac7d4eeab44812f797a1b2dc5fa967ee7eb
-
Filesize
176KB
MD5211a06e9ae68ced1234252a48696431b
SHA169950e2ee2fafd177d1a295836713bfd8d18df9c
SHA2560bdca9c84103454e329cfde4e69dc41a0ec0196c078c8fc195b0fa739d2f905d
SHA512b1643ba376075619335b4bdf0d7610aece13b7c9db60eecb508465f97ef3e6a9d5297f9ac8529886efa052cdd8814ac7d4eeab44812f797a1b2dc5fa967ee7eb
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
114KB
MD59ebdc032df819dbfb9cf6df773328a68
SHA1b1887a3e25d932f334960b4a3e22549852bb50d0
SHA256dd7dbbb3a2155084b39e6eac678437574337de758503b50b2bc7a2296a3b3d40
SHA512b8f51065ed8b86045be48bae4219d8da4e84973720d42489b9f5f420ca788e5134707778e5a785d7f91f1c21d77ae0563bf5c132e9ca47f6b6cf053e497f38cb
-
Filesize
114KB
MD59ebdc032df819dbfb9cf6df773328a68
SHA1b1887a3e25d932f334960b4a3e22549852bb50d0
SHA256dd7dbbb3a2155084b39e6eac678437574337de758503b50b2bc7a2296a3b3d40
SHA512b8f51065ed8b86045be48bae4219d8da4e84973720d42489b9f5f420ca788e5134707778e5a785d7f91f1c21d77ae0563bf5c132e9ca47f6b6cf053e497f38cb
-
Filesize
275KB
MD521099b30272f47e191dbf3f748c18be2
SHA1816690c446756e2c9e4392d0a74811e9d2730dee
SHA2566c45832658bb96949fd5951e8337627b18881191542a7f79c53d20c81ef1d013
SHA512a5bc16fa513549c5df8c059e44d4138723fcf02a454b1651182c07681af7be4d58380610868c7b12b8e8393b18919e872b1f7a86571f2c0c016fb1ba5502fd6e
-
Filesize
275KB
MD521099b30272f47e191dbf3f748c18be2
SHA1816690c446756e2c9e4392d0a74811e9d2730dee
SHA2566c45832658bb96949fd5951e8337627b18881191542a7f79c53d20c81ef1d013
SHA512a5bc16fa513549c5df8c059e44d4138723fcf02a454b1651182c07681af7be4d58380610868c7b12b8e8393b18919e872b1f7a86571f2c0c016fb1ba5502fd6e
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d