Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 13:35
Static task
static1
Behavioral task
behavioral1
Sample
df4aec4fa5881cec4417c8f64ecb2107.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df4aec4fa5881cec4417c8f64ecb2107.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
setup_installer.exe
Resource
win10v2004-20240226-en
General
-
Target
df4aec4fa5881cec4417c8f64ecb2107.exe
-
Size
3.8MB
-
MD5
df4aec4fa5881cec4417c8f64ecb2107
-
SHA1
706a666d7431084ec1220cf4b9940f853e172e65
-
SHA256
a2f15b4e843483e292e4c2f29cdd09a87081d7f158c0e860c88b211b2ad0a348
-
SHA512
8e68493bed99680d6a44f90dd5927785c34a9ce2834b15264a76d04dba2d12f56877b7a4bc3a61f7e6623beee41eca4d775d7031dd8192cdf8b58527f61c9838
-
SSDEEP
98304:yL4PC/N63gXRF0FmjUKyea6OLjD0jbVhUyd4Gy:y08FZoKq6OPM54Gy
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.171/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.185
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
smokeloader
pub5
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
redline
pab4
185.215.113.15:61506
Extracted
cryptbot
knucsj38.top
mornui03.top
-
payload_url
http://sarpuk04.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 6 IoCs
resource yara_rule behavioral1/memory/1736-405-0x0000000003A50000-0x0000000003AF3000-memory.dmp family_cryptbot behavioral1/memory/1736-406-0x0000000003A50000-0x0000000003AF3000-memory.dmp family_cryptbot behavioral1/memory/1736-407-0x0000000003A50000-0x0000000003AF3000-memory.dmp family_cryptbot behavioral1/memory/1736-408-0x0000000003A50000-0x0000000003AF3000-memory.dmp family_cryptbot behavioral1/memory/1736-420-0x0000000003A50000-0x0000000003AF3000-memory.dmp family_cryptbot behavioral1/memory/1736-661-0x0000000003A50000-0x0000000003AF3000-memory.dmp family_cryptbot -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/1700-191-0x0000000004800000-0x0000000004822000-memory.dmp family_redline behavioral1/memory/1700-368-0x00000000049A0000-0x00000000049C0000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/1700-191-0x0000000004800000-0x0000000004822000-memory.dmp family_sectoprat behavioral1/memory/1700-368-0x00000000049A0000-0x00000000049C0000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 4 IoCs
resource yara_rule behavioral1/memory/1484-134-0x0000000004740000-0x00000000047DD000-memory.dmp family_vidar behavioral1/memory/1484-137-0x0000000000400000-0x0000000002D0F000-memory.dmp family_vidar behavioral1/memory/1816-138-0x0000000002E70000-0x0000000002F70000-memory.dmp family_vidar behavioral1/memory/1484-370-0x0000000000400000-0x0000000002D0F000-memory.dmp family_vidar -
resource yara_rule behavioral1/files/0x0008000000016267-56.dat aspack_v212_v242 behavioral1/files/0x0009000000016197-58.dat aspack_v212_v242 behavioral1/files/0x000700000001680a-63.dat aspack_v212_v242 -
Executes dropped EXE 15 IoCs
pid Process 1140 setup_installer.exe 2492 setup_install.exe 1596 Wed21169b413f92.exe 556 Wed21746ccfd96fd.exe 1080 Wed21d1e9483738b.exe 1532 Wed21f92282e0ab.exe 1700 Wed2150f3d9f7dc84a.exe 1944 Wed21cbde2acf42c934.exe 1536 Wed21436e1faf2dd4.exe 1816 Wed21c4447a13b90bbc9.exe 1484 Wed218072e851deedb.exe 804 Wed21169b413f92.exe 636 Riconobbe.exe.com 2216 Riconobbe.exe.com 1736 Riconobbe.exe.com -
Loads dropped DLL 57 IoCs
pid Process 848 df4aec4fa5881cec4417c8f64ecb2107.exe 1140 setup_installer.exe 1140 setup_installer.exe 1140 setup_installer.exe 1140 setup_installer.exe 1140 setup_installer.exe 1140 setup_installer.exe 2492 setup_install.exe 2492 setup_install.exe 2492 setup_install.exe 2492 setup_install.exe 2492 setup_install.exe 2492 setup_install.exe 2492 setup_install.exe 2492 setup_install.exe 2796 cmd.exe 2984 cmd.exe 2796 cmd.exe 1596 Wed21169b413f92.exe 1596 Wed21169b413f92.exe 1008 cmd.exe 2352 cmd.exe 2352 cmd.exe 2672 cmd.exe 1864 cmd.exe 1924 cmd.exe 2800 cmd.exe 2800 cmd.exe 1536 Wed21436e1faf2dd4.exe 1536 Wed21436e1faf2dd4.exe 1700 Wed2150f3d9f7dc84a.exe 1700 Wed2150f3d9f7dc84a.exe 1944 Wed21cbde2acf42c934.exe 1944 Wed21cbde2acf42c934.exe 2416 cmd.exe 2416 cmd.exe 1484 Wed218072e851deedb.exe 1484 Wed218072e851deedb.exe 1816 Wed21c4447a13b90bbc9.exe 1816 Wed21c4447a13b90bbc9.exe 1596 Wed21169b413f92.exe 804 Wed21169b413f92.exe 804 Wed21169b413f92.exe 2212 WerFault.exe 2212 WerFault.exe 2212 WerFault.exe 1632 cmd.exe 2212 WerFault.exe 636 Riconobbe.exe.com 2216 Riconobbe.exe.com 696 WerFault.exe 696 WerFault.exe 696 WerFault.exe 696 WerFault.exe 696 WerFault.exe 696 WerFault.exe 696 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Wed21436e1faf2dd4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 19 iplogger.org 20 iplogger.org 31 iplogger.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2212 2492 WerFault.exe 29 696 1484 WerFault.exe 50 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed21c4447a13b90bbc9.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed21c4447a13b90bbc9.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed21c4447a13b90bbc9.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Riconobbe.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Riconobbe.exe.com -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Wed21f92282e0ab.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Wed21f92282e0ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Wed21f92282e0ab.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e Wed21f92282e0ab.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 0f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f0b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f007400000053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c0140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df01d0000000100000010000000918ad43a9475f78bb5243de886d8103c09000000010000000c000000300a06082b06010505070301030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47420000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 Wed21f92282e0ab.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Wed21f92282e0ab.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Wed21f92282e0ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Wed21f92282e0ab.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Wed21f92282e0ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 Wed21f92282e0ab.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 Wed21f92282e0ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Wed21f92282e0ab.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2896 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1816 Wed21c4447a13b90bbc9.exe 1816 Wed21c4447a13b90bbc9.exe 2028 powershell.exe 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1816 Wed21c4447a13b90bbc9.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1080 Wed21d1e9483738b.exe Token: SeDebugPrivilege 1532 Wed21f92282e0ab.exe Token: SeDebugPrivilege 2028 powershell.exe Token: SeShutdownPrivilege 1272 Process not Found Token: SeDebugPrivilege 1700 Wed2150f3d9f7dc84a.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 636 Riconobbe.exe.com 636 Riconobbe.exe.com 636 Riconobbe.exe.com 2216 Riconobbe.exe.com 1272 Process not Found 1272 Process not Found 2216 Riconobbe.exe.com 2216 Riconobbe.exe.com 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1736 Riconobbe.exe.com 1272 Process not Found 1272 Process not Found 1736 Riconobbe.exe.com 1736 Riconobbe.exe.com 1272 Process not Found 1272 Process not Found 1736 Riconobbe.exe.com 1736 Riconobbe.exe.com -
Suspicious use of SendNotifyMessage 11 IoCs
pid Process 636 Riconobbe.exe.com 636 Riconobbe.exe.com 636 Riconobbe.exe.com 2216 Riconobbe.exe.com 2216 Riconobbe.exe.com 2216 Riconobbe.exe.com 1272 Process not Found 1272 Process not Found 1736 Riconobbe.exe.com 1736 Riconobbe.exe.com 1736 Riconobbe.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 848 wrote to memory of 1140 848 df4aec4fa5881cec4417c8f64ecb2107.exe 28 PID 848 wrote to memory of 1140 848 df4aec4fa5881cec4417c8f64ecb2107.exe 28 PID 848 wrote to memory of 1140 848 df4aec4fa5881cec4417c8f64ecb2107.exe 28 PID 848 wrote to memory of 1140 848 df4aec4fa5881cec4417c8f64ecb2107.exe 28 PID 848 wrote to memory of 1140 848 df4aec4fa5881cec4417c8f64ecb2107.exe 28 PID 848 wrote to memory of 1140 848 df4aec4fa5881cec4417c8f64ecb2107.exe 28 PID 848 wrote to memory of 1140 848 df4aec4fa5881cec4417c8f64ecb2107.exe 28 PID 1140 wrote to memory of 2492 1140 setup_installer.exe 29 PID 1140 wrote to memory of 2492 1140 setup_installer.exe 29 PID 1140 wrote to memory of 2492 1140 setup_installer.exe 29 PID 1140 wrote to memory of 2492 1140 setup_installer.exe 29 PID 1140 wrote to memory of 2492 1140 setup_installer.exe 29 PID 1140 wrote to memory of 2492 1140 setup_installer.exe 29 PID 1140 wrote to memory of 2492 1140 setup_installer.exe 29 PID 2492 wrote to memory of 2300 2492 setup_install.exe 31 PID 2492 wrote to memory of 2300 2492 setup_install.exe 31 PID 2492 wrote to memory of 2300 2492 setup_install.exe 31 PID 2492 wrote to memory of 2300 2492 setup_install.exe 31 PID 2492 wrote to memory of 2300 2492 setup_install.exe 31 PID 2492 wrote to memory of 2300 2492 setup_install.exe 31 PID 2492 wrote to memory of 2300 2492 setup_install.exe 31 PID 2492 wrote to memory of 2796 2492 setup_install.exe 32 PID 2492 wrote to memory of 2796 2492 setup_install.exe 32 PID 2492 wrote to memory of 2796 2492 setup_install.exe 32 PID 2492 wrote to memory of 2796 2492 setup_install.exe 32 PID 2492 wrote to memory of 2796 2492 setup_install.exe 32 PID 2492 wrote to memory of 2796 2492 setup_install.exe 32 PID 2492 wrote to memory of 2796 2492 setup_install.exe 32 PID 2492 wrote to memory of 2800 2492 setup_install.exe 33 PID 2492 wrote to memory of 2800 2492 setup_install.exe 33 PID 2492 wrote to memory of 2800 2492 setup_install.exe 33 PID 2492 wrote to memory of 2800 2492 setup_install.exe 33 PID 2492 wrote to memory of 2800 2492 setup_install.exe 33 PID 2492 wrote to memory of 2800 2492 setup_install.exe 33 PID 2492 wrote to memory of 2800 2492 setup_install.exe 33 PID 2492 wrote to memory of 2984 2492 setup_install.exe 34 PID 2492 wrote to memory of 2984 2492 setup_install.exe 34 PID 2492 wrote to memory of 2984 2492 setup_install.exe 34 PID 2492 wrote to memory of 2984 2492 setup_install.exe 34 PID 2492 wrote to memory of 2984 2492 setup_install.exe 34 PID 2492 wrote to memory of 2984 2492 setup_install.exe 34 PID 2492 wrote to memory of 2984 2492 setup_install.exe 34 PID 2492 wrote to memory of 2416 2492 setup_install.exe 35 PID 2492 wrote to memory of 2416 2492 setup_install.exe 35 PID 2492 wrote to memory of 2416 2492 setup_install.exe 35 PID 2492 wrote to memory of 2416 2492 setup_install.exe 35 PID 2492 wrote to memory of 2416 2492 setup_install.exe 35 PID 2492 wrote to memory of 2416 2492 setup_install.exe 35 PID 2492 wrote to memory of 2416 2492 setup_install.exe 35 PID 2492 wrote to memory of 2352 2492 setup_install.exe 36 PID 2492 wrote to memory of 2352 2492 setup_install.exe 36 PID 2492 wrote to memory of 2352 2492 setup_install.exe 36 PID 2492 wrote to memory of 2352 2492 setup_install.exe 36 PID 2492 wrote to memory of 2352 2492 setup_install.exe 36 PID 2492 wrote to memory of 2352 2492 setup_install.exe 36 PID 2492 wrote to memory of 2352 2492 setup_install.exe 36 PID 2492 wrote to memory of 1924 2492 setup_install.exe 37 PID 2492 wrote to memory of 1924 2492 setup_install.exe 37 PID 2492 wrote to memory of 1924 2492 setup_install.exe 37 PID 2492 wrote to memory of 1924 2492 setup_install.exe 37 PID 2492 wrote to memory of 1924 2492 setup_install.exe 37 PID 2492 wrote to memory of 1924 2492 setup_install.exe 37 PID 2492 wrote to memory of 1924 2492 setup_install.exe 37 PID 2492 wrote to memory of 2672 2492 setup_install.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\df4aec4fa5881cec4417c8f64ecb2107.exe"C:\Users\Admin\AppData\Local\Temp\df4aec4fa5881cec4417c8f64ecb2107.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\7zS47449246\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS47449246\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:2300
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed21169b413f92.exe4⤵
- Loads dropped DLL
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\7zS47449246\Wed21169b413f92.exeWed21169b413f92.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\7zS47449246\Wed21169b413f92.exe"C:\Users\Admin\AppData\Local\Temp\7zS47449246\Wed21169b413f92.exe" -a6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:804
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed21c4447a13b90bbc9.exe4⤵
- Loads dropped DLL
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\7zS47449246\Wed21c4447a13b90bbc9.exeWed21c4447a13b90bbc9.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed21746ccfd96fd.exe4⤵
- Loads dropped DLL
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\7zS47449246\Wed21746ccfd96fd.exeWed21746ccfd96fd.exe5⤵
- Executes dropped EXE
PID:556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed218072e851deedb.exe4⤵
- Loads dropped DLL
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\7zS47449246\Wed218072e851deedb.exeWed218072e851deedb.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 9606⤵
- Loads dropped DLL
- Program crash
PID:696
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed2150f3d9f7dc84a.exe4⤵
- Loads dropped DLL
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\7zS47449246\Wed2150f3d9f7dc84a.exeWed2150f3d9f7dc84a.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed21cbde2acf42c934.exe4⤵
- Loads dropped DLL
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\7zS47449246\Wed21cbde2acf42c934.exeWed21cbde2acf42c934.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed21f92282e0ab.exe4⤵
- Loads dropped DLL
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\7zS47449246\Wed21f92282e0ab.exeWed21f92282e0ab.exe5⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed21436e1faf2dd4.exe4⤵
- Loads dropped DLL
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\7zS47449246\Wed21436e1faf2dd4.exeWed21436e1faf2dd4.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1536 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe6⤵PID:2456
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Del.doc6⤵PID:1812
-
C:\Windows\SysWOW64\cmd.execmd7⤵
- Loads dropped DLL
PID:1632 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^NZrkFJTgsCdMvCokxiUUxUBYmGUZCyshQzrAfUxHKQBByATJNifzJsTTnyLZOTMjkrVrmIWmMjlEaZSZNkkcPXDmmpwppcSQtfd$" Una.doc8⤵PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.comRiconobbe.exe.com H8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.com H9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.com H10⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1736
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping PIRBKNPS -n 308⤵
- Runs ping.exe
PID:2896
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed21d1e9483738b.exe4⤵
- Loads dropped DLL
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\7zS47449246\Wed21d1e9483738b.exeWed21d1e9483738b.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 4364⤵
- Loads dropped DLL
- Program crash
PID:2212
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c984eee398f12b93ee1a772bda61ad6
SHA1b61eff7451f8b3f0d899f9f8ef9aa5afdb5888bc
SHA256970f4afd75f2b213129a5c14c0c3442258816740890177dc73134cdf4aa397fa
SHA512f5e33f4b5b68d50bd2b28c88214aff3650d90d7fc0a0bd867997425611bf4f2cda3348e693137097eaeebb68986a183e5f1e96982b8c504ecba2c855ff4ff119
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
1.1MB
MD5d7ce9dd32864016ff370633f6fd76f6f
SHA186fa467506e7278e765fa49173d587914661ac16
SHA256eb217f73d476d5c6f9ca53c3b6060b0d287f3b3d632d902bcaa252898ad35611
SHA5120d72d97761954708870aac9cf78b9473f5026de6a4aec8159ce734acf55537481163aefd3289bfa0e9c5accd8bee101a3cdc5d68a25aa937b051e1bd893b486f
-
Filesize
2KB
MD5cfb17f421cf651465cfe7c833513f5dc
SHA1be14a03148e7256326a993a4b3917fc81e388fd9
SHA25627c68f8315a6f30c07c3e50df654c58a99319ec193bbd19e039c5ad6e215f7c2
SHA512858fccb3bf153eecee833768f3c50f08a4ed35b1115a80a4155ee2fdd82c29bb48b608353352049d170fc081bdbe910b3d6308898164d05b0ba9ad7208a98b15
-
Filesize
263KB
MD5fbbd83534d0b9bc916da1ebef9c218aa
SHA124a97e4dd088072a07259120c18f64d8e3d98793
SHA2561c5eeafca18a55b43c2dea3f4abe2f80f05713a91f0cce411d1d7d491ebc8bd3
SHA512b0946328887171002281a0b535bb92e832a4d51228f1268b68b63e8698e626a0b30909a17c4534d04bb68c98abad071c403c8a13ca9e1ec2c59fdaadd4025cbe
-
Filesize
241KB
MD55866ab1fae31526ed81bfbdf95220190
SHA175a5e08b3b9ad2dff35dfbbb3ffe8d983c2be25f
SHA2569e1a149370efe9814bf2cbd87acfcfa410d1769efd86a9722da4373d6716d22e
SHA5128d99ab09e84e4ef309da34be94946cbfcffeb1c0ca49e2452deb738d801e551062ebb134f1b99a9baf03003a8e720d525521ce09aeac341d3cba3fcfbc618fb5
-
Filesize
384KB
MD536f62e5a79978d16ae4f1567d3cf4c20
SHA12bcfeaf1a9279b6ba61c9f400f6a1ab548b3a42d
SHA25608198696dc86ee40f2e7ce1f52d7c8a365bad0ce631a81e32d96c1599570144f
SHA5126f50acbd9d0531f66a9362672cf1eee6646fb1ce6365c842adcd797311663c77191df0cc958b2cb69b08deca639a2d629631bd6d1b2b8bc813a9ce36cd9bf849
-
Filesize
145KB
MD57c56ee6e10f838dbda3c50620f273062
SHA16abe18cd2633337f092e4a006a3ba2054c047bd3
SHA256ee0f920154c560792ac34badc5ba8cbd5f40aec3b275088619571df65c9f51ee
SHA5122c5335ae77e134b1eb8e9d7524a8eb988c45e8d875f3ebcd5c38bbf0734ec1f930906c14ca1b19d82608676ac6b06279ca70ff5b960a62dd6d0e4de3a7c1c26f
-
Filesize
448KB
MD525ceeb1901e9bddc0a77a2c4fb3d3399
SHA13137ba7d75e634e7fe2b00f8a033b7b91b72e5ac
SHA25666f0f46a5a271424d695ed219be18745a822a6f59fbdb2c1be878d45a512b826
SHA512d7eda88d0bcbca5d7800a9e78063fed6dd4acd78345bde4119263cc38f36908176df22501a0ed4bdde667615ebeb73da56ff565cfd3e0f7ae223c77d085ccdaf
-
Filesize
627KB
MD5d06aa46e65c291cbf7d4c8ae047c18c5
SHA1d7ef87b50307c40ffb46460b737ac5157f5829f0
SHA2561cd9a6908f8a5d58487e6cfea76a388a927f1569ba2b2459f25fffaf8180230f
SHA5128d5f6605a38e7c45a44127438bf7d6bf6a54aacb0b67b3669eb9609fc1084145f827a8341ce6b1a544198b5633d9f92561bd9f9cc82b52473db0926787a06ea4
-
Filesize
8KB
MD577c6eb4eb2a045c304ae95ef5bbaa2b2
SHA1eeb4a9ab13957bfafd6e015f65c09ba65b3d699c
SHA2563e35832690fd1115024f918f4bc37e756b1617ae628e55b94f0e04045e57b49b
SHA512e1e7bd4d5a3f80d88b2b0da8b5922fb678b7c63e2e81a37bd01b582c0b5a4d881daaf66a1e2083bbbf0581d42d0eabb8268f9fa5404c3d454fdd68f398d57a87
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
1.4MB
MD586abb3ba0af07121ba3a296559fb66cc
SHA1dbc4dd60417cc9a817baaf7dfc9bcfe8587e8796
SHA256c0388bc59fb8ed53b5507b6e3632a82f4af892b0de2650adf5e508821a81d1a9
SHA5124a11fe2f1448ba96021188b85111babd997bdee70b7ff98f46106574633ebfc6b3b86c2f978f33d05971b3f7aa215b58e4217fc2c0dc6872582277a2d083e3e2
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
3KB
MD5c6106dc555fed72b6652bb20b07f5560
SHA157210beee6fba43333d3497e46864f6893a14438
SHA25614ed26390b20066459e92e741243d9d18d950a5aa86e95c80ec3b12872950528
SHA51257fa65649d73f9d30ecb4947f57c270d7efb15f32eab889eb2686502ed141dc83ac684d9e779ae0d0eb6b23cc0a6acce21e59caa57869f1ad5edec2296931dec
-
Filesize
8KB
MD53f09896f604b7cb4e4ed43fd7992e3b0
SHA1533d951e1f645807a216ab61d34dd1482579dbf8
SHA2565f0205d6b9330658f56de95835237dbe75217648894c521a4b46d2e29913c9d8
SHA512cc8708483ebdbfc9b4139ba591c4a094db13691dbc6f626f5ef10849e50230531ac40dd5bdfa1a5b6a67dd471e1bb66f21bc39cea742c91bbfa6d592773e604e
-
Filesize
48KB
MD5f94a05fe2f409ebca8df6e67fa47e2cb
SHA11bee8c73fccc52bb75df2ba69ff70cce6fb96057
SHA256d1222bbdd5d34d00118a06757e7c484e2d0413772023a0923032c7a5f20f0613
SHA512a09c2c8f0b9d2d6c3f9fd8f517591470b09c70cc2f3bbdc2b9d4bda7e01763db7062463bb2c70678b70cd56523cb777b611721fa2334aaed4e747cfcc1821ba5
-
Filesize
8KB
MD5dea5c123ddbe99957787671225c18f34
SHA1e72860d7649450cd5919d3a6261b7a8176cd4cef
SHA2566ab72cd5769ac1b65397ad206290a417c9b75cb8f910428d70d2ae0dc69efa36
SHA512428e0f488e756177481d2970c140ef0ec6c40d2e86519e97563a3b16532624af9cd3d430903064b7479bdfc312717472b989b619f6952c4b8cd3d759f8248e0f
-
Filesize
39KB
MD5a1ebd5836944efe7225d9aa27aaa2fec
SHA1f1e8633c8fbf0d30dd99232629322d9862d63f12
SHA2562a52220fa5efbe45cc5ae76cdfc3a905d6dfb8d00f0050898cadddfb8a43730e
SHA51297844f97a5cbc92d6475821c7032096520246aa21e36425640d8a5cbbb97ecaa85353d5c660f51a2ca0d966bf7a95f1de7ef047c3a6af28d9feae4cb5c1e0310
-
Filesize
1.4MB
MD585a4bac92fe4ff5d039c8913ffd612d8
SHA1d639bce7bcef59dfa67d67e4bd136fb1cfba2333
SHA256416264057dcf0e658046aee3665762203640d4c35851afe0962562a15164f26d
SHA5121aca1cb35fa04600038e183bf628872dcefee526334df3f40afe384908baeffb351719bfd2dbd5368fcc4f3641f8575f87a03a828bc68f2ee4741737a6b4a0f6
-
Filesize
8KB
MD5017a472f008a0f6b6ec5922f7cb204c0
SHA194793774e825433f90478dc685eaa5c70e8aab9f
SHA2565425de9608917ab15833572573982e486b57a0e54441acc31d2ab071405754ee
SHA512ad0bf2797fe652ccdcd95af9abf0e7dc587af46bddac4453d6df368167e161fb519802ac49d330c18e558c0da44547e14f23f5ea2b405d117088462f4a68c0e9
-
Filesize
512KB
MD5b537de158acc47e4046e2451102a6521
SHA1d8d565bcd67fe2101b6282825e1880574565e0c2
SHA2568b1a1eaf29a916118eb24c4f009ff3e471a9ab96266a8562e814b8b60dfe9aae
SHA51279f4e2a738aabd4710b2d0e545f5e577ea925513b46094299eec3201d6d304eaa6fbcaedb5ee0082fd097ce2b8f77bb84c89a6743fb8d61880137f33e9bbbb85
-
Filesize
106KB
MD503787a29b0f143635273fb2d57224652
SHA1294f3693d41b7f563732c1660d2ce0a53edcae60
SHA256632a80a9deae6512eebcf8b74e93d6f2b92124ebce4e76301c662f36e697a17c
SHA5124141d89abd8139e1d3054dcb0cd3f35a52a40c69aac4d1d2ec785ff6536ecf84a5e688faeb68ba9ed9ed44c0654d4295c6d3641b5286320ee54106b66fbbcecd
-
Filesize
2.1MB
MD5f496fba37aa519c0054e7f13c9447366
SHA12611622f1eab552c4f833c859914633502beae4d
SHA2566f3c23051d4d0287c6d3447f1f7bb815dbc7a2a5a9ab83c07eb63f4c6d4b3bd1
SHA51239d90468960407ef88fbdb1ed6f4a216455b465170cb173a08b68f1d8ef99e4642273d93d848d73343b2c1c5b27f89bdb29f68ae1cac818d04740cc46ecc66b2
-
Filesize
448KB
MD5e807c9c9760b50dd8e35d1bb988e4b76
SHA18bbeddc52ea60fcdc2b968566914c5e8dff9f6f1
SHA2567ec23be8e5971d316b77ffee997eecdaefa1d667a60bed40f2504a65ad17c575
SHA512684cdb16fecfedaa036662bfe4515ad5852bbcacf7c0e9dec559ae169bed14af35c5ea0d258e2f4b305714252b459158908fed558a1d3aea268c1fb96b552adc
-
Filesize
1.8MB
MD51c17d3e6d640d3548318ac561edb572e
SHA102c982701dab488842a3fd8030949a6628b5fbfc
SHA25658763eea0b13ee572abe530555af0ade96678ef01726140c73cbe5fa043f0984
SHA512a54cf5127de3b0d192e5abd44b6ef2ae45e362dfd62d1c157b35f845257e0f9233f9096b19e25227a212cdd04bf4992757ba8d5d02bfd8d9637fdac356ec7c47
-
Filesize
576KB
MD52a469d73fd20e2dc468d9ece4be085da
SHA16adef51ff8f031688f2385a2f21985f13f152c57
SHA256a495817ed73ee9574bd634527ee67ead3b63f99df4fe24201d09a0c5eb025a25
SHA51225310f89b3860ae57732da1f669467d0aacc4bd13b0f3cb6e23b2a18218840af3c427934c4f7bc568761884d7afffea304262e4b3cfcdb74b5173c7996e78266
-
Filesize
3.8MB
MD5b54dc8e807ef2ab8b1ea4f2977d030dc
SHA14ed1449a168cd87f0ecf7c0ea03e626ee6d3b097
SHA2564cb6232d5148b7f65da9f0cf4b67c85102ec799f717054d4c7130d98d577b466
SHA5125e3577eebc5a734674bc32a1b2357d663abac599823141b6022b7b1ad2df97fe4f0ef3634aa258f989b77c47b6512c8d68e6bbf15fd3a55dc1c4a61d027bed95