Analysis
-
max time kernel
132s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe
-
Size
653KB
-
MD5
9259195046d49cb9e327d004d93dae4b
-
SHA1
ae00378ab852a733de86031d3b06d3cfeb00a073
-
SHA256
7a242730c90b89fceefd69b52f797aa2893c64d2f7be4e034e7d5f3ebf2ceba2
-
SHA512
41406a9321524b512c29ad0928be7735c7b332250a2fbac3e82740f6c919844c4a9c9c18a65bb5df4755c397768c904c3ac7a5fdea5d312d76a50bf61c54877c
-
SSDEEP
12288:Aij0isJD+m3srW+5tEZG1QRw7rZ0n9sLXxGkgXYhfu0tF:tIiG+m8rWwHfR0yXkkxVtF
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 2416 minidownload.exe 2588 DownLoadDlg.exe 2548 ExternalApp.exe 2192 UpdateService.exe 2308 XLDownloadCom.exe 1304 UpdateService.exe 2300 MiniTPFw.exe 340 ThunderFW.exe -
Loads dropped DLL 33 IoCs
pid Process 2256 2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe 2416 minidownload.exe 2416 minidownload.exe 2416 minidownload.exe 2256 2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe 2256 2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe 2256 2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe 2588 DownLoadDlg.exe 2548 ExternalApp.exe 2548 ExternalApp.exe 2548 ExternalApp.exe 2840 regsvr32.exe 1516 regsvr32.exe 2548 ExternalApp.exe 2084 regsvr32.exe 1996 regsvr32.exe 1256 regsvr32.exe 2000 regsvr32.exe 2548 ExternalApp.exe 2548 ExternalApp.exe 2192 UpdateService.exe 2192 UpdateService.exe 2192 UpdateService.exe 2308 XLDownloadCom.exe 2308 XLDownloadCom.exe 1848 regsvr32.exe 1304 UpdateService.exe 1304 UpdateService.exe 1304 UpdateService.exe 2588 DownLoadDlg.exe 2588 DownLoadDlg.exe 2588 DownLoadDlg.exe 2300 MiniTPFw.exe -
Registers COM server for autorun 1 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32\ = "C:\\Program Files (x86)\\SogouDownLoad\\npdownload64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\InprocServer32\ = "C:\\Program Files (x86)\\SogouDownLoad\\IEHint64.dll" regsvr32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020} regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe File opened for modification \??\PhysicalDrive0 DownLoadDlg.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy regsvr32.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini regsvr32.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol regsvr32.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI regsvr32.exe -
Drops file in Program Files directory 48 IoCs
description ioc Process File created C:\Program Files (x86)\SogouDownLoad\html\download.html minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_min.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\CommonState.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\xldl.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\IEHint64.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\uninst.exe ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_set.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\DlgHandler.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\download\msvcp71.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\download\zlib1.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\download\MiniTPFw.exe ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\download\download_engine.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\npdownload64.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\btns.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\dlbg.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\error.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\rocket1.swf minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\XLDownloadCom.exe ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\npdownload.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\html\css\down.css minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\css\downloader.css minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\js\swfobject.js minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\commonjs\jquery-1.11.2.min.js minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_close.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\commonjs\actions.js minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\download\dl_peer_id.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_t.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\download\MiniThunderPlatform.exe ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\download\ThunderFW.exe ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\update\UpdateService.exe ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\DownLoadDlg.exe minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\config.ini minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\repair.html minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\bg_line.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\img_exe.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\progressbar.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\download\id.dat ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\html\css\downloader - ¸±±¾.css minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\btn_spr.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\dlico.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_spr.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\download\atl71.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\download\msvcr71.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\IEHint.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\rocket2.swf minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\warning.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\tmp\ExternalApp.exe DownLoadDlg.exe File created C:\Program Files (x86)\SogouDownLoad\XLDownloadComPS.dll ExternalApp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x0008000000012255-1.dat nsis_installer_1 behavioral1/files/0x0008000000012255-1.dat nsis_installer_2 behavioral1/files/0x0005000000019313-87.dat nsis_installer_1 behavioral1/files/0x0005000000019313-87.dat nsis_installer_2 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main DownLoadDlg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4A79E46E-5A01-4abb-BCC1-F96D06AEE085} DownLoadDlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4A79E46E-5A01-4abb-BCC1-F96D06AEE085}\AppName = "DownLoadDlg.exe" DownLoadDlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4A79E46E-5A01-4abb-BCC1-F96D06AEE085}\AppPath = "C:\\Program Files (x86)\\SogouDownLoad" DownLoadDlg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4A79E46E-5A01-4abb-BCC1-F96D06AEE085}\Policy = "3" DownLoadDlg.exe -
Modifies data under HKEY_USERS 38 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244} regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext\Stats regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\S-1-5-20 regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore regsvr32.exe Key created \REGISTRY\USER\S-1-5-19 regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\.DEFAULT regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext\Stats regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244} regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244} regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\Implemented Categories regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\SOFTWARE regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D91BAE-B37C-41C3-AE86-463E53990546}\1.0\0\win32\ = "C:\\Program Files (x86)\\SogouDownLoad\\npdownload64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{35489C47-0C7C-48D8-8000-0FB159BAF406}\Version XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B411DAF2-77C4-4478-8477-5826A4147AE9}\TypeLib XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4A79E46E-5A01-4abb-BCC1-F96D06AEE085}\LocalServer32 DownLoadDlg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{35489C47-0C7C-48D8-8000-0FB159BAF406}\LocalServer32\ = "\"C:\\Program Files (x86)\\SogouDownLoad\\XLDownloadCom.exe\"" XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{35489C47-0C7C-48D8-8000-0FB159BAF406}\TypeLib XLDownloadCom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B411DAF2-77C4-4478-8477-5826A4147AE9}\ = "IXLDownloadInterface" XLDownloadCom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D91BAE-B37C-41C3-AE86-463E53990546}\1.0\ = "SogouDownLoadLib" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\InprocServer32\ = "C:\\Program Files (x86)\\SogouDownLoad\\IEHint.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\TypeLib\ = "{459CB386-4301-448D-A1DA-8751857E980B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\TypeLib\ = "{13D91BAE-B37C-41C3-AE86-463E53990546}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D91BAE-B37C-41C3-AE86-463E53990546}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{459CB386-4301-448D-A1DA-8751857E980B}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4A79E46E-5A01-4abb-BCC1-F96D06AEE085}\LocalServer32\ = "C:\\Program Files (x86)\\SogouDownLoad\\DownLoadDlg.exe" DownLoadDlg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32\ = "C:\\Program Files (x86)\\SogouDownLoad\\npdownload64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{35489C47-0C7C-48D8-8000-0FB159BAF406}\TypeLib\ = "{2D85F656-2970-437F-BA8A-C6F95B86EE0D}" XLDownloadCom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B411DAF2-77C4-4478-8477-5826A4147AE9}\TypeLib\ = "{2D85F656-2970-437F-BA8A-C6F95B86EE0D}" XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B411DAF2-77C4-4478-8477-5826A4147AE9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{459CB386-4301-448D-A1DA-8751857E980B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{548F20C0-F980-4912-9190-1127D22D883D}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D85F656-2970-437F-BA8A-C6F95B86EE0D}\1.0\HELPDIR XLDownloadCom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{459CB386-4301-448D-A1DA-8751857E980B}\1.0\0\win32\ = "C:\\Program Files (x86)\\SogouDownLoad\\IEHint.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D85F656-2970-437F-BA8A-C6F95B86EE0D}\1.0 XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D91BAE-B37C-41C3-AE86-463E53990546}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{548F20C0-F980-4912-9190-1127D22D883D}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\ = "IGameDownload" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{459CB386-4301-448D-A1DA-8751857E980B}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{35489C47-0C7C-48D8-8000-0FB159BAF406}\LocalServer32\ServerExecutable = "C:\\Program Files (x86)\\SogouDownLoad\\XLDownloadCom.exe" XLDownloadCom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D85F656-2970-437F-BA8A-C6F95B86EE0D}\1.0\0\win32\ = "C:\\Program Files (x86)\\SogouDownLoad\\XLDownloadCom.exe" XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{459CB386-4301-448D-A1DA-8751857E980B}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{548F20C0-F980-4912-9190-1127D22D883D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B411DAF2-77C4-4478-8477-5826A4147AE9}\TypeLib\Version = "1.0" XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B411DAF2-77C4-4478-8477-5826A4147AE9}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D91BAE-B37C-41C3-AE86-463E53990546} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D91BAE-B37C-41C3-AE86-463E53990546}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{548F20C0-F980-4912-9190-1127D22D883D}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{548F20C0-F980-4912-9190-1127D22D883D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D85F656-2970-437F-BA8A-C6F95B86EE0D}\1.0\FLAGS XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID DownLoadDlg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D91BAE-B37C-41C3-AE86-463E53990546}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244} regsvr32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 DownLoadDlg.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 DownLoadDlg.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2588 DownLoadDlg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2588 DownLoadDlg.exe 2588 DownLoadDlg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2416 2256 2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe 28 PID 2256 wrote to memory of 2416 2256 2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe 28 PID 2256 wrote to memory of 2416 2256 2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe 28 PID 2256 wrote to memory of 2416 2256 2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe 28 PID 2256 wrote to memory of 2416 2256 2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe 28 PID 2256 wrote to memory of 2416 2256 2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe 28 PID 2256 wrote to memory of 2416 2256 2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe 28 PID 2256 wrote to memory of 2588 2256 2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe 29 PID 2256 wrote to memory of 2588 2256 2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe 29 PID 2256 wrote to memory of 2588 2256 2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe 29 PID 2256 wrote to memory of 2588 2256 2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe 29 PID 2588 wrote to memory of 2548 2588 DownLoadDlg.exe 31 PID 2588 wrote to memory of 2548 2588 DownLoadDlg.exe 31 PID 2588 wrote to memory of 2548 2588 DownLoadDlg.exe 31 PID 2588 wrote to memory of 2548 2588 DownLoadDlg.exe 31 PID 2588 wrote to memory of 2548 2588 DownLoadDlg.exe 31 PID 2588 wrote to memory of 2548 2588 DownLoadDlg.exe 31 PID 2588 wrote to memory of 2548 2588 DownLoadDlg.exe 31 PID 2548 wrote to memory of 2840 2548 ExternalApp.exe 32 PID 2548 wrote to memory of 2840 2548 ExternalApp.exe 32 PID 2548 wrote to memory of 2840 2548 ExternalApp.exe 32 PID 2548 wrote to memory of 2840 2548 ExternalApp.exe 32 PID 2548 wrote to memory of 2840 2548 ExternalApp.exe 32 PID 2548 wrote to memory of 2840 2548 ExternalApp.exe 32 PID 2548 wrote to memory of 2840 2548 ExternalApp.exe 32 PID 2548 wrote to memory of 1516 2548 ExternalApp.exe 33 PID 2548 wrote to memory of 1516 2548 ExternalApp.exe 33 PID 2548 wrote to memory of 1516 2548 ExternalApp.exe 33 PID 2548 wrote to memory of 1516 2548 ExternalApp.exe 33 PID 2548 wrote to memory of 1516 2548 ExternalApp.exe 33 PID 2548 wrote to memory of 1516 2548 ExternalApp.exe 33 PID 2548 wrote to memory of 1516 2548 ExternalApp.exe 33 PID 2548 wrote to memory of 2084 2548 ExternalApp.exe 34 PID 2548 wrote to memory of 2084 2548 ExternalApp.exe 34 PID 2548 wrote to memory of 2084 2548 ExternalApp.exe 34 PID 2548 wrote to memory of 2084 2548 ExternalApp.exe 34 PID 2548 wrote to memory of 2084 2548 ExternalApp.exe 34 PID 2548 wrote to memory of 2084 2548 ExternalApp.exe 34 PID 2548 wrote to memory of 2084 2548 ExternalApp.exe 34 PID 2084 wrote to memory of 1996 2084 regsvr32.exe 35 PID 2084 wrote to memory of 1996 2084 regsvr32.exe 35 PID 2084 wrote to memory of 1996 2084 regsvr32.exe 35 PID 2084 wrote to memory of 1996 2084 regsvr32.exe 35 PID 2084 wrote to memory of 1996 2084 regsvr32.exe 35 PID 2084 wrote to memory of 1996 2084 regsvr32.exe 35 PID 2084 wrote to memory of 1996 2084 regsvr32.exe 35 PID 2548 wrote to memory of 1256 2548 ExternalApp.exe 36 PID 2548 wrote to memory of 1256 2548 ExternalApp.exe 36 PID 2548 wrote to memory of 1256 2548 ExternalApp.exe 36 PID 2548 wrote to memory of 1256 2548 ExternalApp.exe 36 PID 2548 wrote to memory of 1256 2548 ExternalApp.exe 36 PID 2548 wrote to memory of 1256 2548 ExternalApp.exe 36 PID 2548 wrote to memory of 1256 2548 ExternalApp.exe 36 PID 1256 wrote to memory of 2000 1256 regsvr32.exe 37 PID 1256 wrote to memory of 2000 1256 regsvr32.exe 37 PID 1256 wrote to memory of 2000 1256 regsvr32.exe 37 PID 1256 wrote to memory of 2000 1256 regsvr32.exe 37 PID 1256 wrote to memory of 2000 1256 regsvr32.exe 37 PID 1256 wrote to memory of 2000 1256 regsvr32.exe 37 PID 1256 wrote to memory of 2000 1256 regsvr32.exe 37 PID 2548 wrote to memory of 2192 2548 ExternalApp.exe 38 PID 2548 wrote to memory of 2192 2548 ExternalApp.exe 38 PID 2548 wrote to memory of 2192 2548 ExternalApp.exe 38 PID 2548 wrote to memory of 2192 2548 ExternalApp.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_9259195046d49cb9e327d004d93dae4b_mafia.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\minidownload.exeC:\Users\Admin\AppData\Local\Temp\\minidownload.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:2416
-
-
C:\Program Files (x86)\SogouDownLoad\DownLoadDlg.exe"C:\Program Files (x86)\SogouDownLoad\DownLoadDlg.exe" /Install?status=true&softurl=https%3A%2F%2Fxiazai.sogou.com%2Fcomm%2Fredir%3Fsoftdown%3D1%26u%3DYRyEVuHeM44R64n5Z9vDp8w9LgPDEeC3lXW2w6UGPTm2addyN_6Z3IgRjPbEqOiHmiQXBVZPFoLfN_LPkloCAKBczwlEOKnstmnXcjf-mdyfSlrUwNn81C5fnJd6oRdx%26pcid%3D3320575651238465759%26fr%3Dxiazai%26source%3Dsogou_own%26filename%3Dsogou_pinyin_zhihui.exe&iconurl=http%3A%2F%2Fdl.app.sogou.com%2Fpc_logo%2F3320575651238465759.png&softname=%E6%90%9C%E7%8B%97%E6%8B%BC%E9%9F%B3%E6%99%BA%E6%85%A7%E7%89%88&softsize=31.50MB2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\SogouDownLoad\tmp\ExternalApp.exe"C:\Program Files (x86)\SogouDownLoad\tmp\ExternalApp.exe" /BindSogouFinder3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SogouDownLoad\npdownload.dll"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies registry class
PID:2840
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SogouDownLoad\IEHint.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1516
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SogouDownLoad\npdownload64.dll"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\SogouDownLoad\npdownload64.dll"5⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies data under HKEY_USERS
- Modifies registry class
PID:1996
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SogouDownLoad\IEHint64.dll"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\SogouDownLoad\IEHint64.dll"5⤵
- Loads dropped DLL
- Registers COM server for autorun
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2000
-
-
-
C:\Program Files (x86)\SogouDownLoad\update\UpdateService.exe"C:\Program Files (x86)\SogouDownLoad\update\UpdateService.exe" /Install4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2192
-
-
C:\Program Files (x86)\SogouDownLoad\XLDownloadCom.exe"C:\Program Files (x86)\SogouDownLoad\XLDownloadCom.exe" /Regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2308
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SogouDownLoad\XLDownloadComPS.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:1848
-
-
-
C:\Program Files (x86)\SogouDownLoad\download\MiniTPFw.exe"C:\Program Files (x86)\SogouDownLoad\download\MiniTPFw.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2300 -
C:\Program Files (x86)\SogouDownLoad\download\ThunderFW.exe"C:\Program Files (x86)\SogouDownLoad\download\ThunderFW.exe" MiniThunderPlatform2024-01-2804:45:34 "C:\Program Files (x86)\SogouDownLoad\download\MiniThunderPlatform.exe"4⤵
- Executes dropped EXE
PID:340
-
-
-
-
C:\Program Files (x86)\SogouDownLoad\update\UpdateService.exe"C:\Program Files (x86)\SogouDownLoad\update\UpdateService.exe" /Service1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1304
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191KB
MD587d4aa3496919af493c9365619c3fd53
SHA1a883a0be2940811ef9232592c811b854f684f4b7
SHA256d4a4eb61a6ffba806c3f34fa6bb5fca32489f53138dbaf324a8b2d210afa0771
SHA512064637554b7e7e1c5699f4e4ced73dd4ca7bf87172009b121bedeb864f8e3d03a1352b6f6b9515b9a4020137e07b9981476a664eadbd27bd32acdd8a53003372
-
Filesize
560KB
MD503311437428117fb004eec8b38b62cca
SHA1394c7c27c61d4e341f64c2be812ffac2ebe8c8af
SHA2560565e862198c1979c5d58c8b6120c15601c668c9adcc3c545c5f2f27c85c3edc
SHA512fe719a26feed2c6147c4e71a4d732afcaf59c2146d6d8adbfa533dcc3af1d2c11d6174371f4d4babe6cac2b6cc438626a14e7f02ad5e9e2fe506351891d8f4d2
-
Filesize
346KB
MD530e7e39b49c8590aec85aca2664ff3e7
SHA18273c46fb4666e44ce3865012529aebb6aa95f1c
SHA2563d3f8c1a05c2b5b5362b9ee0ddc1ce653a22abf0b559acceebcc82b73dbaf79a
SHA5128d967605e4be98929cf6b508dccc217e60186da44dcb594d16e286f29b66c846dc1c4e676fab235de7f2326bcb4aae30528a535136de72f6a978a48d8a424245
-
Filesize
42KB
MD5ef217dde650c290e6f15bdbd7f55f26d
SHA187ef4ca0ac1f7dd6c50bdaa0aeeebc3d1e132dcf
SHA256a445ea86ffb20f9540d53aa12dc8f3737a9c87573241b9c5686109533b92e890
SHA512d2ae2574d2fa5455b590513066bdee9d3765bffd6b82450a5e619d01d4378013cbdcb4f0d9cec47ba7f03125098945c07cb0c6274a9a1ad0346bddd10fe022b5
-
Filesize
7KB
MD559bf1a7a08d5e3b066a650351197f0af
SHA1833d0f6bff8b4daf936b8902e375a942d3d831e7
SHA256fa2fb59f16ccb6ec42ad804a270654b1fe50fc5303a39df734621efd96daad30
SHA512fe7edeab6008a51885932a0cedcffa73327029c5a6bae636b0fc25f52f60b38d795f01e56bc1071b911d2f77aca2b644461f5f52398fead735bdb74959876592
-
Filesize
93KB
MD55790ead7ad3ba27397aedfa3d263b867
SHA18130544c215fe5d1ec081d83461bf4a711e74882
SHA2562ecd295d295bec062cedebe177e54b9d6b19fc0a841dc5c178c654c9ccff09c0
SHA512781acedc99de4ce8d53d9b43a158c645eab1b23dfdfd6b57b3c442b11acc4a344e0d5b0067d4b78bb173abbded75fb91c410f2b5a58f71d438aa6266d048d98a
-
Filesize
76B
MD5eeb80831da6c34ee872846edce4d6a03
SHA1c3c314f5936b95b8a33eed6d39b2f7309e517bee
SHA256620f10c15a1d7e1cb122234ab2c862f201913c29865282733cc42db0512a485b
SHA51286162a73410639731790950b46a726321d183552217fe3473fa549e193afa03a30876b8180e8dd0fd7990b3452a31e1f02d0ebce21b361f70224303ded8f75a3
-
Filesize
5KB
MD57b73753cd524c62838f1031e52b6310d
SHA121d962ff343263f484262cc246ce9683dbac89b3
SHA256e3629d6e735ac18a47c36c4a8a3caf2469102eb6abf12d938a82df16bb012d4f
SHA5127f5ae1c87227671bd91f8a65cae9ee90976d2a427a2a5530b754ef5fad80e7d096b53e31f715cd38553f8b56776d80176a927419b467a169929f41ce185b5248
-
Filesize
6KB
MD5f122f616e4b32a843d7f6803bea9a10f
SHA19a8eed20175b74821f2678ea72d086d55330bb42
SHA256f9d5aa213ccbd78f98d6b1978e378de7a1b37b1fbffb93e4ea1f1b914a720e0d
SHA512aa5a1595c785469dc2d68dcfe20af232baa0bff2f96f3276a14ba2f925fc1316ee50b694fb193d8d963e10656cd6da9e623fb54ca6a201fae3aca4a64319f7b8
-
Filesize
1KB
MD5c2cfc62059b6259d5db8b7e64b76ea0d
SHA1eaf2eb169b87faeb829e124ce6e6f9f292f7f266
SHA256ca281adf65372f5fc51f621fbe93a935629e2d979958ffd3f5f695cf7bc3d23e
SHA5127e007989e19a8735ef7bd8c467ed213fd3321e81af2980d3a93403098f53fbf0df0a6f9bcaad794623d80fb05cbcc293b49c73c76a05be970f689d9f21bc3346
-
Filesize
25KB
MD5b6b31a4d23c2664b87dc8bf1fcf8ff22
SHA117f27a514ef7119080be4ae9dc691010acdc43fa
SHA2565ece2e217e6a50b2ecc6564601c1da92441c73a1a34a3c6c5d207d6726df8756
SHA5125506ed1fba0e3fa471c83240266ff329fbb23ae862955a5bac358ae506c90d4c03227a710fc548ca5510eb711b95ecce75c63323c30766e3dd081c081b5829cd
-
Filesize
348B
MD5915d0422e8b87e694bb052287e45de06
SHA1ae5f77eda69dd12218fc542279fe9e4e0a85db22
SHA2565fa5d3bedabe22c5193b5eace4ae3be80a5c8c6271873e1d915bc42c525ce689
SHA5124392768182f58bb14aad04d5f4287447eb239b6387cb7371def0ce25bb940be88d32c366e7c483cfd604f0aa7a11171084411530389926f3eb6cc1f9f9847852
-
Filesize
657B
MD50e0ac8352cd69f396f271fa32f3ab554
SHA1ed6d306a5033707f45477df3318a53d15b47cf43
SHA256c2c34d6bf4e17b756954e409dc9b5663169d68997abd722ce1e86473b769f10c
SHA5125d2528489c21600f16f04559500be3ebe9db5a1dc7bf9abc9c1312187b4b8b7bc5966f9eb2a38e26bff26c854a6d964fa156641fed9501cf0e7befedb60fd7e0
-
Filesize
285B
MD57db33b5890d916426f77d585ab3c4fa9
SHA199a794c3a88803ae289c7ea6f0d733e22a3b799b
SHA2565585318ea9be125540f00f04b05b29da3816ef97ce837a22a2eaee2d5d462d9b
SHA5129800273f1e605b946dd553cbae650270c5bf2af7909a4836aa81907f9e30ca348a3552a1887e3357472ca1b93fa8361a17bee3fb742fb5a2d0c1b47a5a47c773
-
Filesize
10KB
MD5631f38cfac458788af482eba736e5ac3
SHA1b1d09def39ec74eff2c9e0aafe0a7c12e7650150
SHA25613e6cf03cdd65a8174cce7b0cb40c9821d2aff04a79c3374e8664fb0abb5694d
SHA5123ae47c895cd586b1dca8bdf65c58bc896b27837881cc42bb7b3d55c9a71ea9e857939a69c5146b445b64714996393d1ec9c0d95b18d18fd5cb48f02bb8a53f42
-
Filesize
263KB
MD509c16c79a0093b38ef756c58c32d75e2
SHA1d6721cc14a1dd1879a923b38fd046d6e8b0f40df
SHA256a93cce637743104e4d418eca05f238405b3e97672163d8abd1ad429045f843b6
SHA512eabb9237b5121e9755a01d4e9522513fbf5ea4594779d336fe373708933006b94d10a23a749efc623177296b1270337a63aab46d4990a0ee1f73df7ee8622f87
-
Filesize
302KB
MD58523eee6d4c49b110e6c19ecfd7e5620
SHA1434ddf9f77f904812ef4c3c2329ce057b30dfdfc
SHA256a4917bf56e25576632e808c5199c3c43eb21c866e4e6eb6747c79168f6044c57
SHA512bb916842beac0a605675dda9bf240b2f75437a61bbdd3d89fd464694167db7addb9fd6dd2fce482b9670c9c0e46eb9b3952cf538fb555ade10a9787f4081934a
-
Filesize
992B
MD59bc1ea6b68652f96baf232b93e2be6c5
SHA10369f758870c638d067d88211c76f6a1297c49ec
SHA256f28098a7782778b514cfc7bc74af6c4b71735ab38e5bf731ab2f4317fbd3f182
SHA512d240bcc4b953d2275bf645a6a6b7f7151c900551cd5a2a066d3030311c50d34a8d1390d6a6cd5361b3544c92127bc4823aa9437a70d277358c1a0fe573fdeefa
-
Filesize
96B
MD53c9d5e0d623b714a577adb9b3d724b88
SHA15708d8340b28a848c7cc8686b6c4bc3705747621
SHA25675c12e99aa780fc0f3a8840591e1600355baf78bdf64365e301b2aac6c1c83a4
SHA512ccf0c00463042751c6dc6d807c5f7c9b2c3c945309dbe4310f0493bee60063b847cb1c82d4e5f36ded9c7d909ab35efef6f13fa2ebfd07e41ee62580a85777b8
-
Filesize
83KB
MD56a695550741cdbafba406d0c7a9ebd00
SHA132e9128129068e4524370fac7eba88ca9f6c109e
SHA256d16b036fab037ef7f529c963a746e6963a552b7bf56bd6026db84028bd6aadb9
SHA512d4d15129e446fc1d5ac0d9688f775b83d736bb296617a86c93f0a6208931bb84936adab5e4e71339065dcd3d6ec6b1a2af189b8802409a2d4ab5f5556f85f81a
-
Filesize
300KB
MD56cffe36e5e3d9364a18eaf4a44ebfc23
SHA18a3bb3fa5f76a7eac5dfc4bd201a5e5203c10bcf
SHA256cd57765f8cea6a4f422862c0b8a3e1945f17292e4c14b31333ec1525e05c6025
SHA5127e145a0a79bd3d8caa89bae2ddb1187ff4de481426bb820cdf8f0206c96819d38af0ade5aad6c9e89da4e11dad6d5ab692f3d8bb25b90da2596bf49619fe325b
-
Filesize
133KB
MD5004dcd89684f7fc42d3c77edf80dfc92
SHA18a086552df8c17ad146518757689f9237e27b87d
SHA25667510f7dd0476f12e07901ac0344d92186dd761a52398ee1e835421382094f1b
SHA5123a60493e77a7e59147d2b75bed788062d7482d922062d63a40ba3a050013736ce28e1f6319ba3eb7faecc44de9332ff571c028ea8582270d614d9659bf2769ac
-
Filesize
58KB
MD558bb62e88687791ad2ea5d8d6e3fe18b
SHA10ffb029064741d10c9cf3f629202aa97167883de
SHA256f02fa7ddab2593492b9b68e3f485e59eb755380a9235f6269705f6d219dff100
SHA512cd36b28f87be9cf718f0c44bf7c500d53186edc08889bcfa5222041ff31c5cbee509b186004480efbd99c36b2233182ae0969447f4051510e1771a73ed209da5
-
Filesize
2.4MB
MD5b58d945d3d2b83eb5199d60fc27d0e6a
SHA13b70e368422bab5ff123d1ef6c5779adb540ef5a
SHA256905de1f8ab574888fa9dbe7bb5a060ca1c09f710fed2c98e3c2699e595343b79
SHA512027b6ab2197451dae5224c6f3417120d3b7e1ca5cb1801e4a952cac4b832deeacd16955bb3cb3c13553317685609eac6a2202ce8d2ab85837963a5a1478eacdd
-
Filesize
154KB
MD544f5df9407679e7385a0a3a925fbc39b
SHA195681735e2b3e8d0296b39fb505a6e6644e2330b
SHA256a1779be9ef6a3ec798578c0b79a279d34316872d8509eb37f62c98b2fe6af23f
SHA512bf02965127b81da708e13b519b822903de9999b797bbd0ed6697a39e95279511c9e9044d793ef69d9a11f3d518fce1ba85250bbe58c6255f660a09bced35c63f
-
Filesize
324KB
MD58bde3d87157322360828ba6e8dd43073
SHA1b502f83f19da64826257800db1f62d15bbdabc7c
SHA256459e67cfd20eaa1b7768e1ad845c90f72f4c2643d428f5cd8551f7b364382307
SHA512c60d3fc3e130e164349a751a3c42d922ea4d46b42198da5a03879bdf0990ba94549bd36682d4e1e0bb2c13b4865f2d650e3967d963cd8e9deee7c6353cc3af16
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f