Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
ca15de24c3fa60e90b343b7376808d1c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca15de24c3fa60e90b343b7376808d1c.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
setup_installer.exe
Resource
win10v2004-20231215-en
General
-
Target
setup_installer.exe
-
Size
4.2MB
-
MD5
baf330c66dc494f59980816acd04c9da
-
SHA1
7f394f6664318aae1e8b351ee8f6952957bd957c
-
SHA256
8ba4bd3b729779ced975109d4c7c427baf7ab6b011bf9ac1c0ea0419c102bb60
-
SHA512
1dccc6560b5b5a2a921501a3fe115fa7338bc7d354bce2292f2326d02fa7fcbf85c01d6143d1d857920f3573de4d8fe375fc5afd4bdefcd2c26224109c0d667e
-
SSDEEP
98304:xcCvLUBsgrye6P8kqRj0FZp4zwkVyEXnXOb+6V:xBLUCgry5P8zRwFZez7BubP
Malware Config
Extracted
nullmixer
http://watira.xyz/
Extracted
redline
pab3
185.215.113.15:61506
Extracted
smokeloader
pub5
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
cryptbot
knudqw18.top
morzku01.top
-
payload_url
http://saryek01.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 6 IoCs
resource yara_rule behavioral3/memory/588-376-0x0000000003D50000-0x0000000003DF3000-memory.dmp family_cryptbot behavioral3/memory/588-378-0x0000000003D50000-0x0000000003DF3000-memory.dmp family_cryptbot behavioral3/memory/588-379-0x0000000003D50000-0x0000000003DF3000-memory.dmp family_cryptbot behavioral3/memory/588-377-0x0000000003D50000-0x0000000003DF3000-memory.dmp family_cryptbot behavioral3/memory/588-394-0x0000000003D50000-0x0000000003DF3000-memory.dmp family_cryptbot behavioral3/memory/588-639-0x0000000003D50000-0x0000000003DF3000-memory.dmp family_cryptbot -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral3/memory/2984-143-0x0000000002E70000-0x0000000002E92000-memory.dmp family_redline behavioral3/memory/2984-146-0x0000000004EB0000-0x0000000004ED0000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral3/memory/2984-143-0x0000000002E70000-0x0000000002E92000-memory.dmp family_sectoprat behavioral3/memory/2984-146-0x0000000004EB0000-0x0000000004ED0000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 3 IoCs
resource yara_rule behavioral3/memory/2680-157-0x0000000000250000-0x00000000002ED000-memory.dmp family_vidar behavioral3/memory/2680-178-0x0000000000400000-0x0000000002D1A000-memory.dmp family_vidar behavioral3/memory/2680-373-0x0000000000400000-0x0000000002D1A000-memory.dmp family_vidar -
resource yara_rule behavioral3/files/0x000c000000014b27-47.dat aspack_v212_v242 behavioral3/files/0x002e00000001508a-46.dat aspack_v212_v242 behavioral3/files/0x0007000000015ca6-54.dat aspack_v212_v242 behavioral3/files/0x0007000000015ca6-53.dat aspack_v212_v242 -
Executes dropped EXE 13 IoCs
pid Process 2552 setup_install.exe 2896 Mon20dfbf5709ab4.exe 2884 Mon206987d94f0ed4.exe 2984 Mon207fb86dc43e314.exe 1780 Mon200e0fb06f0e4eb.exe 2668 Mon206987d94f0ed4.exe 3012 Mon20261d41513882.exe 1960 Mon2010d77a08c41abda.exe 1704 Mon204f125a31b.exe 2680 Mon20ea2d1a99fe5.exe 2084 Mon20f645bba5.exe 1056 Talune.exe.com 588 Talune.exe.com -
Loads dropped DLL 52 IoCs
pid Process 1728 setup_installer.exe 1728 setup_installer.exe 1728 setup_installer.exe 2552 setup_install.exe 2552 setup_install.exe 2552 setup_install.exe 2552 setup_install.exe 2552 setup_install.exe 2552 setup_install.exe 2552 setup_install.exe 2552 setup_install.exe 1800 cmd.exe 1800 cmd.exe 3064 cmd.exe 1820 cmd.exe 1820 cmd.exe 2860 cmd.exe 2884 Mon206987d94f0ed4.exe 2884 Mon206987d94f0ed4.exe 2872 cmd.exe 2532 cmd.exe 2884 Mon206987d94f0ed4.exe 2984 Mon207fb86dc43e314.exe 2984 Mon207fb86dc43e314.exe 1780 Mon200e0fb06f0e4eb.exe 1780 Mon200e0fb06f0e4eb.exe 3016 cmd.exe 3016 cmd.exe 1960 Mon2010d77a08c41abda.exe 1960 Mon2010d77a08c41abda.exe 2308 cmd.exe 2308 cmd.exe 2680 Mon20ea2d1a99fe5.exe 2680 Mon20ea2d1a99fe5.exe 900 cmd.exe 2084 Mon20f645bba5.exe 2084 Mon20f645bba5.exe 2668 Mon206987d94f0ed4.exe 2668 Mon206987d94f0ed4.exe 324 cmd.exe 1056 Talune.exe.com 2776 WerFault.exe 2776 WerFault.exe 2776 WerFault.exe 2776 WerFault.exe 1712 WerFault.exe 1712 WerFault.exe 1712 WerFault.exe 1712 WerFault.exe 1712 WerFault.exe 1712 WerFault.exe 1712 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Mon200e0fb06f0e4eb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 13 iplogger.org 15 iplogger.org 27 iplogger.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2776 2552 WerFault.exe 28 1712 2680 WerFault.exe 50 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon2010d77a08c41abda.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon2010d77a08c41abda.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon2010d77a08c41abda.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Talune.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Talune.exe.com -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Mon20ea2d1a99fe5.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Mon20ea2d1a99fe5.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Mon20261d41513882.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Mon20261d41513882.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Mon20261d41513882.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 Mon20261d41513882.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Mon20ea2d1a99fe5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Mon20261d41513882.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Mon20261d41513882.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 576 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1960 Mon2010d77a08c41abda.exe 1960 Mon2010d77a08c41abda.exe 3040 powershell.exe 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1960 Mon2010d77a08c41abda.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3040 powershell.exe Token: SeDebugPrivilege 1704 Mon204f125a31b.exe Token: SeDebugPrivilege 3012 Mon20261d41513882.exe Token: SeDebugPrivilege 2984 Mon207fb86dc43e314.exe Token: SeShutdownPrivilege 1212 Process not Found -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 1056 Talune.exe.com 1056 Talune.exe.com 1056 Talune.exe.com 588 Talune.exe.com 588 Talune.exe.com 588 Talune.exe.com 588 Talune.exe.com 588 Talune.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1056 Talune.exe.com 1056 Talune.exe.com 1056 Talune.exe.com 588 Talune.exe.com 588 Talune.exe.com 588 Talune.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2552 1728 setup_installer.exe 28 PID 1728 wrote to memory of 2552 1728 setup_installer.exe 28 PID 1728 wrote to memory of 2552 1728 setup_installer.exe 28 PID 1728 wrote to memory of 2552 1728 setup_installer.exe 28 PID 1728 wrote to memory of 2552 1728 setup_installer.exe 28 PID 1728 wrote to memory of 2552 1728 setup_installer.exe 28 PID 1728 wrote to memory of 2552 1728 setup_installer.exe 28 PID 2552 wrote to memory of 2520 2552 setup_install.exe 30 PID 2552 wrote to memory of 2520 2552 setup_install.exe 30 PID 2552 wrote to memory of 2520 2552 setup_install.exe 30 PID 2552 wrote to memory of 2520 2552 setup_install.exe 30 PID 2552 wrote to memory of 2520 2552 setup_install.exe 30 PID 2552 wrote to memory of 2520 2552 setup_install.exe 30 PID 2552 wrote to memory of 2520 2552 setup_install.exe 30 PID 2552 wrote to memory of 1800 2552 setup_install.exe 31 PID 2552 wrote to memory of 1800 2552 setup_install.exe 31 PID 2552 wrote to memory of 1800 2552 setup_install.exe 31 PID 2552 wrote to memory of 1800 2552 setup_install.exe 31 PID 2552 wrote to memory of 1800 2552 setup_install.exe 31 PID 2552 wrote to memory of 1800 2552 setup_install.exe 31 PID 2552 wrote to memory of 1800 2552 setup_install.exe 31 PID 2552 wrote to memory of 3016 2552 setup_install.exe 32 PID 2552 wrote to memory of 3016 2552 setup_install.exe 32 PID 2552 wrote to memory of 3016 2552 setup_install.exe 32 PID 2552 wrote to memory of 3016 2552 setup_install.exe 32 PID 2552 wrote to memory of 3016 2552 setup_install.exe 32 PID 2552 wrote to memory of 3016 2552 setup_install.exe 32 PID 2552 wrote to memory of 3016 2552 setup_install.exe 32 PID 2552 wrote to memory of 3064 2552 setup_install.exe 33 PID 2552 wrote to memory of 3064 2552 setup_install.exe 33 PID 2552 wrote to memory of 3064 2552 setup_install.exe 33 PID 2552 wrote to memory of 3064 2552 setup_install.exe 33 PID 2552 wrote to memory of 3064 2552 setup_install.exe 33 PID 2552 wrote to memory of 3064 2552 setup_install.exe 33 PID 2552 wrote to memory of 3064 2552 setup_install.exe 33 PID 2552 wrote to memory of 2308 2552 setup_install.exe 34 PID 2552 wrote to memory of 2308 2552 setup_install.exe 34 PID 2552 wrote to memory of 2308 2552 setup_install.exe 34 PID 2552 wrote to memory of 2308 2552 setup_install.exe 34 PID 2552 wrote to memory of 2308 2552 setup_install.exe 34 PID 2552 wrote to memory of 2308 2552 setup_install.exe 34 PID 2552 wrote to memory of 2308 2552 setup_install.exe 34 PID 2552 wrote to memory of 1820 2552 setup_install.exe 35 PID 2552 wrote to memory of 1820 2552 setup_install.exe 35 PID 2552 wrote to memory of 1820 2552 setup_install.exe 35 PID 2552 wrote to memory of 1820 2552 setup_install.exe 35 PID 2552 wrote to memory of 1820 2552 setup_install.exe 35 PID 2552 wrote to memory of 1820 2552 setup_install.exe 35 PID 2552 wrote to memory of 1820 2552 setup_install.exe 35 PID 2552 wrote to memory of 900 2552 setup_install.exe 36 PID 2552 wrote to memory of 900 2552 setup_install.exe 36 PID 2552 wrote to memory of 900 2552 setup_install.exe 36 PID 2552 wrote to memory of 900 2552 setup_install.exe 36 PID 2552 wrote to memory of 900 2552 setup_install.exe 36 PID 2552 wrote to memory of 900 2552 setup_install.exe 36 PID 2552 wrote to memory of 900 2552 setup_install.exe 36 PID 2552 wrote to memory of 2860 2552 setup_install.exe 37 PID 2552 wrote to memory of 2860 2552 setup_install.exe 37 PID 2552 wrote to memory of 2860 2552 setup_install.exe 37 PID 2552 wrote to memory of 2860 2552 setup_install.exe 37 PID 2552 wrote to memory of 2860 2552 setup_install.exe 37 PID 2552 wrote to memory of 2860 2552 setup_install.exe 37 PID 2552 wrote to memory of 2860 2552 setup_install.exe 37 PID 2552 wrote to memory of 2872 2552 setup_install.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\7zS0C685536\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0C685536\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵PID:2520
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon206987d94f0ed4.exe3⤵
- Loads dropped DLL
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\7zS0C685536\Mon206987d94f0ed4.exeMon206987d94f0ed4.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\7zS0C685536\Mon206987d94f0ed4.exe"C:\Users\Admin\AppData\Local\Temp\7zS0C685536\Mon206987d94f0ed4.exe" -a5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2668
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon2010d77a08c41abda.exe3⤵
- Loads dropped DLL
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\7zS0C685536\Mon2010d77a08c41abda.exeMon2010d77a08c41abda.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20dfbf5709ab4.exe3⤵
- Loads dropped DLL
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\7zS0C685536\Mon20dfbf5709ab4.exeMon20dfbf5709ab4.exe4⤵
- Executes dropped EXE
PID:2896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20ea2d1a99fe5.exe3⤵
- Loads dropped DLL
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\7zS0C685536\Mon20ea2d1a99fe5.exeMon20ea2d1a99fe5.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 9485⤵
- Loads dropped DLL
- Program crash
PID:1712
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon207fb86dc43e314.exe3⤵
- Loads dropped DLL
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\7zS0C685536\Mon207fb86dc43e314.exeMon207fb86dc43e314.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20f645bba5.exe3⤵
- Loads dropped DLL
PID:900 -
C:\Users\Admin\AppData\Local\Temp\7zS0C685536\Mon20f645bba5.exeMon20f645bba5.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20261d41513882.exe3⤵
- Loads dropped DLL
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\7zS0C685536\Mon20261d41513882.exeMon20261d41513882.exe4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon200e0fb06f0e4eb.exe3⤵
- Loads dropped DLL
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\7zS0C685536\Mon200e0fb06f0e4eb.exeMon200e0fb06f0e4eb.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1780 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe5⤵PID:2164
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Conservava.xlam5⤵PID:2428
-
C:\Windows\SysWOW64\cmd.execmd6⤵
- Loads dropped DLL
PID:324 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^aXXPLdOdpKvHEwwcALYIInWmgGDtBFsVVodqfjpjFmFfheNjFpLslXxTwbAyMJPDzALcKwugCMepSGkjSsms$" Suoi.xlam7⤵PID:812
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talune.exe.comTalune.exe.com K7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talune.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talune.exe.com K8⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:588
-
-
-
C:\Windows\SysWOW64\PING.EXEping IZKCKOTP -n 307⤵
- Runs ping.exe
PID:576
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon204f125a31b.exe3⤵
- Loads dropped DLL
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\7zS0C685536\Mon204f125a31b.exeMon204f125a31b.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 4323⤵
- Loads dropped DLL
- Program crash
PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c0ba26ba4b1a70ed63f87a1c44dec030
SHA1bf04cdde6688e0e1b613eef91f638b382f028479
SHA256491c2940c255da0da807393a3fb539d1b7c6d628bcef2cbfcfe942c38b97cb5e
SHA5127820322f2cb3cb39fc11084445f4ac4fd2d076f192841944936510e57407f37a735cdb0753ff5ee7218526ad3eab562d7f3b50220f6ea9499441837d0a6c1988
-
Filesize
372KB
MD54428f832a4c0ee728ce5f7f541a7e020
SHA14742296989e70a740b16294ef836bd41f17ea28a
SHA256db8e302aad96119cafe7a7f9006ea6c9031907cc0911d42b901d6c66bb366e94
SHA51215d30e654bc5f05fbcdcd082acedb6ea14d16aa9ba915689c1f735e88f7ebfa6f064a031c0eebde34a89b3f8439b2cbfa2d70c3e5f82a65eb486ad4b20670473
-
Filesize
416KB
MD56387e3fca21c0a1d813ecd4e5f6ea0f5
SHA1975a0eaaa30fe45b08e9ecdc5b681bff153b4bcb
SHA25681304188a5265b0f0268609f5da58e1379cec4fef8ef4d73b87b0695e68de12b
SHA5123c2307ba0e271d064d67087c71bff5545028a79088a7fafccafadefd3b090ed67b90cf6b2c8d4b6ea8594a64b28f48abac94cf19672b9309040cf13e1a8655c1
-
Filesize
121KB
MD5e5b616672f1330a71f7b32b7ca81480a
SHA1ea053fb53f2162c4d47113673d822165289f09cb
SHA256f71479eca4d5d976aaba365a6f999729d579c538c10c39808b6490ba770cd472
SHA512d840a1a66e6ec89a69a9a99e6477ce2afd1a7d1d4800357a84b1a82e8d2d856ed3c02e62eeae002a6ee7eb932593b5dd8b122da2e17ac6a7915f4603292e3318
-
Filesize
8KB
MD5ce3a49b916b81a7d349c0f8c9f283d34
SHA1a04ea42670fcf09fffbf7f4d4ac9c8e3edfc8cf4
SHA2569a1f1a9f448d94c8954b8004a4ff3e8405f8b18139f95d04f8d9b40c483e1b40
SHA512e7e0150f3c79300c4e11ca391de9553440846c4b9594b49d8854769a347deb4ba10d5f7d3e7684e3a942ff15b61484910adc12014495adef68eaeb98f887ed80
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
267KB
MD51af7e442b0332b23ab642521d0e13696
SHA193bc8369bd2ecd549482025c835ecf40a65059f5
SHA256acfbb8a6677646a8fff17ba79836abd029609c37cea2e4cd2abe384dd3d8b3bf
SHA512bf771f4c0d6690726ce9dbfe4653e55322046a89e21ec6b49ac1acfe9c7bbf745de82b6862424321f8430940f6fafa0c0716079dd9a23148aea567ee80ae28c1
-
Filesize
241KB
MD55866ab1fae31526ed81bfbdf95220190
SHA175a5e08b3b9ad2dff35dfbbb3ffe8d983c2be25f
SHA2569e1a149370efe9814bf2cbd87acfcfa410d1769efd86a9722da4373d6716d22e
SHA5128d99ab09e84e4ef309da34be94946cbfcffeb1c0ca49e2452deb738d801e551062ebb134f1b99a9baf03003a8e720d525521ce09aeac341d3cba3fcfbc618fb5
-
Filesize
29KB
MD551d8dfa887edf8ad18af5da17407cb20
SHA1cd60f64cfda02e690aadc45f6f36099db73d4df9
SHA25652674bfcb785d1ef46673cbbac7f30195edd9c1f2ee110c1b2b74ad323d7949f
SHA512cdd851a1cf063568d62229b0ea8ac66362f58c98128bd292752aadf643cc103b90626b3ac46cc3fa970d86e96db82e3335aa531c16b88da067d00e1d688898a8
-
Filesize
304KB
MD5feb2cb27cb5aba8088b94c4cc14564ef
SHA1e0e3fc40534e010d933cca2441f88081aa2e4d51
SHA2560404645cf10c370eff657cbab822bf321d5a934b38b05be4aa5fdfb5bb407d75
SHA5125159471fa863f58d3ec416292af87ce8fbc68773fd2ed4e9636056b5ed10fd1b548c28fef1352eb5d7e1ffc4de104229ea8d40d7b8291594890fcb944b62fb07
-
Filesize
9KB
MD572d0d2ebb80d807722ae4c2c9200a9bc
SHA17264c931c1b19153be4294159021136de662d91a
SHA256f739732fc8cd56a99794315c250b5c029effd69ec74635e65601378e08afe1e2
SHA512b11265cde0463fcf4cd2eaa2a6ab50c803726ef81af86223bf00ceeae8316691cab84f3d35f6b95942b35dd4ad851c53626fb519d44d2c9d57422d7e30cbbfeb
-
Filesize
201KB
MD5e63963ee3993578ce314ab0fee5971f3
SHA1468fee9249170a43ddab98d21c07d11533fe67c2
SHA256f9fd36733ef01436ced95c5dd57f5b7d8555adedbd8f6f6b6662515726b8396a
SHA5120dc924b07972c0899e5ae5a27389530d7c811b52a5c6a23c7198e8077636067d66d4d24c7d27703bcf7ad2b3e4d6eef89a29e9a5fededf3418cf754997fc3852
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
355KB
MD54107820c5a20978abc93b164d412ae72
SHA159f904e54fdde1bbb2043a3f099c7d8e2874faa5
SHA2569e34f1168f6a201bb8860645c345f7c355a4ac822fd3e2c75b7785137fd127a8
SHA512b794c69d4c8031ecd3da1b9492c80fe1b457103c5454e37a91d19806bc7249dc9606d4fe28c5b114c6dee205f8fdb696a83f719f622edcf612ac669964f4e154
-
Filesize
918KB
MD5f4e0d6a6e1b64c0d24c0244596f029ee
SHA1561eed20b968f763f408d5df54034770f1d40bf8
SHA25637397594fce03199ab1803951dcd0b08d04dcaa0f37bfff62edfb4311ee0729a
SHA512f1ec474aed1c72283d7a058e51b2fa5554b961f7d80a724344f385b5322903e262662518289d701e9268c4232f3e28f2aa96df8bc55e323534aea349840a9948
-
Filesize
446KB
MD52396968595b75a9675a03b5099fbe60f
SHA18a203f19b50d26c17718f729024476f5930cdba7
SHA25650c4223607682a00c49289872f0068aa3331814c6273a9ab17fee0a8e456ebe6
SHA512fcd3ed0bd08b62d42fb321752a510b51a13a2fd1ef87467dd08d209907d1e70855fa832cfac12e7c129980f329c7879bcc88fd46f9b800e32fd3942748711e23
-
Filesize
383KB
MD593f5b14f9c6778c9612c67e3f883e111
SHA1051242aad679d95580e84d7c77c9c759fa0fae30
SHA2562c6e729e02ce93852150e98d62608ee692e931a4bafeb96793da4b95934fca2c
SHA512eddf04a00493e254bd9ef49444a9774016e7474bbf4f52d7df77de55cd957a08b04e2311369c09d6495a37eda3aa73f353e73ea25faa519ece2109c6cf4f0cbe
-
Filesize
48KB
MD565f8cb919e155687f8d20eba20950b58
SHA1c03b0c975f7a2fd415bf4ea4ccb4476a1efa6d83
SHA256893173a88b866e852daa6cdf6fd0ca2c698abe0ef4f6f6e4dc321a77f02eabec
SHA5129cae88a5e2bade60a8cf907032a990b21b5e1f775e30806adc7085d17b1d034ac511f667b22aa30a54a8fbe11e9170c3eadb6911e3608a4babc0f6cad38639ad
-
Filesize
1KB
MD5bd06c1bb9a89f6100d607b98a345658c
SHA1a4f8ca4df06d41c83c2a0de89f4760d41e46966d
SHA25657f3b64d1a8bf39ea0fe3224076902d97267681182a8097e2a861ad0d1a67d07
SHA512c20be451b6b0d8ecf48fb8c423598dc856b883fa00e5f3c2740d6a6a766a002b98dbf67aa91df5536d7c5597c5109dbfc7efcdebd6be1cc4d4d7412991fcd9e9
-
Filesize
1KB
MD5e850dc4e63c799515dbf47a36303f76c
SHA18c315957301bd1018dec164aae1981fa27aa509e
SHA256c2c912e902bf9fec0d858ced82569cd0548a14406ce2fe8616674d73d68fc36a
SHA5127a64c916b08ff8fd82da2d59af45d150fddf0cfb4c312bb5e329bdf5ac2b357b1446620929d8ab785a3ea45d32a792f53f89724188a3f080f6dee8c341d542c0
-
Filesize
3KB
MD53eafc05972529b55019b215cdedde710
SHA1ec0c88ba6d6732a97624c58ba5c3f354bfda55b2
SHA25669ea097cbdffdc7e9c4d449c4a22cc56bee053e4ee01443e1d7ccbf6f95155dd
SHA512c383eaaf5693ab26989476b310bb34089103484285bc230788f014fa441ba0820e4237bceed0e3233d0b9063cbca15f0d968b60212ab86b7cd8e61bf3baae033
-
Filesize
3KB
MD56b8df884d538b77c8fb463eefa0b7822
SHA15770a27d6ab4a4bb572f8d04c131141638042c01
SHA256b6fbddb37f32faeee405e5926701384c96749fac536dae44363abcbd49a76af8
SHA51235f5e4e29f6e85a6ad7940225d1908044b02f46992e945e85b3dd67a6a0b422263cd880bccbcf43ff4abd8f2b107442b2cdb11ad2110c221b540bb1fabcbfc4a
-
Filesize
4KB
MD52a8239842a54fd1322a65cb71406d95b
SHA1dd9fef2f41cf963660b5772b0ecd5f4bf6e1135e
SHA256e04200309c125fd7ffa83e705f20e4cc7a4643230c955d272d6ece535c6074bf
SHA512279b49752160216c0c05daab8a732b472217820a84b34d8f14d7e890a6a131a48cfff5f9919b8785db663dab88bd013ba29f796556f83a861f86bb1a10ade246
-
Filesize
56KB
MD569bcafaec21a407e397f0ac50a1235b8
SHA1f60836e8ae285e8aee3fa9ab9f67752d086fee74
SHA2567fd3be884527ed5c49427c6b06f5bede9a5924ec9680ad3fba38174933b0ecb0
SHA5128f50c79b90e819896435e5af75abb29c9cdb8ae847e291f994d65d3a5c5708c3281ca924888de3b0d6d3107742895df54fbf8a84c3d4add3e5b068008268c45f
-
Filesize
1KB
MD58968486f37ee0620ff093ad91f8eea8a
SHA164e62bbb0d8258c71634e9d09c02f257bf8873a8
SHA25690f3b7b2703cc0bd90e9fe6a2565ed8514e8aa1a8e5fb7a554358f657419da01
SHA512552b1423eef2aa051270cb6b73debf3bb5d3800503279e3dcd0d804e002c5fb0bc49d48195fed9ac8354320bc2b640a5383f7c829a4c558983b669805274b401
-
Filesize
2KB
MD5d2b73b04d1e426c10f710ed4ee584802
SHA17b25bb61217a28d6c59bee784555176e71753dfb
SHA2566e3fcc26d8d924d405876c54b2b7028f59e188027408abadd9dd18f6ca48947a
SHA512b228c01319e87ae7c7c7ffa436c73b112954a3e83e30b1b98ee3b3c2ff174fe500ee693dcdede8b846aeacfbbaf58c770009d774ed9e6a5286b613cdc329175f
-
Filesize
3KB
MD57a259f02aa0433f897b5dcd4e402559e
SHA150c3f857701b79f7a401ba862ae353d3921991f5
SHA25696540b63e9a83aca1da5666cddf1ddf8655c4949cad1ea9f2cd05fd22a22f0f8
SHA5125cd7deb108c521f76db094c1590d024802686ced0bd1ac4b1c898fd9a7d2afd507417ebd971b13b86e8160ba7adcce0b6b85a8bdf958e37ae1088f9944aa806f
-
Filesize
3KB
MD5f40b9996a2aa8dd711545fded3e1eb23
SHA16bee1a5971982e029805c949b40711bb9b032b7b
SHA256ef6b8707acb12e922be24ae7151c84535c53f971e780701ffb28c5d698d09ab2
SHA51237837b86da6c5e05b5ada64023d0a060a9524620e75c5c61e8d16a7f8e5141add236a275d4c19be98cc14459aecb6b1512d9f504c511086c0d46bdb35be57c4f
-
Filesize
1KB
MD56fe9012bdba5f29962a52c06d8c46171
SHA17663c72a6eb3722b54ece18b3c8b4143a6d463d9
SHA256dce83b382e379fda3e030b331a8da12c2c2ab72fe70ba52ac4f9f09f81d9a5cc
SHA512f3224e558d35ae1157d26eebac2854f853e6b2a7810211189a1bc3d4ad53577cf62a9817b6d3c67f39ec6a65d0f5ad2f1f311d242dd9947835fa2c1d3d48302b
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
117KB
MD578644b3859ab816a652989e8b6f0e986
SHA10c6fcdc376deb1f6159f5d765fe384b1a553a4d8
SHA25675f4e58a4f73efd5fbdb621ba9d9b51fe9767677f1d1bbe4384933eb5d8be61d
SHA51204766db54c130155ea08763e14bfbbc5718daf432d6e63a78cfcfea086397ca6329f3782f833cff30d6d2d72f0547b55481b5f6f53550c29b865dbf7fd5c4df0
-
Filesize
367KB
MD527e1b611296ad6670b343f1147b7066a
SHA169915ec59888993b7bd6dadde5194ec5c2a34e64
SHA2562a51016ab0464e0781efd3e2aaa13a1f5b9150777cd2686d24c1e916d1a7891e
SHA51289d3fbfbeff1dfea750e0b2b5324622b27073560b9c22aeea3cc205fde0bef0900d6ed38894a61eb1da000b2948a211212e7b0307bf441834e7b2c050bc94379
-
Filesize
356KB
MD5fc21a929a770f728735d88400e29e241
SHA167b011ba422ded6abfc1e19c6d84e8cdbfc0787b
SHA2563a2a9068c414aa04f680af0fcc4c4654f9ae7e4ebf044708e6f73883092e73eb
SHA51211be7d11ec45a60062b66e7d7d07d03a39bdcc2dab671b01659e40d012366ad42c2c2a85151969854046a880e45cd9f48b1605bdef6afd623ccbaac646042c34
-
Filesize
434KB
MD5d94d80099423ae31ba57a3b0e96f62e5
SHA1335f4ce05ffa9581d6512a861f21ff9660234f86
SHA25682b3f7ae982656b7e0452945e9924416bbfa427b72cf51a85c2e32e9e4f37efd
SHA512d6200fe42ca1e07ed00070599cc123d2532cdc3a58b654338010a94d8e3e441dd016d2361a56ac07f1d57d74683fbc565253ff3fc69f1b83c0d1e491d0b2953c
-
Filesize
189KB
MD5e09173820ea91934d092118108068292
SHA18ef425cbcf02688a4a2f4dfac37cc255b1368eec
SHA2568dbea84a69cd6ddeaef50739f8f520f0cdd0258baecd517b1832d154fb18b958
SHA51227dda3e88b73c8b0761d5a3a0d311ac3063661002e92a5ce88ceac2f958119d6b46e3466c6c0e282bc4789fad314746e34e1ad55ecbd5da7f8f46e435d091117
-
Filesize
99KB
MD5d4ec6c7d71955f7a639d1d361d006a46
SHA1e9ab58950e5cf78a75c9138ceae0da6d462cf8e2
SHA2566191670c8ef56b85fd29bb80a1451fd30e060d3830aee96279573bc8ce69a790
SHA51200dd96837bd77c83abdf88e6231af806c95f0374d31fb07e836aad229bb88d3738f4e565f7db0f9bcac2059221d725a424abebfc1e45c3ddf4786161c104cab0
-
Filesize
277KB
MD57b40ff5769ecd0d711aae1ed31dd3f01
SHA19412b5364395d168c578c7688824708a8286dbc0
SHA256322fd2f54c38be178332d5c2b5e5e31b50423d1dbde34e1a840cf2a1c0c92284
SHA51267ee0231b90c19a8d6c6691905b5ba4368758a4feee5a3c7787c80d527cc99dabeb18d853fb4cbb00291774c3ba69a276c0320bc95a684d54c8ce33a14eeaf50
-
Filesize
227KB
MD501ef2b39f9246929c97dea91fede7931
SHA1990ba17dd66eb86084040f5c4d9a0fc12e7776b5
SHA2560eb784fdff7e3704418b6fe321fa71b6794e09e1c8d9fe60a49153e6213da224
SHA512ee24650e0425fd84e1dff76f0511d9cc38c718d1c37e53417569e5120d5efa8939948e7955e7ddd1abefd17eb63247e75da30071216f4367a7606e5300dcecba
-
Filesize
279KB
MD5af23965c3e2673940b70f436bb45f766
SHA1ccc8b03ea8c568f1b333458cff3f156898fc29f7
SHA256e6271d738fc78602abc8916fb4742638b2b4c4205882f6db24eb361694c67503
SHA512f0202e3ed32b9e69785bb50551b5143fe69298dead3c9a3d539cc6c6768f70f8263f074f912d1de5decb122bc365b7645428c0d10040f6f15a41f3a5ac0a4611
-
Filesize
1KB
MD5e115a8786febc78ebd0d6ada522178ad
SHA127d004f2704190149476115586f839b21cb5db71
SHA256a60f85301b7549fd2fb5c618066e39d14bb4ae481c725031c68fd845929ed479
SHA512fa454dcf4d4b34e296cd4c1f25983466244cfddf66147ffb83de3fd2f2c6fb354f73c26147ef37396ba5ddb1e8d5a45bafdb177d42eb3e5be0336e521441751c
-
Filesize
328KB
MD513e9dc280671fa6ec9cb649209a412aa
SHA1c2b23f3124932b0c228c9e33418eff067811e29c
SHA25629ee381707ba1c44580091fb8bd701e1f83a7a1ae133edfd09007a6752388d5e
SHA5123dca36ac22845f45ad6b3ae1536ca85835769fe1bdb66b2e23950e1adbf97a2f148dcde7a7398b4aa0902bd43f5ec23c08b4d6113d0107e2a918c7d8341bf1fa
-
Filesize
255KB
MD5e81c4263c7bff1d3dc357a75d484c8d3
SHA14e721db71c41a8dbe502452a9d0dc29d381d0a41
SHA256adb74a2522300686f3d252fe2ce83bcf15bb925e544cf4a2f5a8d45e3271db9e
SHA5123a279b362b37b73d2206d944e884839f5b23df6b84051d38e8aa7a3dfa518216d29cd18c5338e55d109d223042e9691c38a9b3975bfd88323f1ece26ec35087e
-
Filesize
83KB
MD50ebf2224db99d20a461ee1fe77ce1efb
SHA127471d13eadbcf8d824d19c834e6ca2eb94b90f0
SHA256d2fa5813c12b31e6b9aa6f8c4a83e94d4ede5cb5ea82f3d1a30416ad907733d4
SHA5125d65387e5890dd195c11f2cad287d3b145ca768643d51c3337b38b0405c148702fe6f4236a72ced697b023ddd446be6fd4d7d90deb21b241913f6ebc0e8abab4
-
Filesize
53KB
MD55eec28f28ec82abd2f553ca6e5b6425a
SHA105c9532ff6c0c1bf43671e1e394f7c8b5934dadd
SHA256e975a534c56849a5db9d2572bff14ff8617512e6c1eae6bc983d899160ab9c33
SHA512dce13fe52c8c1c1713c0123a3de65ceaff90557202f1e6b153bccb900774966fd83f3d6def6519f8a6e74bc7c802ca2115a808e28bae31a4313ff88507714040
-
Filesize
68KB
MD597dc6a257f24c7d13a9ffd6d65dd2ecc
SHA11b8c59a9c8e1d81c9fb23aceedb833cdca3058f5
SHA256e71cd2ae8d274f2c95009a4a6a83a71a829948a0644659310975f981a2521d59
SHA5124f6cb9732a7eaf9c383b7e37e6a2318c6cd3aed3d62fb05390e6256919c97fd3d76efbcb5bc090b824ff9cd0055e0d513cc5a8e2759691218b42cbfe15713daa
-
Filesize
44KB
MD55b1354e91623579e8d3d91c6b264a6b3
SHA13f5b31a9b0f685a444bc53c34d215fc958fc0b85
SHA256ec3826441083ddf2207334885e316a122360dcddc98cb62fbe50c01e0a34f1ca
SHA512695e3d932a06f10d04921d43ebc2bf0eb17256a40ac1475c3cfa2bd0ab8c5a893b12fc5e4871b9d01fb05175dab296a2d1625dc0e89ecb673714d8d1ad7845a5
-
Filesize
64KB
MD5c8cd96346df16a11387a4e084c82cbb7
SHA1eb069fa75444831d437c4a79734d7825aa9f0cc1
SHA256ad719115e18effabfdb225e23c1d15cbcdef0c845c1a5d3b95ce53e53254423d
SHA512b4987b9bd3b04385dca9d8c2abc292f9172bde0993a5ca9416bb4c13387dd1a73a1ee6251cfd931e5d9ba259541e7da366716eea94f41553bd90fbdffed61706
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
278KB
MD57661f80b0470d492f9563a959005235e
SHA15c79e3ff875d1e6ac481336782e4259855804ca0
SHA256b48df09d0e3c575237a8bf1415e6b5a0c64ab9058279da3b2ef72abd9a02d358
SHA5124b146b7a3f9ac3e7ff77a6ca267efcd15189f0d838a2911fb4067bae6949c751a564e719655a65dc08baf6569b1576695f8baabf7b6a28e0eb9ce7dcbcfe8b7b
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
192KB
MD5792be61f1ad83595c23c300073cfb4b4
SHA1713def61165af83780fcdf3fc750da0a9ff1fb9f
SHA2567afdf5c0be6eb01d95da93ca1a76249025f16c15875936bc5cebf1be5ba5cf1f
SHA512dbde4b3a3ce87138cbb64aa5e6151137158b11327a666cd7e93e74f0490eb53b06fbb25af79294ee9a375658f8a8c3ebda62f7c9707d7e87cd998171885c1e3d
-
Filesize
29KB
MD5c736428952108b01688686df5638db8d
SHA101b5e0e9abe645a88edd3aafbbca3d028388699e
SHA256400e068c82071cd8be65a34b6c1ba4df837462a090bada62b6338d49e75b024e
SHA512794aa0fb6914f82ff9a181db42d824e294e2cfbf3ffa6bb7be63b3c976aa4674d0256426fffb19165c9abd93bb33d309d3e79bf9fdbe2f332cb7b92e6f6adbb5
-
Filesize
6KB
MD55f87262b488afd1cb59ff244fa8a1073
SHA19cdc72afa067437adee93edea8d211f4164c7cd1
SHA256e5723b460414d4c31ada3d35e0d24024f78711526b45ba3010ed92428ce16f80
SHA512d0e5d120312f488eb0f41f70e7a41ebf068e0c16ff315e477809433a3b60dbb5676a77a53d057b7e0630a5e749af8847583bca862a552e66c80b661f297b0195
-
Filesize
388KB
MD5e924e5206a02d6f3e1a46a7876c5672b
SHA1a381506b720ee74b201a6c952fab8a5b91dcbfc0
SHA256745d72990c2a1dc255aaf365e825db92fd2f7e9297c4c5cf42f907d83bb2a8aa
SHA512cd3e3bb8ad4252f108fd90d9c9a6ce803070971929694ac2983686535086d616ec55a9a973f9c5ef2fcd507ead30306ee2db48ea793d3220ddb45c9600b47a1b
-
Filesize
438KB
MD51b536a6221437d22fe476605eff7ee7e
SHA1d45092b865b25d254c5e4cb7f21b36cd152f5b93
SHA25606292fc651c5fccb48e3cff48609f970d93f3f0ffcab5b53f8e7eb6ffdca40a9
SHA512cc7ce5ce3418bdc554bc77ab637b5eb63c045d06718f1373dbf85a8ddafd2f9acd01e2c7693582df0507111961e4d2325f57e2fe5fe33238655792ca60bbeae3
-
Filesize
263KB
MD5c8b143f9e787c5ee487ca0335398fc66
SHA182757d524f38f86ab360d4f0818b870b487279b4
SHA256bc55b70a87330912afb24a6bad22598a9804e33c2175e70a71afee40147b9e2a
SHA51264b9358ec7098d9e630d0078775e58da1fe53cc48969b445086ee62c4b1c87940fcb0658e4a1983183816a05d4e12bdc019ec06294197fe4e4381e031c172715