Analysis
-
max time kernel
126s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-03-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exe
Resource
win11-20240221-en
General
-
Target
5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exe
-
Size
1.9MB
-
MD5
86e400c1b51b8b42204fbcdffbb8ec49
-
SHA1
a64e365cbd139b59db26f6b6143f00a7eac04b14
-
SHA256
5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee
-
SHA512
6cee1ff8ddff892a6a7f3a375ba78aec69367387834ab476cf970a5a227cd57d5c153fcd6980e1dcdcfee2e3e943deeb6f319c7e0e83e60727aef75958d94267
-
SSDEEP
49152:H2+Sp59ZO6LzdtLnqmGhrX+oyZEhUv5+L2f5ZkkUYHZwMIU:W/59tJt9wrai0VogwRU
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
redline
LiveTraffic
4.185.137.132:1632
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
Signatures
-
Detect ZGRat V1 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe family_zgrat_v1 behavioral2/memory/496-98-0x00000000000D0000-0x000000000014A000-memory.dmp family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe family_zgrat_v1 C:\Users\Admin\Pictures\0R3lOUHRkmlUEr4xcujr7PPC.exe family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2668-103-0x0000000000400000-0x0000000000450000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe family_redline C:\Users\Admin\AppData\Local\Temp\1001025001\mk.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
explorgu.exerandom.exe5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exeexplorgu.exerandom.exeamadka.exeexplorha.exe97cbadb0c3.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amadka.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 97cbadb0c3.exe -
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exeflow pid process 5 2572 rundll32.exe 7 3336 rundll32.exe 25 236 rundll32.exe 34 1076 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorha.exeexplorgu.exe5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exeexplorgu.exe97cbadb0c3.exerandom.exerandom.exeamadka.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 97cbadb0c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 97cbadb0c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe -
Executes dropped EXE 25 IoCs
Processes:
explorgu.exegoldprimeldlldf.exerandom.exeamadka.exeTeamFour.exeexplorha.exealex1234.exe97cbadb0c3.exeTraffic.exepropro.exe987123.exelumma21.exelummalg.exeexplorgu.exechckik.exechrosha.exemk.exerandom.exelummalg.exeFullwork123.exeboom8.exeISetup8.exetoolspub1.exeboom8.exeu1jc.0.exepid process 3856 explorgu.exe 496 goldprimeldlldf.exe 3796 random.exe 2748 amadka.exe 2464 TeamFour.exe 1548 explorha.exe 1756 alex1234.exe 4688 97cbadb0c3.exe 1720 Traffic.exe 3404 propro.exe 4896 987123.exe 236 lumma21.exe 3636 lummalg.exe 2988 explorgu.exe 4888 chckik.exe 2400 chrosha.exe 988 mk.exe 2656 random.exe 2088 lummalg.exe 1660 Fullwork123.exe 4088 boom8.exe 1992 ISetup8.exe 3572 toolspub1.exe 1516 boom8.exe 2312 u1jc.0.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
explorgu.exerandom.exe5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exeexplorgu.exerandom.exeamadka.exeexplorha.exe97cbadb0c3.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4280069375-290121026-380765049-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-4280069375-290121026-380765049-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-4280069375-290121026-380765049-1000\Software\Wine 5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exe Key opened \REGISTRY\USER\S-1-5-21-4280069375-290121026-380765049-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-4280069375-290121026-380765049-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-4280069375-290121026-380765049-1000\Software\Wine amadka.exe Key opened \REGISTRY\USER\S-1-5-21-4280069375-290121026-380765049-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-4280069375-290121026-380765049-1000\Software\Wine 97cbadb0c3.exe -
Loads dropped DLL 8 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exepid process 3128 rundll32.exe 2572 rundll32.exe 3336 rundll32.exe 4944 rundll32.exe 236 rundll32.exe 1076 rundll32.exe 1660 rundll32.exe 344 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\u1jc.1.exe upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorgu.exeexplorha.exechrosha.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4280069375-290121026-380765049-1000\Software\Microsoft\Windows\CurrentVersion\Run\random.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000873001\\random.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4280069375-290121026-380765049-1000\Software\Microsoft\Windows\CurrentVersion\Run\amadka.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000875001\\amadka.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4280069375-290121026-380765049-1000\Software\Microsoft\Windows\CurrentVersion\Run\97cbadb0c3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000022001\\97cbadb0c3.exe" explorha.exe Set value (str) \REGISTRY\USER\S-1-5-21-4280069375-290121026-380765049-1000\Software\Microsoft\Windows\CurrentVersion\Run\random.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000053001\\random.exe" chrosha.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exeexplorgu.exeamadka.exeexplorha.exepid process 4852 5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exe 3856 explorgu.exe 2748 amadka.exe 1548 explorha.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
goldprimeldlldf.exealex1234.exelummalg.exeexplorgu.exelummalg.exeFullwork123.exedescription pid process target process PID 496 set thread context of 2668 496 goldprimeldlldf.exe RegAsm.exe PID 1756 set thread context of 2356 1756 alex1234.exe RegAsm.exe PID 3636 set thread context of 2560 3636 lummalg.exe RegAsm.exe PID 3856 set thread context of 2988 3856 explorgu.exe explorgu.exe PID 2088 set thread context of 2264 2088 lummalg.exe RegAsm.exe PID 1660 set thread context of 1764 1660 Fullwork123.exe RegAsm.exe -
Drops file in Windows directory 4 IoCs
Processes:
5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exeamadka.exelumma21.exechckik.exedescription ioc process File created C:\Windows\Tasks\explorgu.job 5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exe File created C:\Windows\Tasks\explorha.job amadka.exe File created C:\Windows\Tasks\chrosha.job lumma21.exe File created C:\Windows\Tasks\chrosha.job chckik.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4660 2560 WerFault.exe RegAsm.exe 2740 1764 WerFault.exe RegAsm.exe 1040 2264 WerFault.exe RegAsm.exe 1256 1992 WerFault.exe ISetup8.exe 5784 5276 WerFault.exe 5EE0.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
987123.exetoolspub1.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 5976 schtasks.exe 5988 schtasks.exe 3812 schtasks.exe -
Processes:
propro.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 propro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 propro.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exeexplorgu.exerundll32.exepowershell.exeRegAsm.exeamadka.exeexplorha.exe987123.exeTeamFour.exepid process 4852 5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exe 4852 5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exe 3856 explorgu.exe 3856 explorgu.exe 2572 rundll32.exe 2572 rundll32.exe 2572 rundll32.exe 2572 rundll32.exe 2572 rundll32.exe 2572 rundll32.exe 2572 rundll32.exe 2572 rundll32.exe 2572 rundll32.exe 2572 rundll32.exe 676 powershell.exe 676 powershell.exe 2668 RegAsm.exe 2668 RegAsm.exe 2668 RegAsm.exe 2668 RegAsm.exe 2668 RegAsm.exe 2748 amadka.exe 2748 amadka.exe 1548 explorha.exe 1548 explorha.exe 4896 987123.exe 4896 987123.exe 2464 TeamFour.exe 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
987123.exepid process 4896 987123.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
Processes:
powershell.exeRegAsm.exeTeamFour.exeTraffic.exepowershell.exepropro.exedescription pid process Token: SeDebugPrivilege 676 powershell.exe Token: SeDebugPrivilege 2668 RegAsm.exe Token: SeDebugPrivilege 2464 TeamFour.exe Token: SeBackupPrivilege 2464 TeamFour.exe Token: SeSecurityPrivilege 2464 TeamFour.exe Token: SeSecurityPrivilege 2464 TeamFour.exe Token: SeSecurityPrivilege 2464 TeamFour.exe Token: SeSecurityPrivilege 2464 TeamFour.exe Token: SeDebugPrivilege 1720 Traffic.exe Token: SeBackupPrivilege 1720 Traffic.exe Token: SeSecurityPrivilege 1720 Traffic.exe Token: SeSecurityPrivilege 1720 Traffic.exe Token: SeSecurityPrivilege 1720 Traffic.exe Token: SeSecurityPrivilege 1720 Traffic.exe Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeDebugPrivilege 1336 powershell.exe Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeDebugPrivilege 3404 propro.exe Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
explorgu.exerundll32.exerundll32.exegoldprimeldlldf.exeamadka.exeexplorha.exealex1234.exeRegAsm.exedescription pid process target process PID 3856 wrote to memory of 3128 3856 explorgu.exe rundll32.exe PID 3856 wrote to memory of 3128 3856 explorgu.exe rundll32.exe PID 3856 wrote to memory of 3128 3856 explorgu.exe rundll32.exe PID 3128 wrote to memory of 2572 3128 rundll32.exe rundll32.exe PID 3128 wrote to memory of 2572 3128 rundll32.exe rundll32.exe PID 2572 wrote to memory of 3704 2572 rundll32.exe netsh.exe PID 2572 wrote to memory of 3704 2572 rundll32.exe netsh.exe PID 2572 wrote to memory of 676 2572 rundll32.exe powershell.exe PID 2572 wrote to memory of 676 2572 rundll32.exe powershell.exe PID 3856 wrote to memory of 3336 3856 explorgu.exe rundll32.exe PID 3856 wrote to memory of 3336 3856 explorgu.exe rundll32.exe PID 3856 wrote to memory of 3336 3856 explorgu.exe rundll32.exe PID 3856 wrote to memory of 496 3856 explorgu.exe goldprimeldlldf.exe PID 3856 wrote to memory of 496 3856 explorgu.exe goldprimeldlldf.exe PID 3856 wrote to memory of 496 3856 explorgu.exe goldprimeldlldf.exe PID 496 wrote to memory of 2668 496 goldprimeldlldf.exe RegAsm.exe PID 496 wrote to memory of 2668 496 goldprimeldlldf.exe RegAsm.exe PID 496 wrote to memory of 2668 496 goldprimeldlldf.exe RegAsm.exe PID 496 wrote to memory of 2668 496 goldprimeldlldf.exe RegAsm.exe PID 496 wrote to memory of 2668 496 goldprimeldlldf.exe RegAsm.exe PID 496 wrote to memory of 2668 496 goldprimeldlldf.exe RegAsm.exe PID 496 wrote to memory of 2668 496 goldprimeldlldf.exe RegAsm.exe PID 496 wrote to memory of 2668 496 goldprimeldlldf.exe RegAsm.exe PID 3856 wrote to memory of 3796 3856 explorgu.exe random.exe PID 3856 wrote to memory of 3796 3856 explorgu.exe random.exe PID 3856 wrote to memory of 3796 3856 explorgu.exe random.exe PID 3856 wrote to memory of 2748 3856 explorgu.exe amadka.exe PID 3856 wrote to memory of 2748 3856 explorgu.exe amadka.exe PID 3856 wrote to memory of 2748 3856 explorgu.exe amadka.exe PID 3856 wrote to memory of 2464 3856 explorgu.exe TeamFour.exe PID 3856 wrote to memory of 2464 3856 explorgu.exe TeamFour.exe PID 2748 wrote to memory of 1548 2748 amadka.exe explorha.exe PID 2748 wrote to memory of 1548 2748 amadka.exe explorha.exe PID 2748 wrote to memory of 1548 2748 amadka.exe explorha.exe PID 3856 wrote to memory of 1756 3856 explorgu.exe alex1234.exe PID 3856 wrote to memory of 1756 3856 explorgu.exe alex1234.exe PID 3856 wrote to memory of 1756 3856 explorgu.exe alex1234.exe PID 1548 wrote to memory of 4688 1548 explorha.exe 97cbadb0c3.exe PID 1548 wrote to memory of 4688 1548 explorha.exe 97cbadb0c3.exe PID 1548 wrote to memory of 4688 1548 explorha.exe 97cbadb0c3.exe PID 1756 wrote to memory of 2356 1756 alex1234.exe RegAsm.exe PID 1756 wrote to memory of 2356 1756 alex1234.exe RegAsm.exe PID 1756 wrote to memory of 2356 1756 alex1234.exe RegAsm.exe PID 1756 wrote to memory of 2356 1756 alex1234.exe RegAsm.exe PID 1756 wrote to memory of 2356 1756 alex1234.exe RegAsm.exe PID 1756 wrote to memory of 2356 1756 alex1234.exe RegAsm.exe PID 1756 wrote to memory of 2356 1756 alex1234.exe RegAsm.exe PID 1756 wrote to memory of 2356 1756 alex1234.exe RegAsm.exe PID 2356 wrote to memory of 1720 2356 RegAsm.exe Traffic.exe PID 2356 wrote to memory of 1720 2356 RegAsm.exe Traffic.exe PID 2356 wrote to memory of 3404 2356 RegAsm.exe propro.exe PID 2356 wrote to memory of 3404 2356 RegAsm.exe propro.exe PID 2356 wrote to memory of 3404 2356 RegAsm.exe propro.exe PID 1548 wrote to memory of 3400 1548 explorha.exe explorha.exe PID 1548 wrote to memory of 3400 1548 explorha.exe explorha.exe PID 1548 wrote to memory of 3400 1548 explorha.exe explorha.exe PID 3856 wrote to memory of 4896 3856 explorgu.exe 987123.exe PID 3856 wrote to memory of 4896 3856 explorgu.exe 987123.exe PID 3856 wrote to memory of 4896 3856 explorgu.exe 987123.exe PID 1548 wrote to memory of 236 1548 explorha.exe lumma21.exe PID 1548 wrote to memory of 236 1548 explorha.exe lumma21.exe PID 1548 wrote to memory of 236 1548 explorha.exe lumma21.exe PID 3856 wrote to memory of 3636 3856 explorgu.exe lummalg.exe PID 3856 wrote to memory of 3636 3856 explorgu.exe lummalg.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exe"C:\Users\Admin\AppData\Local\Temp\5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:3704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\280069375290_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\1000022001\97cbadb0c3.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\97cbadb0c3.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:4688
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"4⤵PID:3400
-
-
C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe"C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:236
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Loads dropped DLL
PID:4944 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:236 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵PID:2816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\280069375290_Desktop.zip' -CompressionLevel Optimal6⤵
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4896
-
-
C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe"C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 11644⤵
- Program crash
PID:4660
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\1001022001\chckik.exe"C:\Users\Admin\AppData\Local\Temp\1001022001\chckik.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe"C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\1000053001\random.exe"C:\Users\Admin\AppData\Local\Temp\1000053001\random.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\1000063001\lummalg.exe"C:\Users\Admin\AppData\Local\Temp\1000063001\lummalg.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2088 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:2264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 8246⤵
- Program crash
PID:1040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000074001\Fullwork123.exe"C:\Users\Admin\AppData\Local\Temp\1000074001\Fullwork123.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:1764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 11606⤵
- Program crash
PID:2740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe"C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe"4⤵
- Executes dropped EXE
PID:4088 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN boom8.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe" /F5⤵
- Creates scheduled task(s)
PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\1000172001\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000172001\ISetup8.exe"5⤵
- Executes dropped EXE
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\u1jc.0.exe"C:\Users\Admin\AppData\Local\Temp\u1jc.0.exe"6⤵
- Executes dropped EXE
PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\u1jc.1.exe"C:\Users\Admin\AppData\Local\Temp\u1jc.1.exe"6⤵PID:3752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "7⤵PID:2644
-
C:\Windows\SysWOW64\chcp.comchcp 12518⤵PID:5380
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F8⤵
- Creates scheduled task(s)
PID:5976
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 16446⤵
- Program crash
PID:1256
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000173001\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\1000173001\toolspub1.exe"5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\1000174001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000174001\4767d2e713f2021e8fe856e3ea638b58.exe"5⤵PID:3852
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main4⤵
- Loads dropped DLL
PID:1660 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main5⤵
- Loads dropped DLL
PID:344 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵PID:1216
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\280069375290_Desktop.zip' -CompressionLevel Optimal6⤵PID:5036
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main4⤵PID:5436
-
-
C:\Users\Admin\AppData\Local\Temp\1000084001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000084001\file300un.exe"4⤵PID:5592
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile5⤵PID:5612
-
-
C:\Windows\system32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\.BLRVzdv\svchost.exe"' & exit5⤵PID:5652
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\.BLRVzdv\svchost.exe"'6⤵
- Creates scheduled task(s)
PID:5988
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"5⤵PID:5660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵PID:5680
-
C:\Users\Admin\Pictures\21QqeNd144MijCMaf3s2IRoN.exe"C:\Users\Admin\Pictures\21QqeNd144MijCMaf3s2IRoN.exe"6⤵PID:3120
-
-
C:\Users\Admin\Pictures\cVIBNUfrhJ4Ar7pknqKtTN6N.exe"C:\Users\Admin\Pictures\cVIBNUfrhJ4Ar7pknqKtTN6N.exe"6⤵PID:3040
-
-
C:\Users\Admin\Pictures\IlJ6Rw9S5tMWO4Zi8aCWP18H.exe"C:\Users\Admin\Pictures\IlJ6Rw9S5tMWO4Zi8aCWP18H.exe"6⤵PID:2692
-
-
C:\Users\Admin\Pictures\cZblFG09jfrABzcO0CxFEyOp.exe"C:\Users\Admin\Pictures\cZblFG09jfrABzcO0CxFEyOp.exe"6⤵PID:4704
-
-
C:\Users\Admin\Pictures\0R3lOUHRkmlUEr4xcujr7PPC.exe"C:\Users\Admin\Pictures\0R3lOUHRkmlUEr4xcujr7PPC.exe"6⤵PID:5808
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001025001\mk.exe"C:\Users\Admin\AppData\Local\Temp\1001025001\mk.exe"2⤵
- Executes dropped EXE
PID:988
-
-
C:\Users\Admin\AppData\Local\Temp\1001030001\boom8.exe"C:\Users\Admin\AppData\Local\Temp\1001030001\boom8.exe"2⤵
- Executes dropped EXE
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2560 -ip 25601⤵PID:3056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 2560 -ip 25601⤵PID:1216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1764 -ip 17641⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 2264 -ip 22641⤵PID:1964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1992 -ip 19921⤵PID:1916
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\4CBF.dll1⤵PID:1028
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\4CBF.dll2⤵PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exeC:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe1⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\5EE0.exeC:\Users\Admin\AppData\Local\Temp\5EE0.exe1⤵PID:5276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 8322⤵
- Program crash
PID:5784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5276 -ip 52761⤵PID:5708
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ae626d9a72417b14570daa8fcd5d34a4
SHA1c103ebaf4d760df722d620df87e6f07c0486439f
SHA25652cc3f3028fab0d347a4a3fffef570b42f85748176d81a3344996d42fd1de32a
SHA512a0690bda318bdf43d6f292f88d4ea2ebeec83b95e9ebca80083dbb08e7ddcdb9735cc58b89d369a34f10acf8a114d4a207ed8d0f070c5baf87c5798e9f35bc14
-
Filesize
2KB
MD547b3bb3bf3bd31854ef77da134dc534f
SHA179f7ee98bfce765215cb9bc54d6c27a748af50f3
SHA25627bd7f1def6afae36983285feba3f689c7a006617a7d48cdac752bbd8ca39683
SHA512f0d52c49fe5de3abd83875dc52755fbdd7d70aa92d31abae733a8104742372cee2f2e59c5b71f6d667144e52c97c543b095a718ea63410e1709f55b73b4953d0
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
3.0MB
MD511901aa29f74ae89bb0810adf7d2808f
SHA1fc044f40ab31c9430a29315c6911334fe9de5959
SHA25622e5293a211722517cdafd32c27fe87b868459053f8215f1f2e6a58a1b259d42
SHA512cc447a6a5ee34eb5366e0fac64a3ca1b57477f7732a2a467acbda7077fd5d7bc0a762f313efb623edf56c78918eac5a7cf760b86bdf9bb99f4a515369d19fe71
-
Filesize
1KB
MD50d0a491debdaef78b8d5662c9baa209d
SHA16aafccf0d3ec78adffd63419be80ecca1c504f79
SHA2565699d20559e534de556496e6411b71394639777508c309354cc4754af1cb6840
SHA5123a321d4149a878efc518cb4dab63427b4c3b963f7ae07653e2dfbfd9a01b25f9b9876098a093b4db69bdd4e2de6203ff7a1ac8afe298d9f764fb79729861e796
-
Filesize
1.9MB
MD586e400c1b51b8b42204fbcdffbb8ec49
SHA1a64e365cbd139b59db26f6b6143f00a7eac04b14
SHA2565ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee
SHA5126cee1ff8ddff892a6a7f3a375ba78aec69367387834ab476cf970a5a227cd57d5c153fcd6980e1dcdcfee2e3e943deeb6f319c7e0e83e60727aef75958d94267
-
Filesize
1.1MB
MD5fc7f57529fcc70ed7c910a1dea3c67d4
SHA19ffa8daa8d3c6e3bf0a3db71145cc19782aa016f
SHA25644ba6d68d84e23fe9464456f41a73c1f3f810be7c2c0a690759cec43952fc89c
SHA5127247d38bc032cb9a7b22807385d66b4f8fd66b2a7a64854ac4e3b7327a091046854912adef2cd3a5638286173da0fd0e045a6c094760522adcd77db4a18f8e86
-
Filesize
1.1MB
MD583f6417a272f7db693eb2e8c3c0059a8
SHA13a6ddc1afa140c9d36362890d988053cec6f1ba2
SHA256a057111b986ea3491b9b2ef570582258d59260441b70d4441f74702c48b52eb6
SHA512667656b0ffea6de561c1a4b716ec91cdf4d481f06f074548c0b70f23c511f98cfe6c35aec25e765ff6fa699af873ebae9865300a7b83bf648d02f1e763e9a19f
-
Filesize
1.4MB
MD5a668b3dcdab254ea73534824890fd5ba
SHA1db25f7d8929dbdce044dbb4018aec56ba80d2eea
SHA256b5ccf585f56193b371a63dc16f84148cb383009ec5bf1464f1b0e4bd804b6beb
SHA512479c6453b4a6b6bf4aab6dcc069b67ef8a5ef21f381b7b5b249c982b4d042cfb0e8b5e4eca8d01b2bf3cf1e720bf220fb1da667bd05fccc880a8aedb83515253
-
Filesize
1.4MB
MD5c94e9cc890ed9e6bcb73453d587ceebd
SHA156de02b0cd95bfe7b9d9ed6a3347ca4a91734ceb
SHA25661a0ba8167a7e89dea464a6d9a9ce477934ad7502d755b64eeb568925eaa126c
SHA51218c1d576de27febb2b9364488a1acc919f5fe2e0f5d9807a376c5318c055473b9e2b49e41af9c5fdc7d25a5d4598dd3f9373e3f81451d395284a489cfeb3c0da
-
Filesize
413KB
MD5d467222c3bd563cb72fa49302f80b079
SHA19335e2a36abb8309d8a2075faf78d66b968b2a91
SHA256fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e
SHA512484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7
-
Filesize
354KB
MD5f72f6b9036a9273958dc09effeb0a10a
SHA188c6d3521a345c8fd688a7a35c25299cdf96c5cd
SHA2565846798583be774901279b9bca21a8ef095d0f12e459a7a83535b5b0339046bc
SHA512b5b72ff06efe22888ab2f8715b899477e73335fd04ae42a37a1e6da794a4e0b3d7ac6ad7f24e7dddaca91bc96484776bb1c49d5385096523e2cb380bed83f314
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
437KB
MD5a6359e3def9488d7241cd3ae38f48f8f
SHA19887fa042b6619c535fc311b024d9b74cdc699aa
SHA2565cd9e1d02e4b473ef293a5a9f4a1aa6b0f91fdfc2ad3b37175f82829e247a21b
SHA512a26120634f7d413cc9d9140dabc66502c7a52c7d8586df75dcbda40da03273647c6472c3806f98c19aa68ebca8813c31f7fcb1c4fef1013fdcf2a341117f1fa0
-
Filesize
293KB
MD55cd2922e6e7d2aeaea1ee725ae9b562e
SHA1ea276e30f56d7bfff98c1f5480b0b565db42fa48
SHA256b8fd930c7165a1a03b79bbc5c8bac3596a74271ea38b9bc5293d549852340cd2
SHA512a3eb78aab3a0961d8a88e7a76eebfa678fb7858843ee12aac247c71f9c78f041f574fa9647b08f7aa96c3d212e45d765d0359fa6e98820a41c5bbf9ef99ce085
-
Filesize
2.2MB
MD56366608a53bca9b9979d5b80280ea87b
SHA1a5518b22075c71cb9495ea05633d115b29b87c78
SHA2568a0989c968ec7e4654b64f8f8cac9642f45c4f03ac7c78cccc33c08d29809f0f
SHA512c1fa75d82aa16ce522647542327e136e7892ee5f3b217fd844bee3d8ba47a3239cab51e86d754448cb0b2424fc32ae1e8a12f93555151eff52fd7e9916f7aaed
-
Filesize
464KB
MD5c084d6f6ba40534fbfc5a64b21ef99ab
SHA10b4a17da83c0a8abbc8fab321931d5447b32b720
SHA256afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624
SHA512a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1
-
Filesize
1.4MB
MD587390d2ec8a66c151d2861d943535700
SHA1b675b6733866a38d9d93b64e2cc20f609c9ad3a8
SHA2565a7be3123560af54f380fc195304b3623a446763f8445639505a4e1d943f7feb
SHA5129f6509ddd470a7c32676ffb587c762b11399378f31a8eca26f9f765971b01942ffd4b9d3038a93654890fb143818fe2724f51732e758acb31cfc7f2cae973f9a
-
Filesize
1.3MB
MD5c09dbe79d2f2d8aef634341abdfa6d4a
SHA1a146b4244d15c2d14d64de58fc353c7a5771454c
SHA256d390dc7541bf3572e44a810d77f67f48a93630a4f40613fc8dc63b21cde3cf0b
SHA5129cf2decff2ab1b3a2aecdd545ff975f0a1e501ed123e65b421ce0ce62b421237ad84393404b82950b27bd285bf4978f595c40c726dcd68999492a9c9ac94d21f
-
Filesize
1.3MB
MD5875aa4b197e52db6ba2f6c088b5e3538
SHA1f1c8ee2a3a85e4fa035fdf805cecd88120c70bb0
SHA256e1184b741717d7d545170c961be065242917b2a721b21be20dc3c12843871988
SHA512284e00734df7b014c48306db61ee648e1f60c7cdc5a03482bf3a4974b0d760111f90ee582972233722737721dddda234875eace6b0b4a9afc804c52487fa35d8
-
Filesize
780KB
MD5659672a73259698206df4897b165658b
SHA15eb8d01558bf5a58bb507bdba841a77545051975
SHA256c35694092ff513c3ac1b20b9e3dbd00a3dc610844127fbec88a14b046225ac8a
SHA5129f5b904f2f3571563a03fab81598e8f8ad27164af05b3cebf23efaf9e3704ba5b44ab71adb61f1eda6d2b11032b5b42664debb784a164dc8af8e6d53382bae39
-
Filesize
160KB
MD5a2ff6e2857b3ed9f710ba94e653f4b93
SHA1a2e6d305b6102d33b4256719bc27ba46a2592bb6
SHA25602b3dbafa084861547604d095fb64af71b50254b9d735652138e804b4b3474ef
SHA512937febbadf1352dd140a706d5adfca0c59f57d9eb57cae7d1d2a1c1d8ad4278c2c8f6735542b812d87ecf7841476bcce90b44fcb2179eb8ce94aaaae296ea94b
-
Filesize
158KB
MD5b5d8f1d9014f40aa8ed1a91871f8237e
SHA11e888df2bf31c455a12983483a47517b2b881049
SHA256140a38835b18aa49f22af26e866212db54e529c2ae22bd4378c767ffea927aac
SHA5122a26958c4b50f887f331ba5218555683b83fd169c48df0166d49e41f34a0aca1f015820ba257d95e2c9c17041ddf290d9ccc0d42d3a571c5459923cc17802d19
-
Filesize
541KB
MD53b069f3dd741e4360f26cb27cb10320a
SHA16a9503aaf1e297f2696482ddf1bd4605a8710101
SHA256f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e
SHA512bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9
-
Filesize
1.7MB
MD585a15f080b09acace350ab30460c8996
SHA13fc515e60e4cfa5b3321f04a96c7fb463e4b9d02
SHA2563a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b
SHA512ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f
-
Filesize
1.3MB
MD5f5dfe354e2f36ece3272dcfa9dfed319
SHA16ce4326794c8e1656cef0591cf72852474501f62
SHA256316a06c383258c5acea225f23fd7261d66c1bd7380a54c24c8a20edb0fdf76ae
SHA512d14b271a4d9a61233b38a5c5cbc18070181aea93bffa2b8a9d4d1d99220b15241139f097dd761c2b5505ed78adc51108ead5b9aac3ea1e3492c947a960f8c360
-
Filesize
315KB
MD55fe67781ffe47ec36f91991abf707432
SHA1137e6d50387a837bf929b0da70ab6b1512e95466
SHA256a8f1ae296787ddc24e0e7a241d0bc5829631c98a5eb186a8cfd5795c6d287db9
SHA5120e32d9a72b562d4c4a8c4edbd3d0ece54b67ee87c8ac382c6508c62b04b11a2dcd1fba23c3a78004fcd0c2b623dc854fd2fd82eb372dc7becdcbdd7ec7fe1b68
-
Filesize
350KB
MD504df085b57814d1a1accead4e153909e
SHA16d277da314ef185ba9072a9b677b599b1f46c35b
SHA25691a36d137ebfa812b055728807e11338d15d3a5d869cb4babdf779266688e4dd
SHA512f37678424e46e4f28e1047161db60ad737515558c8c8905ed598ca96b198304da7356e49e7bb9d1e77fe75372f0b5a7f670a353d093749c37bb85c40ec7fdafa
-
Filesize
297KB
MD5cc1e287519f78a28dab6bde8e1093829
SHA19262753386caa4054aa845d918364e964e5505aa
SHA256dbcb61ce94c4d2d216de2b503937a2a964b984577f2d7730b7c6428b2b5e8db2
SHA512527b6d905e2ca829369563baa7be9eaf4050ef9bbf438ccc98b9b821e76977aaebbda8471da8b81c0542395c5fc316b19d7034155f278640d0765bfc55dc1f43
-
Filesize
1.1MB
MD5fcc73bf640a98f3ad9a4bbdd7e2f1254
SHA17434a2e9da97ce6ab530af6d9f6d3ee7ec6438d7
SHA2566bbf7d47411ee841d2e1d1d52bf43c6a90f7969cb1301527dc0a6023b43cc210
SHA512c4ef98abe98a3bfba2f8e448c728c74d131f82bf805192ea2fe77a6e05f2dba8bc1cd57ea123274d9d65cae7408cab00a6e7c0977d89562549ed04b191ced525
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
292KB
MD50d741321055d687fd67a4c638cfc579d
SHA1e620a53802fc888c34eff90aa9783e064e6bfa8d
SHA2560d7500dfaaac5fd44f989dcb0e6f337451baa2c39e47457493ab0990ae654e4b
SHA512f2b902c980b4e61ed254e1f6561311aaf625d5279eb894c5d3507cb231f0b596ccf44b8d9caf3c3439057cc96df45704fa5aafe5ff6142b2f473ca47d34220c9
-
Filesize
1.1MB
MD5e19b3b425db44aedde0fa8424a79d0b8
SHA1aaf565e1ef6a234b6edff158bab2c00497c282e5
SHA25646bd41e6b6783529c0e22aea6c9174497b6eb1e9293c6453c1091c51e975bda7
SHA5126798e1043951c6e131f1eff5404220fcf1d6021b5d281a1cdd51464e41e491c4b45c0a2bcdbd2ac10e197e4a2643c4388e9c0fa35b3ecd4380183d5ef394d119
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
109KB
MD5154c3f1334dd435f562672f2664fea6b
SHA151dd25e2ba98b8546de163b8f26e2972a90c2c79
SHA2565f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f
SHA5121bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841
-
Filesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705
-
Filesize
541KB
MD51fc4b9014855e9238a361046cfbf6d66
SHA1c17f18c8246026c9979ab595392a14fe65cc5e9f
SHA256f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50
SHA5122af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12
-
Filesize
304KB
MD5cc90e3326d7b20a33f8037b9aab238e4
SHA1236d173a6ac462d85de4e866439634db3b9eeba3
SHA256bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7
SHA512b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521
-
Filesize
522KB
MD5b8616322186dcdf78032a74cf3497153
SHA1bf1c1568d65422757cc88300df76a6740db6eab5
SHA25643dda2be3813b81729b3d388f546838a36ee3471da5ed266fe958e2316f1f6ea
SHA5127b1e4ad944960fc2aa661426f77e64ff151cd8d5860e584874da1c4f03c6d195d4ee9031c36c24a234a851176b003254d14f9334712e07babc6934cf19a7b2fb
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
3KB
MD5921c4c23a3749d7122259f8bd9efb865
SHA1a26eb40a43b9283271ed0b31d02b81bc437024cc
SHA25678ed967cd7bd3bd606b5552a03d9b7f766bd65f663985e0bacd4dd5fba4a9ed2
SHA5122516ba8dfe2e1a85acf61fc4b87aad8675d157fc17b708e4e1262d9e7c41c28412b8c55946262a707c36a7e9823ee23e3e3450b066e1f3974454fa9cd4d214a6
-
Filesize
286B
MD5f05f30a5e54d17c0dec5286c56cef070
SHA1d2a47d68ded5529c6c7c05f4520eaf885aea58c4
SHA256ca3efb30eb2d2485dece744067a2ab9cfccfb2f015fa4187878b49dc8c00b0df
SHA512757e8f8533ba32c784099c0571a74c2ad948ed6d423c03f85ca5c2ba5fd9ec39ea164946cb8c4c79b80efe3996a4c3b79c348a83b6843ff764e1e38d87f62747