Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2023 06:17
Static task
static1
Behavioral task
behavioral1
Sample
ca1f98024db6b0a3a80c4f88bad01c1b.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
ca1f98024db6b0a3a80c4f88bad01c1b.exe
Resource
win10v2004-20230703-en
General
-
Target
ca1f98024db6b0a3a80c4f88bad01c1b.exe
-
Size
5.7MB
-
MD5
ca1f98024db6b0a3a80c4f88bad01c1b
-
SHA1
1d644df10be340357030b9d9b0f1b25123f1594a
-
SHA256
41ddb82349252b4a4edc0c6caf39873fede575cd5f8141798ffc467bd70ddd26
-
SHA512
3498ab75009487236a78ba6906b1274759972fbcc9131b767ba13ee2ab7e66100ce71f4cca9ddfa62d045133b9681b299b224b7195237e95030a12df2f175682
-
SSDEEP
49152:AHhDHI0eVdjTBjkWkCBgqm93GejCj5mZGK4yfsIdFIedEvSRqOiwbV5JZUS5G0UA:AHhDoRZoW8qqHtWd9GnjADBWN
Malware Config
Extracted
redline
norm
77.91.68.70:19073
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Signatures
-
Detects Healer an antivirus disabler dropper 8 IoCs
resource yara_rule behavioral2/memory/5112-167-0x00000000001F0000-0x00000000001FA000-memory.dmp healer behavioral2/files/0x00070000000231de-174.dat healer behavioral2/files/0x00070000000231de-175.dat healer behavioral2/memory/4760-176-0x00000000001E0000-0x00000000001EA000-memory.dmp healer behavioral2/files/0x00080000000231cc-236.dat healer behavioral2/memory/2208-288-0x00000000001F0000-0x00000000001FA000-memory.dmp healer behavioral2/files/0x00080000000231cc-298.dat healer behavioral2/files/0x00080000000231cc-299.dat healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" i7906009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" i7906009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b0557671.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3431059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3431059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" i7906009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" i7906009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0049562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b0557671.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b0557671.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b0557671.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b0557671.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3431059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" i7906009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0049562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0049562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0049562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b0557671.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3431059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3431059.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a0049562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0049562.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation e8270043.exe Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation rugen.exe Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation D3A9.exe -
Executes dropped EXE 22 IoCs
pid Process 1368 v3781361.exe 4160 v5613127.exe 532 v4787463.exe 5112 a0049562.exe 4760 b0557671.exe 3864 c8047893.exe 2956 d8184536.exe 1680 e8270043.exe 2724 rugen.exe 5104 rugen.exe 1004 BFB1.exe 5028 x0113905.exe 3196 f5720145.exe 2108 D08B.exe 3748 D3A9.exe 1224 y0461432.exe 2208 k3431059.exe 4796 g3277354.exe 3508 i7906009.exe 2360 l5166326.exe 4396 n0444718.exe 3944 rugen.exe -
Loads dropped DLL 3 IoCs
pid Process 4292 regsvr32.exe 4292 regsvr32.exe 5044 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a0049562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0049562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b0557671.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k3431059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" i7906009.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" BFB1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0113905.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce D08B.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ca1f98024db6b0a3a80c4f88bad01c1b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3781361.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5613127.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ca1f98024db6b0a3a80c4f88bad01c1b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3781361.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5613127.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y0461432.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4787463.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce BFB1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" D08B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v4787463.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x0113905.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0461432.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d8184536.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d8184536.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d8184536.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2528 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5112 a0049562.exe 5112 a0049562.exe 4760 b0557671.exe 4760 b0557671.exe 3864 c8047893.exe 3864 c8047893.exe 2956 d8184536.exe 2956 d8184536.exe 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3152 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2956 d8184536.exe -
Suspicious use of AdjustPrivilegeToken 61 IoCs
description pid Process Token: SeDebugPrivilege 5112 a0049562.exe Token: SeDebugPrivilege 4760 b0557671.exe Token: SeDebugPrivilege 3864 c8047893.exe Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeDebugPrivilege 3196 f5720145.exe Token: SeDebugPrivilege 2208 k3431059.exe Token: SeDebugPrivilege 3508 i7906009.exe Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeShutdownPrivilege 3152 Process not Found Token: SeCreatePagefilePrivilege 3152 Process not Found Token: SeDebugPrivilege 2360 l5166326.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 e8270043.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1368 1416 ca1f98024db6b0a3a80c4f88bad01c1b.exe 80 PID 1416 wrote to memory of 1368 1416 ca1f98024db6b0a3a80c4f88bad01c1b.exe 80 PID 1416 wrote to memory of 1368 1416 ca1f98024db6b0a3a80c4f88bad01c1b.exe 80 PID 1368 wrote to memory of 4160 1368 v3781361.exe 81 PID 1368 wrote to memory of 4160 1368 v3781361.exe 81 PID 1368 wrote to memory of 4160 1368 v3781361.exe 81 PID 4160 wrote to memory of 532 4160 v5613127.exe 82 PID 4160 wrote to memory of 532 4160 v5613127.exe 82 PID 4160 wrote to memory of 532 4160 v5613127.exe 82 PID 532 wrote to memory of 5112 532 v4787463.exe 83 PID 532 wrote to memory of 5112 532 v4787463.exe 83 PID 532 wrote to memory of 5112 532 v4787463.exe 83 PID 532 wrote to memory of 4760 532 v4787463.exe 85 PID 532 wrote to memory of 4760 532 v4787463.exe 85 PID 4160 wrote to memory of 3864 4160 v5613127.exe 86 PID 4160 wrote to memory of 3864 4160 v5613127.exe 86 PID 4160 wrote to memory of 3864 4160 v5613127.exe 86 PID 1368 wrote to memory of 2956 1368 v3781361.exe 89 PID 1368 wrote to memory of 2956 1368 v3781361.exe 89 PID 1368 wrote to memory of 2956 1368 v3781361.exe 89 PID 1416 wrote to memory of 1680 1416 ca1f98024db6b0a3a80c4f88bad01c1b.exe 90 PID 1416 wrote to memory of 1680 1416 ca1f98024db6b0a3a80c4f88bad01c1b.exe 90 PID 1416 wrote to memory of 1680 1416 ca1f98024db6b0a3a80c4f88bad01c1b.exe 90 PID 1680 wrote to memory of 2724 1680 e8270043.exe 91 PID 1680 wrote to memory of 2724 1680 e8270043.exe 91 PID 1680 wrote to memory of 2724 1680 e8270043.exe 91 PID 2724 wrote to memory of 2528 2724 rugen.exe 92 PID 2724 wrote to memory of 2528 2724 rugen.exe 92 PID 2724 wrote to memory of 2528 2724 rugen.exe 92 PID 2724 wrote to memory of 1628 2724 rugen.exe 94 PID 2724 wrote to memory of 1628 2724 rugen.exe 94 PID 2724 wrote to memory of 1628 2724 rugen.exe 94 PID 1628 wrote to memory of 972 1628 cmd.exe 96 PID 1628 wrote to memory of 972 1628 cmd.exe 96 PID 1628 wrote to memory of 972 1628 cmd.exe 96 PID 1628 wrote to memory of 4016 1628 cmd.exe 97 PID 1628 wrote to memory of 4016 1628 cmd.exe 97 PID 1628 wrote to memory of 4016 1628 cmd.exe 97 PID 1628 wrote to memory of 4356 1628 cmd.exe 98 PID 1628 wrote to memory of 4356 1628 cmd.exe 98 PID 1628 wrote to memory of 4356 1628 cmd.exe 98 PID 1628 wrote to memory of 2224 1628 cmd.exe 99 PID 1628 wrote to memory of 2224 1628 cmd.exe 99 PID 1628 wrote to memory of 2224 1628 cmd.exe 99 PID 1628 wrote to memory of 3548 1628 cmd.exe 100 PID 1628 wrote to memory of 3548 1628 cmd.exe 100 PID 1628 wrote to memory of 3548 1628 cmd.exe 100 PID 1628 wrote to memory of 4360 1628 cmd.exe 101 PID 1628 wrote to memory of 4360 1628 cmd.exe 101 PID 1628 wrote to memory of 4360 1628 cmd.exe 101 PID 3152 wrote to memory of 1004 3152 Process not Found 103 PID 3152 wrote to memory of 1004 3152 Process not Found 103 PID 3152 wrote to memory of 1004 3152 Process not Found 103 PID 1004 wrote to memory of 5028 1004 BFB1.exe 105 PID 1004 wrote to memory of 5028 1004 BFB1.exe 105 PID 1004 wrote to memory of 5028 1004 BFB1.exe 105 PID 5028 wrote to memory of 3196 5028 x0113905.exe 106 PID 5028 wrote to memory of 3196 5028 x0113905.exe 106 PID 5028 wrote to memory of 3196 5028 x0113905.exe 106 PID 3152 wrote to memory of 2108 3152 Process not Found 108 PID 3152 wrote to memory of 2108 3152 Process not Found 108 PID 3152 wrote to memory of 2108 3152 Process not Found 108 PID 3152 wrote to memory of 3748 3152 Process not Found 110 PID 3152 wrote to memory of 3748 3152 Process not Found 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca1f98024db6b0a3a80c4f88bad01c1b.exe"C:\Users\Admin\AppData\Local\Temp\ca1f98024db6b0a3a80c4f88bad01c1b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3781361.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3781361.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5613127.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5613127.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4787463.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4787463.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0049562.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0049562.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0557671.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0557671.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8047893.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8047893.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8184536.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8184536.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e8270043.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e8270043.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:2528
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:972
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:4016
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:4356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2224
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:3548
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:4360
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:5044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:5104
-
C:\Users\Admin\AppData\Local\Temp\BFB1.exeC:\Users\Admin\AppData\Local\Temp\BFB1.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0113905.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0113905.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f5720145.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f5720145.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3277354.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3277354.exe3⤵
- Executes dropped EXE
PID:4796
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7906009.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7906009.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
C:\Users\Admin\AppData\Local\Temp\D08B.exeC:\Users\Admin\AppData\Local\Temp\D08B.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y0461432.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y0461432.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k3431059.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k3431059.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l5166326.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l5166326.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0444718.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0444718.exe2⤵
- Executes dropped EXE
PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\D3A9.exeC:\Users\Admin\AppData\Local\Temp\D3A9.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:3748 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -u -s Z5F2W.dE2⤵
- Loads dropped DLL
PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
3.6MB
MD568e2e4359cb2b5d2919ac423630f6c0d
SHA1f1270d5553756e36099dcaddc9dab2d6d6a9a3da
SHA2562ea8572d6e567fe4bd48ed4f839ab3ba0c6fe6e8d02394d21816dbb9b1180a2c
SHA51272a247f04d5ecbec050d7a3c27ee6e7de387bf969236e4c5493d77227a8db8ad4f075667d80825ede82139d839c266eaee56c7df4b3fe1b06a43b2fcf6e97f34
-
Filesize
3.6MB
MD568e2e4359cb2b5d2919ac423630f6c0d
SHA1f1270d5553756e36099dcaddc9dab2d6d6a9a3da
SHA2562ea8572d6e567fe4bd48ed4f839ab3ba0c6fe6e8d02394d21816dbb9b1180a2c
SHA51272a247f04d5ecbec050d7a3c27ee6e7de387bf969236e4c5493d77227a8db8ad4f075667d80825ede82139d839c266eaee56c7df4b3fe1b06a43b2fcf6e97f34
-
Filesize
3.9MB
MD558b84acddda6eaa78ecaad48b2b3bad4
SHA1a904b71820b6c5e0d07228fbc6a1c2925e544e85
SHA2568394502d90c770689abb94c962505fd7aef4bc0bdce4e77ceb52f4ae943c4c45
SHA512d424c19d38d76608a1fffa6cd1c4fb1f24bfaf8d25304578f027f2794bd8ee1ad0b643a48a347ca5ab0d4fa25b5f93edf7b340db1531c1ebfc83007a8a01dd35
-
Filesize
3.9MB
MD558b84acddda6eaa78ecaad48b2b3bad4
SHA1a904b71820b6c5e0d07228fbc6a1c2925e544e85
SHA2568394502d90c770689abb94c962505fd7aef4bc0bdce4e77ceb52f4ae943c4c45
SHA512d424c19d38d76608a1fffa6cd1c4fb1f24bfaf8d25304578f027f2794bd8ee1ad0b643a48a347ca5ab0d4fa25b5f93edf7b340db1531c1ebfc83007a8a01dd35
-
Filesize
2.0MB
MD513e58887a58e53bf9bffcf537b539aee
SHA1a4cf50e09c08a8be4966081ddfea27cbc574409c
SHA256d88f2b1ea10bf3847124b60d3f11b0dc6687fbcf6bc53e97ae241486b4eb4218
SHA5122f784c8be330067d16b28ba17251d1425a2805038db1c3f44fdca4fe516fe5eed66d0b2ce206287a58a56b52116af7c10856a25c8e96a78f85ab8f11eaea0dc4
-
Filesize
2.0MB
MD513e58887a58e53bf9bffcf537b539aee
SHA1a4cf50e09c08a8be4966081ddfea27cbc574409c
SHA256d88f2b1ea10bf3847124b60d3f11b0dc6687fbcf6bc53e97ae241486b4eb4218
SHA5122f784c8be330067d16b28ba17251d1425a2805038db1c3f44fdca4fe516fe5eed66d0b2ce206287a58a56b52116af7c10856a25c8e96a78f85ab8f11eaea0dc4
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
652KB
MD54f1866479aded157eb59306a4e29a90a
SHA10c07c7328a4a964b5f17cd1c95241e6cf86bd33a
SHA25663aea38ec8f3565fa92a1219ac50ccba2d79649c86440f8b7ccf5c5bf74d5f0d
SHA512fbee4c8319ffd59828c52ef7c4a6e039fc9535a334a90204cf7a56fb3a22ad00dc2552556c0db25d6c48dd39112c6ed987202bad7bd7d8a9dae42f3c72835b3c
-
Filesize
652KB
MD54f1866479aded157eb59306a4e29a90a
SHA10c07c7328a4a964b5f17cd1c95241e6cf86bd33a
SHA25663aea38ec8f3565fa92a1219ac50ccba2d79649c86440f8b7ccf5c5bf74d5f0d
SHA512fbee4c8319ffd59828c52ef7c4a6e039fc9535a334a90204cf7a56fb3a22ad00dc2552556c0db25d6c48dd39112c6ed987202bad7bd7d8a9dae42f3c72835b3c
-
Filesize
438KB
MD51889efefc00c177d15c217bb12612393
SHA1065321dab3672c41d3891e569c734cff61b84572
SHA256ff96c1f0c45d22a6fdbc41a21dbf54146e2dfff72077045cec9e2cf9ef101192
SHA512756dd364f75a5f992506556aff219f3ca1f7615eb1407b5518209759e4fb86b83647612651704521f3245d0f6369cd6a807378e9d2485d65b513b3ee3d8235bc
-
Filesize
438KB
MD51889efefc00c177d15c217bb12612393
SHA1065321dab3672c41d3891e569c734cff61b84572
SHA256ff96c1f0c45d22a6fdbc41a21dbf54146e2dfff72077045cec9e2cf9ef101192
SHA512756dd364f75a5f992506556aff219f3ca1f7615eb1407b5518209759e4fb86b83647612651704521f3245d0f6369cd6a807378e9d2485d65b513b3ee3d8235bc
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
1.3MB
MD50e63740e5a34942b2ff2d74705a7f2e2
SHA10a80a6d7ada816554f04b2dd20ece5e35cde6694
SHA256a12d03b6e5c7b8aa58321cf4cd6b376896e9425f9d58084f9c4e84fd9394e71a
SHA5125e4e9a203eb254c49c0c4bf59f7af066ead47a8bc5c7efc032d9c8033365d76757fba9c5001f13cf597a1edd7fdad4551afd9816205e1dbc9232e5fc5b017ddf
-
Filesize
1.3MB
MD50e63740e5a34942b2ff2d74705a7f2e2
SHA10a80a6d7ada816554f04b2dd20ece5e35cde6694
SHA256a12d03b6e5c7b8aa58321cf4cd6b376896e9425f9d58084f9c4e84fd9394e71a
SHA5125e4e9a203eb254c49c0c4bf59f7af066ead47a8bc5c7efc032d9c8033365d76757fba9c5001f13cf597a1edd7fdad4551afd9816205e1dbc9232e5fc5b017ddf
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
550KB
MD591f9df9825ffac5de074a8175aa1efe8
SHA13dc7240d922c1f142f0c4086fc11ba5a5800ea25
SHA25602d6ea64c3b1f01f68d2977d2c19eb5e4c992a9115f2bd1fd3eee6cc13b8a97c
SHA5122f0835570f2d14477d746a94ca11e0f99c8a18ab21bc1f82d879f0861f5cd967210351586b7399fb6cd1130304015207bce14a1f76682ecfb758713430336a2f
-
Filesize
550KB
MD591f9df9825ffac5de074a8175aa1efe8
SHA13dc7240d922c1f142f0c4086fc11ba5a5800ea25
SHA25602d6ea64c3b1f01f68d2977d2c19eb5e4c992a9115f2bd1fd3eee6cc13b8a97c
SHA5122f0835570f2d14477d746a94ca11e0f99c8a18ab21bc1f82d879f0861f5cd967210351586b7399fb6cd1130304015207bce14a1f76682ecfb758713430336a2f
-
Filesize
1.3MB
MD5785675fb053d1f1b6ba3d889b25c7cda
SHA16b3ff2a857b5c872443ae5611e0b9c2344d03b13
SHA25646b618cfc1137fdb2f514835201ce38e16575393e543baa3b86887637c8b1921
SHA512afe965556dc3971be3155cfbba3711b515f81bcf60a3c9049568b085c3c89017b8fb634e861ef7b0787ec97c6cf187249b09ae3f142cea3d446f04038d5f241d
-
Filesize
1.3MB
MD5785675fb053d1f1b6ba3d889b25c7cda
SHA16b3ff2a857b5c872443ae5611e0b9c2344d03b13
SHA25646b618cfc1137fdb2f514835201ce38e16575393e543baa3b86887637c8b1921
SHA512afe965556dc3971be3155cfbba3711b515f81bcf60a3c9049568b085c3c89017b8fb634e861ef7b0787ec97c6cf187249b09ae3f142cea3d446f04038d5f241d
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
217KB
MD59201b682d849d73b2bbd61cc0ed8b9ac
SHA10c44baeb929620e0a01641a50abef107133d4c20
SHA256da6775ef6b86f997f973129a39f88174ee7840c32e101ca7b8eae6b0e2b01de1
SHA512934a0b306d3189697bd94d52d83101eecca7dfa6575dfb6ccab20d0c1b34aa511f5a8c7ef19fc6d8d68f17dd3c6794c19ab71bb6fc7142eabdb840330d371e7d
-
Filesize
217KB
MD59201b682d849d73b2bbd61cc0ed8b9ac
SHA10c44baeb929620e0a01641a50abef107133d4c20
SHA256da6775ef6b86f997f973129a39f88174ee7840c32e101ca7b8eae6b0e2b01de1
SHA512934a0b306d3189697bd94d52d83101eecca7dfa6575dfb6ccab20d0c1b34aa511f5a8c7ef19fc6d8d68f17dd3c6794c19ab71bb6fc7142eabdb840330d371e7d
-
Filesize
407KB
MD580b3b994dcbb359cae84f788aced3434
SHA131ff166b3aae2f24436d21c199d7ec97b19d9d5a
SHA256d924344cd4759b8a86a7628c1a6a485d015b13a63a7fa97645a00aa9df306d47
SHA512b7286c804f8360e8318bc499947ba90bc3d6b6f8f002e58919ded3b554899f586acd40fe37b03559f4069f44fde1b4bd00627d92b5c4438ca688cdc5df55cf87
-
Filesize
407KB
MD580b3b994dcbb359cae84f788aced3434
SHA131ff166b3aae2f24436d21c199d7ec97b19d9d5a
SHA256d924344cd4759b8a86a7628c1a6a485d015b13a63a7fa97645a00aa9df306d47
SHA512b7286c804f8360e8318bc499947ba90bc3d6b6f8f002e58919ded3b554899f586acd40fe37b03559f4069f44fde1b4bd00627d92b5c4438ca688cdc5df55cf87
-
Filesize
185KB
MD5deaff0dc88d58b229af507805f7b2cd3
SHA173a55274ac61e88d50d8f5cbb6364f4c56223456
SHA256649fe2a6212a974285b6017641c5c00ce53e422fa88ed23fa98630b53afde907
SHA5121a394c1ac18ca4f1ccf03e0f65e9dd97bce8c825e07c121412b2751826a6bf94bfa90a8f66d708dc6459d5d69378f29c48b4f9e1449fd9d34617addd48cca858
-
Filesize
185KB
MD5deaff0dc88d58b229af507805f7b2cd3
SHA173a55274ac61e88d50d8f5cbb6364f4c56223456
SHA256649fe2a6212a974285b6017641c5c00ce53e422fa88ed23fa98630b53afde907
SHA5121a394c1ac18ca4f1ccf03e0f65e9dd97bce8c825e07c121412b2751826a6bf94bfa90a8f66d708dc6459d5d69378f29c48b4f9e1449fd9d34617addd48cca858
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
185KB
MD5388a94afd413f801247999832a277c68
SHA1695b335dbddef88a0301b3c0bbfe6681f6684d1a
SHA256c1a70dbbb07d7ddb2796247559eb4abf5d8b71a79b8824813e99b6386522f7f5
SHA512bf8678d9f242da9cc7097c7af31975d7c0464c491de66ea8660b30aedd67c1503f8b4f242f30a6fdcc6e65148178ca24c3d6b7745f8ce615c580552006d97a5c
-
Filesize
185KB
MD5388a94afd413f801247999832a277c68
SHA1695b335dbddef88a0301b3c0bbfe6681f6684d1a
SHA256c1a70dbbb07d7ddb2796247559eb4abf5d8b71a79b8824813e99b6386522f7f5
SHA512bf8678d9f242da9cc7097c7af31975d7c0464c491de66ea8660b30aedd67c1503f8b4f242f30a6fdcc6e65148178ca24c3d6b7745f8ce615c580552006d97a5c
-
Filesize
1.3MB
MD55d136bf4085929447e85074935ae4797
SHA17bda4be1918d77dfcb1103614aa89dc5bb4f30ff
SHA25657fb345e20e30bc9fd88592057cfd749dd0c9c3fa84a7dde63f37f294c0499fb
SHA512067dc58da9be01ccf735cbb8c9628060b869f15e81c10edc8bf2b2f6b615c6ec9189a589eaed7ba582befbc35ccb8ff88c78539e301b8210eb94b056476d50a9
-
Filesize
1.3MB
MD55d136bf4085929447e85074935ae4797
SHA17bda4be1918d77dfcb1103614aa89dc5bb4f30ff
SHA25657fb345e20e30bc9fd88592057cfd749dd0c9c3fa84a7dde63f37f294c0499fb
SHA512067dc58da9be01ccf735cbb8c9628060b869f15e81c10edc8bf2b2f6b615c6ec9189a589eaed7ba582befbc35ccb8ff88c78539e301b8210eb94b056476d50a9
-
Filesize
1.3MB
MD5ca5b2c07c227c2dede638143698da7d1
SHA1546933e3b42b1db4d194cffa40b4e8ada8520a54
SHA2569005774fbe253f8b530d43e792ad7c4b3115e1a21ef0f900fb105c77c7dae9d4
SHA512a621fe934413eaca58d6f999b01e2347f2921883d2b7381329978a0c6867e814ff4ea795558b2a515e89d9c3c57dc2d481c354c91d060dbd6356df8e2e89d714
-
Filesize
1.3MB
MD5ca5b2c07c227c2dede638143698da7d1
SHA1546933e3b42b1db4d194cffa40b4e8ada8520a54
SHA2569005774fbe253f8b530d43e792ad7c4b3115e1a21ef0f900fb105c77c7dae9d4
SHA512a621fe934413eaca58d6f999b01e2347f2921883d2b7381329978a0c6867e814ff4ea795558b2a515e89d9c3c57dc2d481c354c91d060dbd6356df8e2e89d714
-
Filesize
1.3MB
MD5ca5b2c07c227c2dede638143698da7d1
SHA1546933e3b42b1db4d194cffa40b4e8ada8520a54
SHA2569005774fbe253f8b530d43e792ad7c4b3115e1a21ef0f900fb105c77c7dae9d4
SHA512a621fe934413eaca58d6f999b01e2347f2921883d2b7381329978a0c6867e814ff4ea795558b2a515e89d9c3c57dc2d481c354c91d060dbd6356df8e2e89d714
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d