Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
06/11/2023, 20:37
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe
Resource
win7-20231020-en
General
-
Target
NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe
-
Size
1.5MB
-
MD5
c756d2db2d9644bb7199eff3df3e6254
-
SHA1
3eaf410412e26e30381b435d0a765c668e9eab8a
-
SHA256
7f96f91bb08b71cfc13d95db38f3035a4efa1a0e835683e2b165488ee4d929fe
-
SHA512
04079c2dae1fee2c85f33b915669e7ff754e3811dced4e8b3fd36bc7d1dcc70db124f18242e896f860788f905e4235e863569253e28c070dde6e0d9c681c4bc6
-
SSDEEP
24576:T2/r48zC6/TwSfVcYG3K/cJHlnFR+IGNe8j3Iz:a/08m6LNiXicJFFRGNzj3
Malware Config
Signatures
-
Executes dropped EXE 30 IoCs
pid Process 464 Process not Found 2704 alg.exe 2244 aspnet_state.exe 2740 mscorsvw.exe 2640 mscorsvw.exe 548 mscorsvw.exe 2908 mscorsvw.exe 1752 dllhost.exe 1644 ehRecvr.exe 620 ehsched.exe 2296 elevation_service.exe 1704 IEEtwCollector.exe 1052 GROOVE.EXE 2292 maintenanceservice.exe 980 mscorsvw.exe 344 msdtc.exe 2848 msiexec.exe 2592 OSE.EXE 2248 OSPPSVC.EXE 1192 perfhost.exe 1960 locator.exe 1404 snmptrap.exe 1972 vds.exe 2200 vssvc.exe 860 wbengine.exe 2696 WmiApSrv.exe 2004 wmpnetwk.exe 2652 mscorsvw.exe 2972 SearchIndexer.exe 2772 mscorsvw.exe -
Loads dropped DLL 15 IoCs
pid Process 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 2848 msiexec.exe 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 744 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 17 IoCs
description ioc Process File opened for modification C:\Windows\System32\vds.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\system32\msiexec.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\SysWow64\perfhost.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\System32\msdtc.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\System32\snmptrap.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\system32\wbengine.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\system32\locator.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\system32\vssvc.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\48bf9a3f263a7f60.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\SearchIndexer.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\System32\alg.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\system32\fxssvc.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXE NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\7-Zip\7z.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe -
Drops file in Windows directory 28 IoCs
description ioc Process File opened for modification C:\Windows\ehome\ehsched.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{87EFF38F-564A-428D-AFA6-678FAC8DC795}.crmlog dllhost.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{87EFF38F-564A-428D-AFA6-678FAC8DC795}.crmlog dllhost.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe -
Modifies data under HKEY_USERS 37 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileGrowthBudgetMs = "45000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogInitialPageCount = "16" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileInlineGrowthQuantumSeconds = "30" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpRecWaitForCounts = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogMaxJobDemoteTimeMs = "5000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheHashTableSize = "67" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheWaitForSize = "32" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform OSPPSVC.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MediaPlayer\Health\{2B0EBD6A-AE37-4C9C-9C51-CA031D4D4146} wmpnetwk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MediaPlayer\Health\{2B0EBD6A-AE37-4C9C-9C51-CA031D4D4146} wmpnetwk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileGrowthQuantumSeconds = "180" ehRec.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform\VLRenewalSchedule = 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 OSPPSVC.EXE Key created \REGISTRY\USER\.DEFAULT\Software wmpnetwk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MediaPlayer wmpnetwk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CommitMaxCheckPointPageCount = "7" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\Software ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\SwagBitsPerSecond = "19922944" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileDiscontinuitiesPerSecond = "20" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CommitMaxCheckPoitnRateMs = "10000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheLongPageCount = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpClientsCount = "32" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings GROOVE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\ShadowFileMaxClients = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CriticalLowDiskSpace = "1073741824" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogMinJobWaitTimeMs = "3000" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MediaPlayer\Health wmpnetwk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheShortPageCount = "64" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpRecCount = "32" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MediaPlayer\Preferences\ wmpnetwk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft wmpnetwk.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1336 ehRec.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Token: SeShutdownPrivilege 548 mscorsvw.exe Token: SeShutdownPrivilege 2908 mscorsvw.exe Token: SeShutdownPrivilege 548 mscorsvw.exe Token: 33 2420 EhTray.exe Token: SeIncBasePriorityPrivilege 2420 EhTray.exe Token: SeShutdownPrivilege 2908 mscorsvw.exe Token: SeShutdownPrivilege 548 mscorsvw.exe Token: SeShutdownPrivilege 548 mscorsvw.exe Token: SeShutdownPrivilege 2908 mscorsvw.exe Token: SeShutdownPrivilege 2908 mscorsvw.exe Token: SeRestorePrivilege 2848 msiexec.exe Token: SeTakeOwnershipPrivilege 2848 msiexec.exe Token: SeSecurityPrivilege 2848 msiexec.exe Token: SeDebugPrivilege 1336 ehRec.exe Token: SeBackupPrivilege 2200 vssvc.exe Token: SeRestorePrivilege 2200 vssvc.exe Token: SeAuditPrivilege 2200 vssvc.exe Token: SeBackupPrivilege 860 wbengine.exe Token: SeRestorePrivilege 860 wbengine.exe Token: SeSecurityPrivilege 860 wbengine.exe Token: 33 2420 EhTray.exe Token: SeIncBasePriorityPrivilege 2420 EhTray.exe Token: 33 2004 wmpnetwk.exe Token: SeIncBasePriorityPrivilege 2004 wmpnetwk.exe Token: SeDebugPrivilege 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Token: SeDebugPrivilege 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Token: SeDebugPrivilege 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Token: SeDebugPrivilege 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Token: SeDebugPrivilege 1688 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2420 EhTray.exe 2420 EhTray.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2420 EhTray.exe 2420 EhTray.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 548 wrote to memory of 980 548 mscorsvw.exe 43 PID 548 wrote to memory of 980 548 mscorsvw.exe 43 PID 548 wrote to memory of 980 548 mscorsvw.exe 43 PID 548 wrote to memory of 980 548 mscorsvw.exe 43 PID 548 wrote to memory of 2652 548 mscorsvw.exe 58 PID 548 wrote to memory of 2652 548 mscorsvw.exe 58 PID 548 wrote to memory of 2652 548 mscorsvw.exe 58 PID 548 wrote to memory of 2652 548 mscorsvw.exe 58 PID 548 wrote to memory of 2772 548 mscorsvw.exe 60 PID 548 wrote to memory of 2772 548 mscorsvw.exe 60 PID 548 wrote to memory of 2772 548 mscorsvw.exe 60 PID 548 wrote to memory of 2772 548 mscorsvw.exe 60 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2704
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:2244
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2740
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2640
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:980
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 254 -NGENProcess 25c -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2652
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 250 -NGENProcess 1f4 -Pipe 24c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2772
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1752
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1644
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:620
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2420
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2296
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:1704
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1052
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2292
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:344
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2592
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2248
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:1192
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:1960
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:1404
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:1972
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:860
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:2696
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
PID:2972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD50058a7d069b4b2e521f96fec2c8da5e0
SHA1afe825bb5a2feb7a9d5c4c9b90bc0f70759d292d
SHA256b74d08a8c30888a359557e9dd0e3ae50738e3255ff8fac1fe4efa0d7e1265e31
SHA51248d97ad0454d42f0920aa5f8e7f7064f65e0ccee3be828780518c5489dfd1247fd7673e9eaf47622b27e6bcc70606856f90c254b98c62d5b3e7f898cd6809fc0
-
Filesize
30.1MB
MD535c42030f4450a76f1dacff3716be223
SHA1a2707954a0723aee2a8cde112a4db09052b748a3
SHA25681b0b239db1973d0d567d5cc96966f7a3521e20b3072a0002c2872ac8dcc2ef4
SHA51216573d3e2376f8d5f78f8b5151713f70a7e976a5496239ee7078da9f4bbfad0cd4a77ce925e400a1d0589580ac0bbbd1bd11906ae452160357154882def9f222
-
Filesize
1.4MB
MD57d371b947cab435aedd373080f5c85fa
SHA10563b80c8353516be2a9b319cbae200a632e6857
SHA2568ab0f78edf428050f500e8f161cfb40ad3ca7500ab39273613d7a386688754ea
SHA512b3e409c07a69794bc9b0e4211a3221928cf4291b394aec1587198df65c283ce2f6e932d4f0aef86b1718fe0bfa13188b2a9710d9cdb41f9163eb106253583eee
-
Filesize
5.2MB
MD535e192df18f33e45c00bf54df8ea9526
SHA15e868f36198bdf765a32ad80a8b80204964522d2
SHA256f319bbeca4ba89b9a85f230875bcfdd0225231b07f32c57a3e2aff3395f9dde8
SHA5124f0ea7275417fb9a8da82814f900352ba84808d9e2f9c6e5a82cd085cca8164a69075ed85ef49544b79c94cf556f6e6712990cfead4e103de9517d50545197a1
-
Filesize
2.1MB
MD5b3bc40feb588743c83fd747a223471ac
SHA109969e95b68f0044890c6fd314166daf12413814
SHA2564ae873ea07fabfb336d597e924e7218c3dfe85a6b1fb6ac23706666cfe7b7508
SHA5128abef5777993e27e074b5182b5b9c14853488a25710150407b599671cba604631ae38b45dfcbc4c7e3805d1c8add9521a3f9142c0901e0a7efe888bb5774e517
-
Filesize
2.0MB
MD5d293e4679508669ee07d359b9bdd6ee7
SHA150aa87cc37de8c5ddb7f98b9599790e7e2741ed7
SHA2564423577ef03e15343c5398acf1972cd869249673b30fc8b9c34cdc75ee683af3
SHA512f3c14ae4ea06affa95e1cd26da5ee877fa23e4a3deb5630aac409dc57b487bb91f0227ed2ac9c480d9bfe17778f25cee0888515da83fcd4a8566de3ef790246b
-
Filesize
1.3MB
MD5353c60a32bc555fcf8ac10c1c12f6d72
SHA15c83e7652abdc50b5801f7acfb0c28f6138284a7
SHA256c119382e915b43ca3e3067d5ad3bd7aaac35f8b116cae59cdd6a504bad917138
SHA512153f59228a3d141707a01deb2b1fd42271e2cd4339bc72642088167ac3c755dd25214794c2464642e85bac08237ab857e4865075418ea597fd9609722a2dd075
-
Filesize
1.3MB
MD5353c60a32bc555fcf8ac10c1c12f6d72
SHA15c83e7652abdc50b5801f7acfb0c28f6138284a7
SHA256c119382e915b43ca3e3067d5ad3bd7aaac35f8b116cae59cdd6a504bad917138
SHA512153f59228a3d141707a01deb2b1fd42271e2cd4339bc72642088167ac3c755dd25214794c2464642e85bac08237ab857e4865075418ea597fd9609722a2dd075
-
Filesize
872KB
MD5095e1499e59161f14c3aa97ce37e6808
SHA1b57266a6e72155835acfafee7c6b95cb43864783
SHA256f63f014fd54325ba01aa00f6b1b7c08d58a8230cb8a45dbdbd81f12aed348b5d
SHA5122cbba7c6826ffe808ee74e644b29cf39309fab85b0bec7834dfcaa163ba9a52e27d587009fd9af8e5168a783186b9bd498dc0b54827f66df88e7d28cd8d5c845
-
Filesize
1.3MB
MD5664868dc1b5fd6c79052e8e7aac7aa1f
SHA19dc48a49e7c236ac9c8fb194509d2ee904650f23
SHA256fd6065246b076dcdbccebef4943395cf3f15cb258f1626602e96fef01e8c282f
SHA5121d54cce362b9e074b68f11f0ce97ce5ee8efb75b2320e8bffd87f42522cae1cf19a2f589fc07e3c1b365bd39ab4a6a55eb15c20aa4868b6e8dac32e5cab75395
-
Filesize
1.3MB
MD521ec8add15c4d6dbf2f9572e92ad9a2f
SHA1413599b69b9357699f96a798f3c20d372bf2ac5a
SHA2565513f77039c29f083aff30f5c7d81999ace345407ad65fa0967cd765a67a65b6
SHA51213fc46bc145da036b3f8200424a8a31ececbc3527927aa9b719e772f93569ed93b1d92305f52989de497e08e811114f0ec807d89bedfdf716d84085fd4e84cc8
-
Filesize
1.3MB
MD521ec8add15c4d6dbf2f9572e92ad9a2f
SHA1413599b69b9357699f96a798f3c20d372bf2ac5a
SHA2565513f77039c29f083aff30f5c7d81999ace345407ad65fa0967cd765a67a65b6
SHA51213fc46bc145da036b3f8200424a8a31ececbc3527927aa9b719e772f93569ed93b1d92305f52989de497e08e811114f0ec807d89bedfdf716d84085fd4e84cc8
-
Filesize
1.3MB
MD53b33840fbdd9b4d05588cfb0ca986b67
SHA1dbff8b11e264845fe5bf021642bb80b0ff29e6af
SHA256e32f3d3632ce85daefecac08cd580397d2c64020d1b20b79828b57928a8ef7bd
SHA512716081536612abf666e80c45b12dc8e04dc1fb2b1cea15ec7bae6f735212640ead83fa51b39cfd829540abc08ebc6fec31da818f2ae6a18c78395826489a15c8
-
Filesize
1.3MB
MD53b33840fbdd9b4d05588cfb0ca986b67
SHA1dbff8b11e264845fe5bf021642bb80b0ff29e6af
SHA256e32f3d3632ce85daefecac08cd580397d2c64020d1b20b79828b57928a8ef7bd
SHA512716081536612abf666e80c45b12dc8e04dc1fb2b1cea15ec7bae6f735212640ead83fa51b39cfd829540abc08ebc6fec31da818f2ae6a18c78395826489a15c8
-
Filesize
1003KB
MD500c0611a168ad6ce273d92d6c2775680
SHA1ecffb1f36574a13edca3a23833a8679b951ce76b
SHA256d05bd94e0e1731e23618512a567d3fd25436f2c2d67918818c4ca46b7b974084
SHA51273cd882ad0d46db72249a53f8c8a8522b6e2b1d85a6dc8a2ead759161ff6d05df1d862edfbd416c240fa1339901d0284e219c8b6345e407029f2724b873b85e7
-
Filesize
1.3MB
MD53674c98c7ef8a5fda91efddc8c1f80c7
SHA1c6ef1ffc7d13205bb7b26594168e1417c981bb8b
SHA2568936ca9534a612da4f84ef40ba9e2ea7d3ad840da38ff4f9e2560878f9c156b8
SHA512eadf3ab370c334f174fd1b16209f54d60dc6910e1b11810e85662f7a89fda2117a7285ea115c75e88bbec514cd37adb397963d59af66ba3e4c20a125e2833c2f
-
Filesize
1.3MB
MD53674c98c7ef8a5fda91efddc8c1f80c7
SHA1c6ef1ffc7d13205bb7b26594168e1417c981bb8b
SHA2568936ca9534a612da4f84ef40ba9e2ea7d3ad840da38ff4f9e2560878f9c156b8
SHA512eadf3ab370c334f174fd1b16209f54d60dc6910e1b11810e85662f7a89fda2117a7285ea115c75e88bbec514cd37adb397963d59af66ba3e4c20a125e2833c2f
-
Filesize
1.3MB
MD53674c98c7ef8a5fda91efddc8c1f80c7
SHA1c6ef1ffc7d13205bb7b26594168e1417c981bb8b
SHA2568936ca9534a612da4f84ef40ba9e2ea7d3ad840da38ff4f9e2560878f9c156b8
SHA512eadf3ab370c334f174fd1b16209f54d60dc6910e1b11810e85662f7a89fda2117a7285ea115c75e88bbec514cd37adb397963d59af66ba3e4c20a125e2833c2f
-
Filesize
1.3MB
MD53674c98c7ef8a5fda91efddc8c1f80c7
SHA1c6ef1ffc7d13205bb7b26594168e1417c981bb8b
SHA2568936ca9534a612da4f84ef40ba9e2ea7d3ad840da38ff4f9e2560878f9c156b8
SHA512eadf3ab370c334f174fd1b16209f54d60dc6910e1b11810e85662f7a89fda2117a7285ea115c75e88bbec514cd37adb397963d59af66ba3e4c20a125e2833c2f
-
Filesize
1.3MB
MD53674c98c7ef8a5fda91efddc8c1f80c7
SHA1c6ef1ffc7d13205bb7b26594168e1417c981bb8b
SHA2568936ca9534a612da4f84ef40ba9e2ea7d3ad840da38ff4f9e2560878f9c156b8
SHA512eadf3ab370c334f174fd1b16209f54d60dc6910e1b11810e85662f7a89fda2117a7285ea115c75e88bbec514cd37adb397963d59af66ba3e4c20a125e2833c2f
-
Filesize
1.2MB
MD5c9e6b05f77a085014b47ef87aa4d45d1
SHA1de2768d2c176104d5ad6e95a68a6336e3d332722
SHA256b8d6b352988d4afab5e760cf5838f0479e68cd59be2f9b9d6d9520041af5936e
SHA51238c813617d5b40a0e6f358c1dfb121d3fbb4165615bb8a31df45e53cf5ed9b81909ae77454487251011e2b477021914a09ff4b9a129988d61548e597d25704ad
-
Filesize
1.2MB
MD5881b66d3a6e0fd2400dc5d46fa010af7
SHA195f6977d2189ae4cd345370071a27b94752d7534
SHA2568db2317e6de578be0d937d8b5c23fccc6198de9396b6a28d64a71b7bcf78f695
SHA51213ef577324bbfc6b7380ca797fe59ce22acf24c1d1019f692ab009c50cae6e6e028f5893232f1075ee4995a68aebdb914f7b72f70f939b7b30eebaccb0d4366a
-
Filesize
1.1MB
MD5941023ea4c2b7b6d11f147f1ecd40d44
SHA1918a3d88a345c7f16603d075b910735d53af2835
SHA25604bad48d7e81c237ef798bd7fcb860b4d45aa070fdbea2a812f368bf6534ebcc
SHA512523e2bec271e4f8e7917f80294133fb80eecb9094cbbbba83245fd6f46f03786f2514daae7e504cc7c4dcb6a9fc953bdc8cf9257aeac0c72578f4ac211b735d5
-
Filesize
2.1MB
MD5d51c24f259f3bbc33af809da0c9ab8a7
SHA1e30f406f4227752b0798299ec0c37043e463f693
SHA2561669e45222a4c5a672e415e753aeb8573ac36a645a5aa0bfa1815fb6de4428bf
SHA512e7eaebbe2db3724581c2e994c2e4d0c9cc24f05b7f543052dd75d38a978d3ad410468282e7260f3aafff86f3bfd094689ebfd6a84f0df42bca7fab0c0fca16e4
-
Filesize
1.3MB
MD5a8442c3330c2982a97fb9fb509245639
SHA12dfc57bc5a1287f1ffb7a9e668a55302d183aa4d
SHA25653a5cd2e2d1d22024ed6a6d1c3e0a2bd0cce0c20fad2509f9ccfa9ac096fdf1c
SHA5120b4fa7f8526ee16f73ba2f30a8c2d65ac2ea56abd537e3542809660a70f5c35543f8c045895933490133c6c40e33462ffd2a00df7cd5b0c3c1b2f8f78641d334
-
Filesize
1.2MB
MD5ef968d15946b59fbcb4d4150e53ecbe9
SHA1c55a334c1b12e6426f3c61067def969d0d20a915
SHA2560d0b8cc9664f1554a0f940e0fad43054bcd028390a100d80f38bab7f0763e453
SHA5126c2cb4d5ef6785f6bfa0997060001729e77328a740c97655016730c31f11281531ed4c79e5af1685120a910d14b9d4e55c42b64d95c738f65ed9d6e86a913655
-
Filesize
1.3MB
MD545f376fdf7af18a80786e4aa0a7c44b7
SHA1ac6da0b2b8f43edf9b5926436fd6f4c685dcb114
SHA25612e93228a7bfd9453cf56eaeaef9d7491125867cffa445a9dd194b3d8b9e804c
SHA5126be49b6b2aa23531a8ce358c5c08c30cc60d64aed482ab2ef956a257bdcdccf037824e4f9576342149933d3bc924effd1804d830f06b745d03e9c0efe1177af4
-
Filesize
1.4MB
MD58e249ea2d13a17092fb35febdb1e21e5
SHA148571118ca6c4b037d7ff1e93b139c871ad51eaa
SHA256404c99b9d7f7a8ba9b0a3b5066e0fa1406ea62c3023488ab373496c5941f88b9
SHA512d7e54ea1a705bb75a4894b650214f7fe9a7f6d416dd881c713692ddab044ec53dceeb111a55eea8f007d911f598e20fe4a7f46e5e16cef7c26997fc8cd67345c
-
Filesize
1.3MB
MD57c5394962bb12ee64c1a2d1d2df6e69c
SHA1138bf2adbaaab39810bc67e82a70115044c69a80
SHA256abbc5386fc8ce0fb2e5367352b7aabe884484eeb2aabfea6be149b3dbb92e4cf
SHA512962a06c2d1f90d4ab57ba8d236c5e972afc57df60d6b17cc352f3cd9bad054930686a10ee7bd4e77b9df6f7fe85aa14589619d4ccef65c7126a9a76bec091d09
-
Filesize
1.2MB
MD5c05de3c0dc5debb410e1942dbd4a2f16
SHA17bd6cd39cd54a6c0e43cff491292199cd7380131
SHA256452274fe65f6ed0e008b5c505fd582c1fcb867ce39c98c9fa6d69839b9832b99
SHA5123621ffb665b418b778c16191e4e7300a6073d08ae5a6b07c37fac475ad2fa117401bf2ac32fa2c6e34328e984173eb125e13f1e830afa3aa14fa00eef9074f41
-
Filesize
1.7MB
MD5207e106078b9d1f88ccfd6ebac743e48
SHA1fb6e11e19a2ac7c8ef4eb8e2615bd6ed9bc0159f
SHA256b7ff00bc9a1d9d6d6552d78b7f368b5dcdf08e49d8e4af05c27bfe605362f829
SHA512d3d4a6ea55edc9aa76af92326c2186f20f2ea1d60f402a565825dd865fba44fc362af6b44b82009573ccd985b2343294e33ad6a682f3d131fa8f63ead91241e7
-
Filesize
1.4MB
MD5e6fd48d5dbb1b554c22c9fab655f41d7
SHA1165eb732542c3f9131d9a7c8f1c52e725abfdf29
SHA2563045568ca148b55c7cdeb2e71f31875429da52485aa7032e614cf863bd88f2e9
SHA5127bdef7137b15fa745574daaf6e9067e50b20270ea1bd582c3752a69d446924d150f9c9deea8ad96df6a815452f3e7f8d8449afddc483d9afe023c717a3a38d13
-
Filesize
2.0MB
MD5a4ebd497fba7cc721b39cf1aba6cfd2f
SHA1ceddf2d12627a670d91e75776b261de821517e6a
SHA256a028388d8be9ba1022616864843180c7f2e8040a763a77ac1e8b8d8a1167e381
SHA5121a208bea798942fcd7973da29704099c2a6a9566455d9b1b50162a1ab12523fdce20a752fac5a953dd159002ed28b61b1e6dc06e2d650dd16acb9e530353b04e
-
Filesize
1.2MB
MD5740c2ce08ee5ae02bbd451a27dc1c037
SHA18b2c2ea9551c362a3cdcb74564ea7c9bd7e4d5d0
SHA256e935e7cdbf84ae32ad873aec53001737d914f96c126b22e739ac3061b7bbc55c
SHA5124eeab215581931fe47211eebce52f38e2cb0be997fbe37badfe0645299137a07c63a33e563c6346a13f0bedab10fe30c5976187b4ea803effc72db4970e6e1aa
-
Filesize
1.3MB
MD5c73a2ab87b48cae64b4afd0f14576895
SHA1ec83ed03527bce78aeba30f1bea0edcefe4981b8
SHA256c1b47ceca3a49168695bd1f0b9dc6d1c355e1fa3370a60e99483730141d539ae
SHA51236244670488510405c24832e3d2f219e913d5fb789d6bf541883be700f856b01155c9b4791d6b4e95a9457c3adcba4ac01468ad7935080e798e31597106cba20
-
Filesize
1.3MB
MD57c5394962bb12ee64c1a2d1d2df6e69c
SHA1138bf2adbaaab39810bc67e82a70115044c69a80
SHA256abbc5386fc8ce0fb2e5367352b7aabe884484eeb2aabfea6be149b3dbb92e4cf
SHA512962a06c2d1f90d4ab57ba8d236c5e972afc57df60d6b17cc352f3cd9bad054930686a10ee7bd4e77b9df6f7fe85aa14589619d4ccef65c7126a9a76bec091d09
-
Filesize
2.0MB
MD5d293e4679508669ee07d359b9bdd6ee7
SHA150aa87cc37de8c5ddb7f98b9599790e7e2741ed7
SHA2564423577ef03e15343c5398acf1972cd869249673b30fc8b9c34cdc75ee683af3
SHA512f3c14ae4ea06affa95e1cd26da5ee877fa23e4a3deb5630aac409dc57b487bb91f0227ed2ac9c480d9bfe17778f25cee0888515da83fcd4a8566de3ef790246b
-
Filesize
2.0MB
MD5d293e4679508669ee07d359b9bdd6ee7
SHA150aa87cc37de8c5ddb7f98b9599790e7e2741ed7
SHA2564423577ef03e15343c5398acf1972cd869249673b30fc8b9c34cdc75ee683af3
SHA512f3c14ae4ea06affa95e1cd26da5ee877fa23e4a3deb5630aac409dc57b487bb91f0227ed2ac9c480d9bfe17778f25cee0888515da83fcd4a8566de3ef790246b
-
Filesize
1.3MB
MD5353c60a32bc555fcf8ac10c1c12f6d72
SHA15c83e7652abdc50b5801f7acfb0c28f6138284a7
SHA256c119382e915b43ca3e3067d5ad3bd7aaac35f8b116cae59cdd6a504bad917138
SHA512153f59228a3d141707a01deb2b1fd42271e2cd4339bc72642088167ac3c755dd25214794c2464642e85bac08237ab857e4865075418ea597fd9609722a2dd075
-
Filesize
1.3MB
MD5664868dc1b5fd6c79052e8e7aac7aa1f
SHA19dc48a49e7c236ac9c8fb194509d2ee904650f23
SHA256fd6065246b076dcdbccebef4943395cf3f15cb258f1626602e96fef01e8c282f
SHA5121d54cce362b9e074b68f11f0ce97ce5ee8efb75b2320e8bffd87f42522cae1cf19a2f589fc07e3c1b365bd39ab4a6a55eb15c20aa4868b6e8dac32e5cab75395
-
Filesize
1.2MB
MD5881b66d3a6e0fd2400dc5d46fa010af7
SHA195f6977d2189ae4cd345370071a27b94752d7534
SHA2568db2317e6de578be0d937d8b5c23fccc6198de9396b6a28d64a71b7bcf78f695
SHA51213ef577324bbfc6b7380ca797fe59ce22acf24c1d1019f692ab009c50cae6e6e028f5893232f1075ee4995a68aebdb914f7b72f70f939b7b30eebaccb0d4366a
-
Filesize
1.3MB
MD5a8442c3330c2982a97fb9fb509245639
SHA12dfc57bc5a1287f1ffb7a9e668a55302d183aa4d
SHA25653a5cd2e2d1d22024ed6a6d1c3e0a2bd0cce0c20fad2509f9ccfa9ac096fdf1c
SHA5120b4fa7f8526ee16f73ba2f30a8c2d65ac2ea56abd537e3542809660a70f5c35543f8c045895933490133c6c40e33462ffd2a00df7cd5b0c3c1b2f8f78641d334
-
Filesize
1.2MB
MD5ef968d15946b59fbcb4d4150e53ecbe9
SHA1c55a334c1b12e6426f3c61067def969d0d20a915
SHA2560d0b8cc9664f1554a0f940e0fad43054bcd028390a100d80f38bab7f0763e453
SHA5126c2cb4d5ef6785f6bfa0997060001729e77328a740c97655016730c31f11281531ed4c79e5af1685120a910d14b9d4e55c42b64d95c738f65ed9d6e86a913655
-
Filesize
1.3MB
MD545f376fdf7af18a80786e4aa0a7c44b7
SHA1ac6da0b2b8f43edf9b5926436fd6f4c685dcb114
SHA25612e93228a7bfd9453cf56eaeaef9d7491125867cffa445a9dd194b3d8b9e804c
SHA5126be49b6b2aa23531a8ce358c5c08c30cc60d64aed482ab2ef956a257bdcdccf037824e4f9576342149933d3bc924effd1804d830f06b745d03e9c0efe1177af4
-
Filesize
1.4MB
MD58e249ea2d13a17092fb35febdb1e21e5
SHA148571118ca6c4b037d7ff1e93b139c871ad51eaa
SHA256404c99b9d7f7a8ba9b0a3b5066e0fa1406ea62c3023488ab373496c5941f88b9
SHA512d7e54ea1a705bb75a4894b650214f7fe9a7f6d416dd881c713692ddab044ec53dceeb111a55eea8f007d911f598e20fe4a7f46e5e16cef7c26997fc8cd67345c
-
Filesize
1.3MB
MD57c5394962bb12ee64c1a2d1d2df6e69c
SHA1138bf2adbaaab39810bc67e82a70115044c69a80
SHA256abbc5386fc8ce0fb2e5367352b7aabe884484eeb2aabfea6be149b3dbb92e4cf
SHA512962a06c2d1f90d4ab57ba8d236c5e972afc57df60d6b17cc352f3cd9bad054930686a10ee7bd4e77b9df6f7fe85aa14589619d4ccef65c7126a9a76bec091d09
-
Filesize
1.3MB
MD57c5394962bb12ee64c1a2d1d2df6e69c
SHA1138bf2adbaaab39810bc67e82a70115044c69a80
SHA256abbc5386fc8ce0fb2e5367352b7aabe884484eeb2aabfea6be149b3dbb92e4cf
SHA512962a06c2d1f90d4ab57ba8d236c5e972afc57df60d6b17cc352f3cd9bad054930686a10ee7bd4e77b9df6f7fe85aa14589619d4ccef65c7126a9a76bec091d09
-
Filesize
1.2MB
MD5c05de3c0dc5debb410e1942dbd4a2f16
SHA17bd6cd39cd54a6c0e43cff491292199cd7380131
SHA256452274fe65f6ed0e008b5c505fd582c1fcb867ce39c98c9fa6d69839b9832b99
SHA5123621ffb665b418b778c16191e4e7300a6073d08ae5a6b07c37fac475ad2fa117401bf2ac32fa2c6e34328e984173eb125e13f1e830afa3aa14fa00eef9074f41
-
Filesize
1.4MB
MD5e6fd48d5dbb1b554c22c9fab655f41d7
SHA1165eb732542c3f9131d9a7c8f1c52e725abfdf29
SHA2563045568ca148b55c7cdeb2e71f31875429da52485aa7032e614cf863bd88f2e9
SHA5127bdef7137b15fa745574daaf6e9067e50b20270ea1bd582c3752a69d446924d150f9c9deea8ad96df6a815452f3e7f8d8449afddc483d9afe023c717a3a38d13
-
Filesize
2.0MB
MD5a4ebd497fba7cc721b39cf1aba6cfd2f
SHA1ceddf2d12627a670d91e75776b261de821517e6a
SHA256a028388d8be9ba1022616864843180c7f2e8040a763a77ac1e8b8d8a1167e381
SHA5121a208bea798942fcd7973da29704099c2a6a9566455d9b1b50162a1ab12523fdce20a752fac5a953dd159002ed28b61b1e6dc06e2d650dd16acb9e530353b04e
-
Filesize
1.2MB
MD5740c2ce08ee5ae02bbd451a27dc1c037
SHA18b2c2ea9551c362a3cdcb74564ea7c9bd7e4d5d0
SHA256e935e7cdbf84ae32ad873aec53001737d914f96c126b22e739ac3061b7bbc55c
SHA5124eeab215581931fe47211eebce52f38e2cb0be997fbe37badfe0645299137a07c63a33e563c6346a13f0bedab10fe30c5976187b4ea803effc72db4970e6e1aa
-
Filesize
1.3MB
MD5c73a2ab87b48cae64b4afd0f14576895
SHA1ec83ed03527bce78aeba30f1bea0edcefe4981b8
SHA256c1b47ceca3a49168695bd1f0b9dc6d1c355e1fa3370a60e99483730141d539ae
SHA51236244670488510405c24832e3d2f219e913d5fb789d6bf541883be700f856b01155c9b4791d6b4e95a9457c3adcba4ac01468ad7935080e798e31597106cba20