Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 06:20
Static task
static1
Behavioral task
behavioral1
Sample
a128c5bc0609f0871555f4e66bb19717.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a128c5bc0609f0871555f4e66bb19717.exe
Resource
win10v2004-20240221-en
General
-
Target
setup_installer.exe
-
Size
3.3MB
-
MD5
bc3529a39749e698e030aaed73343ac7
-
SHA1
4420f1445bf7dd0ccb3e795ab77a1ce3e6f2501d
-
SHA256
82445c54c2679f15b883f34a95ccdfec4828ad72dc5e609c9281c522561cb74b
-
SHA512
12fe58c706cfe6590af9c36a0ae99ff33def04196c0cc5bea6684ea585c61186f98fd72e23be02535985460f56b122692378a90b03af98805096d4fddfd4e2be
-
SSDEEP
98304:x3CvLUBsgd6KWbrA/pYp6pU2RmxRNpzV55zr6DJz:x0LUCg8bsRYoUygzVL45
Malware Config
Extracted
nullmixer
http://marisana.xyz/
Extracted
ffdroider
http://186.2.171.3
Extracted
smokeloader
pub6
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
FFDroider payload 3 IoCs
resource yara_rule behavioral3/memory/1864-122-0x0000000000400000-0x0000000000759000-memory.dmp family_ffdroider behavioral3/memory/1864-148-0x0000000000400000-0x0000000000759000-memory.dmp family_ffdroider behavioral3/memory/1864-389-0x0000000000400000-0x0000000000759000-memory.dmp family_ffdroider -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 3 IoCs
resource yara_rule behavioral3/memory/1908-156-0x0000000000400000-0x000000000095B000-memory.dmp family_vidar behavioral3/memory/1908-154-0x0000000000360000-0x00000000003FD000-memory.dmp family_vidar behavioral3/memory/1908-275-0x0000000000400000-0x000000000095B000-memory.dmp family_vidar -
resource yara_rule behavioral3/files/0x000e000000013420-28.dat aspack_v212_v242 behavioral3/files/0x0037000000013a6e-26.dat aspack_v212_v242 behavioral3/files/0x0007000000014246-34.dat aspack_v212_v242 -
Executes dropped EXE 11 IoCs
pid Process 2628 setup_install.exe 2496 cb4071ec97a2.exe 1436 a6d6262485.exe 2360 29dc9096b9.exe 2696 c65040c72c7.exe 2676 757755d929c68.exe 1968 30dd64a3b09404.exe 2904 cb4071ec97a2.exe 1908 ed10a8b2b3d6.exe 1864 6f0ef9103.exe 1608 a6d6262485.tmp -
Loads dropped DLL 50 IoCs
pid Process 1228 setup_installer.exe 1228 setup_installer.exe 1228 setup_installer.exe 2628 setup_install.exe 2628 setup_install.exe 2628 setup_install.exe 2628 setup_install.exe 2628 setup_install.exe 2628 setup_install.exe 2628 setup_install.exe 2628 setup_install.exe 2588 cmd.exe 2588 cmd.exe 2496 cb4071ec97a2.exe 2496 cb4071ec97a2.exe 2504 cmd.exe 2444 cmd.exe 2456 cmd.exe 2564 cmd.exe 2456 cmd.exe 1436 a6d6262485.exe 2884 cmd.exe 1436 a6d6262485.exe 2496 cb4071ec97a2.exe 2696 c65040c72c7.exe 2696 c65040c72c7.exe 1968 30dd64a3b09404.exe 1968 30dd64a3b09404.exe 2476 cmd.exe 2476 cmd.exe 2500 cmd.exe 2500 cmd.exe 1908 ed10a8b2b3d6.exe 1908 ed10a8b2b3d6.exe 1864 6f0ef9103.exe 1864 6f0ef9103.exe 2904 cb4071ec97a2.exe 2904 cb4071ec97a2.exe 1436 a6d6262485.exe 1608 a6d6262485.tmp 1608 a6d6262485.tmp 1608 a6d6262485.tmp 1772 WerFault.exe 1772 WerFault.exe 1772 WerFault.exe 1772 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral3/files/0x0006000000014b4c-112.dat vmprotect behavioral3/files/0x0006000000014b4c-117.dat vmprotect behavioral3/files/0x0006000000014b4c-119.dat vmprotect behavioral3/memory/1864-122-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect behavioral3/files/0x0006000000014b4c-118.dat vmprotect behavioral3/files/0x0006000000014b4c-110.dat vmprotect behavioral3/files/0x0006000000014b4c-109.dat vmprotect behavioral3/memory/1864-148-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect behavioral3/memory/1864-389-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 91 iplogger.org 92 iplogger.org 99 iplogger.org -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ipinfo.io 16 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1772 2628 WerFault.exe 28 1936 1908 WerFault.exe 33 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c65040c72c7.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c65040c72c7.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c65040c72c7.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 ed10a8b2b3d6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 040000000100000010000000acb694a59c17e0d791529bb19706a6e40f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f0b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f007400000053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c0140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df01d0000000100000010000000918ad43a9475f78bb5243de886d8103c09000000010000000c000000300a06082b06010505070301030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47419000000010000001000000068cb42b035ea773e52ef50ecf50ec52920000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 757755d929c68.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 29dc9096b9.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 29dc9096b9.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 ed10a8b2b3d6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 19000000010000001000000068cb42b035ea773e52ef50ecf50ec529030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47409000000010000000c000000300a06082b060105050703011d0000000100000010000000918ad43a9475f78bb5243de886d8103c140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c00b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f00740000000f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f20000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 ed10a8b2b3d6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 ed10a8b2b3d6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 29dc9096b9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 ed10a8b2b3d6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 ed10a8b2b3d6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 757755d929c68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 29dc9096b9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 29dc9096b9.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 29dc9096b9.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 9 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 22 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2696 c65040c72c7.exe 2696 c65040c72c7.exe 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1608 a6d6262485.tmp -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2696 c65040c72c7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2676 757755d929c68.exe Token: SeDebugPrivilege 2360 29dc9096b9.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1608 a6d6262485.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2628 1228 setup_installer.exe 28 PID 1228 wrote to memory of 2628 1228 setup_installer.exe 28 PID 1228 wrote to memory of 2628 1228 setup_installer.exe 28 PID 1228 wrote to memory of 2628 1228 setup_installer.exe 28 PID 1228 wrote to memory of 2628 1228 setup_installer.exe 28 PID 1228 wrote to memory of 2628 1228 setup_installer.exe 28 PID 1228 wrote to memory of 2628 1228 setup_installer.exe 28 PID 2628 wrote to memory of 2352 2628 setup_install.exe 49 PID 2628 wrote to memory of 2352 2628 setup_install.exe 49 PID 2628 wrote to memory of 2352 2628 setup_install.exe 49 PID 2628 wrote to memory of 2352 2628 setup_install.exe 49 PID 2628 wrote to memory of 2352 2628 setup_install.exe 49 PID 2628 wrote to memory of 2352 2628 setup_install.exe 49 PID 2628 wrote to memory of 2352 2628 setup_install.exe 49 PID 2628 wrote to memory of 2588 2628 setup_install.exe 48 PID 2628 wrote to memory of 2588 2628 setup_install.exe 48 PID 2628 wrote to memory of 2588 2628 setup_install.exe 48 PID 2628 wrote to memory of 2588 2628 setup_install.exe 48 PID 2628 wrote to memory of 2588 2628 setup_install.exe 48 PID 2628 wrote to memory of 2588 2628 setup_install.exe 48 PID 2628 wrote to memory of 2588 2628 setup_install.exe 48 PID 2628 wrote to memory of 2564 2628 setup_install.exe 47 PID 2628 wrote to memory of 2564 2628 setup_install.exe 47 PID 2628 wrote to memory of 2564 2628 setup_install.exe 47 PID 2628 wrote to memory of 2564 2628 setup_install.exe 47 PID 2628 wrote to memory of 2564 2628 setup_install.exe 47 PID 2628 wrote to memory of 2564 2628 setup_install.exe 47 PID 2628 wrote to memory of 2564 2628 setup_install.exe 47 PID 2628 wrote to memory of 2500 2628 setup_install.exe 46 PID 2628 wrote to memory of 2500 2628 setup_install.exe 46 PID 2628 wrote to memory of 2500 2628 setup_install.exe 46 PID 2628 wrote to memory of 2500 2628 setup_install.exe 46 PID 2628 wrote to memory of 2500 2628 setup_install.exe 46 PID 2628 wrote to memory of 2500 2628 setup_install.exe 46 PID 2628 wrote to memory of 2500 2628 setup_install.exe 46 PID 2628 wrote to memory of 2444 2628 setup_install.exe 45 PID 2628 wrote to memory of 2444 2628 setup_install.exe 45 PID 2628 wrote to memory of 2444 2628 setup_install.exe 45 PID 2628 wrote to memory of 2444 2628 setup_install.exe 45 PID 2628 wrote to memory of 2444 2628 setup_install.exe 45 PID 2628 wrote to memory of 2444 2628 setup_install.exe 45 PID 2628 wrote to memory of 2444 2628 setup_install.exe 45 PID 2628 wrote to memory of 2456 2628 setup_install.exe 29 PID 2628 wrote to memory of 2456 2628 setup_install.exe 29 PID 2628 wrote to memory of 2456 2628 setup_install.exe 29 PID 2628 wrote to memory of 2456 2628 setup_install.exe 29 PID 2628 wrote to memory of 2456 2628 setup_install.exe 29 PID 2628 wrote to memory of 2456 2628 setup_install.exe 29 PID 2628 wrote to memory of 2456 2628 setup_install.exe 29 PID 2588 wrote to memory of 2496 2588 cmd.exe 43 PID 2588 wrote to memory of 2496 2588 cmd.exe 43 PID 2588 wrote to memory of 2496 2588 cmd.exe 43 PID 2588 wrote to memory of 2496 2588 cmd.exe 43 PID 2588 wrote to memory of 2496 2588 cmd.exe 43 PID 2588 wrote to memory of 2496 2588 cmd.exe 43 PID 2588 wrote to memory of 2496 2588 cmd.exe 43 PID 2628 wrote to memory of 2476 2628 setup_install.exe 44 PID 2628 wrote to memory of 2476 2628 setup_install.exe 44 PID 2628 wrote to memory of 2476 2628 setup_install.exe 44 PID 2628 wrote to memory of 2476 2628 setup_install.exe 44 PID 2628 wrote to memory of 2476 2628 setup_install.exe 44 PID 2628 wrote to memory of 2476 2628 setup_install.exe 44 PID 2628 wrote to memory of 2476 2628 setup_install.exe 44 PID 2628 wrote to memory of 2884 2628 setup_install.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\7zSCC409A36\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCC409A36\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c65040c72c7.exe3⤵
- Loads dropped DLL
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\7zSCC409A36\c65040c72c7.exec65040c72c7.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 4243⤵
- Loads dropped DLL
- Program crash
PID:1772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 29dc9096b9.exe3⤵
- Loads dropped DLL
PID:2504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 757755d929c68.exe3⤵
- Loads dropped DLL
PID:2884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ed10a8b2b3d6.exe3⤵
- Loads dropped DLL
PID:2476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c a6d6262485.exe3⤵
- Loads dropped DLL
PID:2444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6f0ef9103.exe3⤵
- Loads dropped DLL
PID:2500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 30dd64a3b09404.exe3⤵
- Loads dropped DLL
PID:2564
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cb4071ec97a2.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c APPNAME11.exe3⤵PID:2352
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCC409A36\757755d929c68.exe757755d929c68.exe1⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
C:\Users\Admin\AppData\Local\Temp\is-23POK.tmp\a6d6262485.tmp"C:\Users\Admin\AppData\Local\Temp\is-23POK.tmp\a6d6262485.tmp" /SL5="$701F6,138429,56832,C:\Users\Admin\AppData\Local\Temp\7zSCC409A36\a6d6262485.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1608
-
C:\Users\Admin\AppData\Local\Temp\7zSCC409A36\6f0ef9103.exe6f0ef9103.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1864
-
C:\Users\Admin\AppData\Local\Temp\7zSCC409A36\ed10a8b2b3d6.exeed10a8b2b3d6.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:1908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 9482⤵
- Loads dropped DLL
- Program crash
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCC409A36\cb4071ec97a2.exe"C:\Users\Admin\AppData\Local\Temp\7zSCC409A36\cb4071ec97a2.exe" -a1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2904
-
C:\Users\Admin\AppData\Local\Temp\7zSCC409A36\30dd64a3b09404.exe30dd64a3b09404.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1968
-
C:\Users\Admin\AppData\Local\Temp\7zSCC409A36\a6d6262485.exea6d6262485.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1436
-
C:\Users\Admin\AppData\Local\Temp\7zSCC409A36\29dc9096b9.exe29dc9096b9.exe1⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
C:\Users\Admin\AppData\Local\Temp\7zSCC409A36\cb4071ec97a2.execb4071ec97a2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a11a613ed175e7d0b63ce07be4fd38d
SHA10d570d53db7bf0bcf1346bb2d4174960d0139e2f
SHA256476c30233d0fc1b89e68c07d9c02c3a1dc9f6ad6a9d979f865961d0c92b0a386
SHA5120c915b51788e412f6e495650758fca305a96416aebdf22cf4fbacd5f2ed180013bf70ce38ccae50c764f6c866299603b31c5f4a79fdc75fef4bfe4aedc135671
-
Filesize
179KB
MD5c5437a135b1a8803c24cae117c5c46a4
SHA1eb6f3a8e57bcfc3f7bf620bb8be64a7d2fa78dbf
SHA2567630e0e9979dd2ff88393c5dff4a0b638aac88c9ce8a3bdeb16cf78c18de5df1
SHA51207adc9eb0d75d38dc16394a36d48e3eb41f9cb794ac2fa6d7d986a95b680b95a075e74dfc8571af1a1328c39f17f91344fb03acdd6c41c7afd76ff0317c77181
-
Filesize
567KB
MD59a81f3450035a874f39395e23987bb67
SHA11f02dfd12adb3f50c19304533e7b7f223013560f
SHA2560fa6e5644840399f5fb181c4e1f52be43df16ac27b37b2a6d3833c526d3b8702
SHA512b88fd98aa35891a3906d2c197e40bc25d2eae91080ce465d7b4f90315b3a49791f688855c28c9c3065248d9d2acc6b43b350cba918c13865b33b5cad3b4ac9e6
-
Filesize
488KB
MD5fcd72970211cb50884ef55bcaa45c30b
SHA1974be7328b70fceb7c22f52f03ba8f6dc4c4737c
SHA256bc2e4c73b7bd4d5c24d3cb15bfc4858bb8070dcdad1c0c03a41a5502c8ef80cc
SHA51206a66a58801b95192fae0670f03ffbfaac9123c56c41d6e569aa1b65f6b2a11e28323a40544c7d39563ca018f2e26241d6bc64d1eb9d1bb1a156e5697bfd4f21
-
Filesize
58KB
MD5ca5c1015d945df3587808df98f2ffada
SHA12f6056686a753c308a6633e339d894a3f4fa06c5
SHA256f1c2985ea5f03bdc0bc60297269c9c2c72fdf8a2db4ad76e2f5181f9caeea3c5
SHA512d9e51f8c78ba25bc3a6a11482501ef717a4d89ba0bc53b209747b15cbdfb21e1b907c231fb07af24623bbda1ea9a82653efdda67d3fe3625490628d571dff0ff
-
Filesize
93KB
MD52432ed63a254bbb1fd4e70aa518d12e9
SHA1007b452e523036014a72ac40c97b21620735c4b0
SHA256e1ab2808670fa21ace636deb2dd330c5b0e50875ef2012efc88a3fb19bbbc0a5
SHA5129f869e45076220e60a10589ae4da2c8d5f128cf9c41e2f1c2590b4b37d73e0de9fcb8e17efc6b87aed02f7aa0870a47cfb6c9815f8ae8bd582725bee53d59785
-
Filesize
319KB
MD50b31b326131bbbd444a76bc37fe708fd
SHA12c71c646a257b7749b8a055744112056b92d4ff2
SHA256491b5dd65f81070616fab1c5513842e8d2405b3bbb44ab0c8fb5b3e26bbe017f
SHA5120eb8c8e08fd46dc2ca6b87fa7393c2f2bdd25289529a69beedefa443a44f8067fdec9f1b2bf4257de6e16750dadc0f10729a86db23cd00f9fbeda58d5a43c75e
-
Filesize
519KB
MD5dd42c37a7f8addf21748938e1061ef22
SHA19efde51f3ef4afcf3024e92d58c4db17a3af0098
SHA2569fc5cb0aa7a58c35da24e189e835a6e823821b91276b6d7fae19bbb35c2683cc
SHA5128a92ffb478c2f2cfe41345866a3c07d20da1ff01951e214b8fece450b0ccaaaef5d6dcf5e263930aa2428bda8e476458449b24effa8d87ac574ddd3504b45cdf
-
Filesize
521KB
MD5e0e701b7ad9095d29033b3405a9b8b75
SHA1668f66214b48b6cb9d62e52a688155a9fdf5957b
SHA256df6b5aab575eb2bc61da068d54d9381176ff0cce67d66a361f7841af5b971190
SHA512301798ee62e42c43d97c558b4fd7321bddef7865964202417431894f5e511f6121da66e79d4cf231f5233bdf382e79d8e4a25754b369db8601a3a511c6a52831
-
Filesize
2.0MB
MD511b14664d4ddaf503d3884d5dbd38c52
SHA18b77eb7de0e85a6d38dffebff32fdf0f522c6cea
SHA2566a8e9a03eed774785d9323fa30f5b8148c307e125a5e24578bf2235e1543aec3
SHA512bb288115b75357f0499ea101866af60feacf39072d9d27b09345e400b4ca1cd6836a6c15db0099df0fb47a8016fd4cbdfb3f0f38979f3e32275530875c472825
-
Filesize
578KB
MD510fd4737cab298ced243e6df080b59fe
SHA144a340a1371e53131664f1fdff0a92e2d2d89c60
SHA2565f4c8b89ba5f4c21ac613850414a3f3694c0bad97f7d28d2161d44a21a384969
SHA5120558cc67d8c3312e3d815bb03995503a255d8849647973e47c861e04b981c83e5967e122080c7ee6706eb3248038dedf009b9314c48fed3b786fac54317e5de9
-
Filesize
1.8MB
MD5ebaaf6a5b67fcb6d193be048b17a6640
SHA16af5de7b03ea0712ad4d40dbcf650513a96facd3
SHA256216e386907949df0bf935cbfa48a4eda9207fd039eac41f50d408d494a2dadc8
SHA512e8007ca4b28df8747af4f7cfe46ccc867ba6ba1f4e88be1d9e0bd1d7e7c55c9c6b0f70d757c3dcce836911e6b0a5e6bc82854cd02936d71185e7e0cde30e7a20
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
367KB
MD5a93e02b4885d0b7653708281a5bb8e4d
SHA178e89c25d8ae91aa9574b2918d12603ddb060df5
SHA2564800f7240b384112ba6faba1fe307a9fed51929ea668a1c422cb1d5d604a9d6e
SHA512fa688798d051813ecf79ae68882bcbd738d727fb8dcfeac54c504723ce41230419a92d0803f29c239d087143e6e41a7fe1cc1e338b1809758a67626483acbdb8
-
Filesize
587KB
MD5a5b896c9597d9fc016b199ae61e900b5
SHA1e26325364cb64ab2e46d8b6292c4af09275547dc
SHA2568bbf3092576dea8b7d01dc10ac43bf0df4ecf0dd71cd21b7ff8c8ac5a14cc6ce
SHA5122f53f9215d411b2f1edcee5d22645f3d723709ebd9d274dcdc2104b47240728fc4790e6fa6a5719592cd3c65097824be40a6a17a13da7badf442fd9e53c6281d
-
Filesize
631KB
MD5a6b572db00b94224d6637341961654cb
SHA19f0dbcce0496fede379ce4ecbfc2aa2afbb8ee8c
SHA25691ef165ad61d09dfda345f827b8ff78a18a3e40d8e12454cdb494d1555af7656
SHA51239ad03d8645a3a90b770b4fe05c43c2dadfc8b80277688ec01597bc0cda6b3fafe9e158f72ebc7db4ce98605f44fe3eacda6573f9e32e01bda0ad66efc17274c
-
Filesize
299KB
MD58955b060331852314cb0152a864d2175
SHA13ec4d341c4cd3d6cde93ea062baa433e278b0899
SHA256cf367691afcc94313b34c7c947498dba74f4b094735ac440b17293bedd7e08ec
SHA51261f2c6b74d9b37dd44f92a0db3e08662941ae7a3ce4e4a6171eff099a6490772a7c3e7c18f97fafd90720aebe93a1ad079f1b054f1818d7c623dc559cf128f62
-
Filesize
40KB
MD543a7208f4221b78b0cc4f63b6f689e06
SHA16a64537894e58d618073ba444e444d5aea3affd7
SHA256734e916a2d95d71529f598fb0c7577308111de601a6189a44cf2f5d6f1e237f7
SHA512b292e0f0210cd9cb85287bfb5a1d822459d07d1bc50f1babfe334de37ae73e87abd89da086886e51dd29bdd5c8105164a40e86865451e8da0c0d57d7febdc17d
-
Filesize
382KB
MD5063fd55ef0dbf30861c6bc8c9626ef8d
SHA15c6aee3705576adffba82b44d7f5f6dc77e1b14f
SHA256daee32fa8bc597aff99fbb53e48f13bce5a5cddf28126bb2561f6a91cfd267e5
SHA512a6a9a0ea6ab04c6a111ab6d1f2f848487e5bc0f4ab846e01e19608379c9d6373ad617882d95ce1805039f53a8d826ca11e5c7c734839d10ea10aed768ce7319a
-
Filesize
12KB
MD52339cac08eb404b9df030fbb32824fdc
SHA1d4c7fc0ae02d0da66fda0cbcb3aaf90db956a24f
SHA256808febfbc2c3974dfab94b2e5ca53614935dd084f6fbee4acb2d5cf2f85362cd
SHA51241d53996ab5515acbd75684bc43323dfabb2764449b274ff5a8e9b83e23f35bd572f239fe28c203413a55158031ae5a45819d071c2d5ddb37f3935007db0124a
-
Filesize
8KB
MD55b8639f453da7c204942d918b40181de
SHA12daed225238a9b1fe2359133e6d8e7e85e7d6995
SHA256d9008ee980c17de8330444223b212f1b6a441f217753471c76f5f6ed5857a7d6
SHA512cc517e18a5da375832890e61d30553c30e662426837b3e64328c529c594c5721d782f2b5fe2aa809dcd01621176845b61f9e9ba21ce12234a75872391d313205
-
Filesize
381KB
MD558c203a58312c6121c932e9a59079064
SHA1f57f41180fbe8e5dffafef79ea88f707c5cb748a
SHA2563555826df75751600d127b343a3214a0f9b4c211b1fdcdf9ccceb1dda6be5f27
SHA512e141e9da04e6ba43d639c729d83fd9773bda1c51759dda84f59f27a017a5809e47e4ddaa5a2c8be92ef81ca58fabe06faeca37252a7b4ab64d18679fc5e8e406
-
Filesize
161KB
MD5e774ecd7cbe47825a683fecaf4c4f7e8
SHA1f985fd04a7f1e86fce2d9c6e084b3cfb730d7f19
SHA256543cd7bcc19823cfdcb3a29c4cb006c75e81f683bf010f4c576b7da02a947c6b
SHA5128eb2dc42ebbf0819f08458ebd039e38b2344d08ac9112d8cd2dd1880b53a34a1aa66f17a465cf75e563fc903fe54b8495ece390053a9d9d9fb60d612ad65efb5
-
Filesize
56KB
MD53263859df4866bf393d46f06f331a08f
SHA15b4665de13c9727a502f4d11afb800b075929d6c
SHA2569dcacda3913e30cafd92c909648b5bffde14b8e39e6adbfb15628006c0d4d3c2
SHA51258205110a017f5d73dd131fefb1e3bbbcc670ed0c645aeefebe5281579c7b1dceffa56671cd7b186554bdb81710e21018ed0d7088a27517dfc5e48d6d3578cf6
-
Filesize
606KB
MD5e3cb572f35fce37c528520e199e0ed74
SHA1ca65eccb768af853cb9bb22f9a6d97baf48b35ae
SHA256ccde8773415fb69b22d0841b592a74c49e4ccf90bb203e3510d521a4137d4fd0
SHA5125dc1542d8b2684b8f26d592a3b9514507dbac782668ca98f8abf18cd9222d85029d024e550502b6b1a7e7c68211768be0c573ddb2428082695af4b2215c57a98
-
Filesize
51KB
MD5c4e701058429afb5639861fc8bd4462e
SHA13e750af4f0cd325ee3dde1ffe456591105496fef
SHA2569cfff4c95759854b025d7ddac3b964515c243bebf8263bbe616473780b2b1cb3
SHA512de0993fce7fa482405891de3084e5f7a75094a97c770713d951bf46daa8211b134f3c1648469a2f512e9c5690262371cce88e20bef82d35905800cb882d173ec
-
Filesize
491KB
MD518a507aaa9d688a829771e3af4031d40
SHA16861197d6b94069d0e9ebf4f6f8a696ed130f171
SHA256e6da6e64862d3fdc24e5f5c7801c62e89aa4c3fc2f2513819f4103d211621cbb
SHA512833ffa500e4aee89f54e88066a28eb3af198fef056ebd7af08abaf6e848a58a68f9608e3459751c1f83f7a93a52bb55dd7382483f6ebeb0fcb1ef40e1e6f6471
-
Filesize
655KB
MD5da4e3e9ae2be8837db231d73e1e786b3
SHA1ef3f564a1d383f0b2a414d28e1306a07d0ba48e4
SHA25671d23587d979836b040040aea184367566eb878d4f76ccb001e85adb6e050647
SHA512df8dfd65526a1b2c08d8b3eca0e15c31960118fbc0354e80b75aa2d56bad998ecefb55ada3daa6c22ef7f5be5f09a19311d7d08534ba37bcc1780b03a0a49a04
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
654KB
MD50cb6541fa7340b2550f0c1c5cede8dee
SHA1e3f5994fe7d712919daafb5368253ecb1997b707
SHA25634c788ba04c74989f1ffb14bdf10276df6471929dca894defefa421150545290
SHA512a11f90268c356431961a7ffb40a113c2dfda94a70cdc16325194947c05dae96c954d026f6e05cad3283b2b30f9758c00958bd6152ef13505aa5a2ef83853d8ce
-
Filesize
1.9MB
MD5661ae109b93487fb7c36f92a86133581
SHA134f3b82e49330b36649f23404721e6ddf706e414
SHA25626903d3375bbac69f109f52e2200799276ac56d355388458cf10fc97e32e01d5
SHA5124435641e2e2cd40c7003e688ee31e7c6f2003bc2c999071816481cadadcf9393d949df1fe8f64136baa83756bf60c41a390359c97770eec96597a837ca541f5a
-
Filesize
1.5MB
MD5afdfd223554c588e53df4a16bc1a12fa
SHA19437b9f9645c6fc9d48938174cbaacf666c25655
SHA256a4589fc84743c7cab2ae4a432eedebc2389c1b45567112f97ab376797ab2e58d
SHA512d9c43ef6028d4ee5976f31a84e842f2197653edc985d2eef246a0e603db440b479040dad0794a7892952955c8537e5a0b3c0545b70c30008545321ca8af1bea1
-
Filesize
1.6MB
MD5a147a3bd9f9454b61516bb3864ed406a
SHA13d771fb7f3233ca45b3c3beac5c9680e180d61ab
SHA256d5ad1442013f959e149da244824b14d56b11146641c4a1243c9218eb3d61f861
SHA512e4deb52b9b1a177fe7cc7d14e2ca8c60a79b54dd681aa843d6726cf44e3f8e8f9602225f7ff1b3643508feb2ce9bc2c6059bc8fe7f87f835ce124148ba99cde6
-
Filesize
1.5MB
MD51af58c990b10517c21c621efb188dabd
SHA15828d0e91f97f85f9524bf5f388a3c7cf33044d8
SHA2567d405f63972e09d6c5d96ea4de7d4cdc7447a7440933bbafa6f18a11d7defa26
SHA5129dc983f553663cd32a9df2b3ae76735713cc02c8aa6ba7b9202b9515b2bee072cf56b6fa74bcca02c924601fe01bf52af8729564297e9e73f54e88ac92129b16
-
Filesize
1.4MB
MD501eacf3f92867a4afa051f5a82cb25e7
SHA1f1aa8cb87fdec70d3e7f1b2b80b4af739016b0d8
SHA25632c16a50a152185d587d1cf7be0ea7ea47fcdeefaa703176a6817fdabc79438a
SHA512b388324b1aa77cd5751b2761e1f5430f9cd95f7f15ff2b3b4069d54edc0273ca2ef52e7e9c1950cffcb7cbaa596d9110dea9e0074fb08e5c926c6bf1a7e470e6
-
Filesize
513KB
MD5cf3d30a64f80c4453fe89fe6f9670296
SHA16aaf2fadd64b6d2bf4bd2e7bd5a86d3e44954f78
SHA2568e5c771ccdefb276959da508a7ae4b0c1f12e426eee0f8bfd615dc19fd081cc2
SHA512babe144becd0f0339850e39441bad79420fa15129055735257ab9a329477863740d459d6dfb7b132aa7e79ef2605f7313a79d728eea411b61e08ff019eedf404