Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/04/2024, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
ca53d2999d03224645aa0286d276d5f546a1651b09525463f1a4c9ae5214c44c.exe
Resource
win10v2004-20240412-en
General
-
Target
ca53d2999d03224645aa0286d276d5f546a1651b09525463f1a4c9ae5214c44c.exe
-
Size
1.8MB
-
MD5
6494e2a481a49e8ccf7faedabdf340e7
-
SHA1
78800e726a00b45f291456b11388d7007f8c5d65
-
SHA256
ca53d2999d03224645aa0286d276d5f546a1651b09525463f1a4c9ae5214c44c
-
SHA512
697a146ef7dd9a1d20242d8d45724ad8e59a80fc91814a2015481a7794ade56a9e7a1b6391be659397b91500a49db00d47d90925a45ed427801ba1f321f1c20d
-
SSDEEP
24576:r8etaVzAJSZG9sj+BhL2pEHdOLqAJrWwH6tUXnfVMtktOuXsglvMhFv:roVzAJT/vHdVARWwatMfYwbYv
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
redline
@OLEH_PSP
185.172.128.33:8970
Extracted
stealc
http://52.143.157.84
-
url_path
/c73eed764cc59dcb.php
Extracted
risepro
147.45.47.93:58709
Signatures
-
Detect ZGRat V1 2 IoCs
resource yara_rule behavioral2/files/0x000100000002a9ec-32.dat family_zgrat_v1 behavioral2/memory/4552-65-0x0000000000E20000-0x0000000000FDC000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral2/files/0x000100000002a9f6-111.dat family_redline behavioral2/files/0x000100000002a9f7-118.dat family_redline behavioral2/memory/1248-128-0x0000000000E50000-0x0000000000EA2000-memory.dmp family_redline behavioral2/memory/2072-135-0x0000000000EC0000-0x0000000000F4C000-memory.dmp family_redline behavioral2/files/0x000200000002aa11-333.dat family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ca53d2999d03224645aa0286d276d5f546a1651b09525463f1a4c9ae5214c44c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe -
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/1132-656-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1132-657-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1132-659-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1132-661-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1132-660-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1132-662-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1132-663-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Blocklisted process makes network request 2 IoCs
flow pid Process 33 4948 rundll32.exe 37 3440 rundll32.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ca53d2999d03224645aa0286d276d5f546a1651b09525463f1a4c9ae5214c44c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ca53d2999d03224645aa0286d276d5f546a1651b09525463f1a4c9ae5214c44c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe -
Executes dropped EXE 17 IoCs
pid Process 4808 explorgu.exe 4552 alexxxxxxxx.exe 724 gold.exe 804 NewB.exe 2072 Traffic.exe 1248 propro.exe 1864 FirstZ.exe 4408 swiiiii.exe 2868 Uni400uni.exe 3248 random.exe 3288 file300un.exe 4772 jok.exe 1960 swiiii.exe 1588 DocuWorks.exe 2528 reakuqnanrkn.exe 1300 NewB.exe 3568 NewB.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2516240262-2296879883-3965305654-1000\Software\Wine ca53d2999d03224645aa0286d276d5f546a1651b09525463f1a4c9ae5214c44c.exe Key opened \REGISTRY\USER\S-1-5-21-2516240262-2296879883-3965305654-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-2516240262-2296879883-3965305654-1000\Software\Wine random.exe -
Loads dropped DLL 5 IoCs
pid Process 780 rundll32.exe 4948 rundll32.exe 3440 rundll32.exe 1488 RegAsm.exe 1488 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1132-649-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1132-650-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1132-651-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1132-652-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1132-655-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1132-656-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1132-657-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1132-659-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1132-661-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1132-660-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1132-662-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1132-663-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2516240262-2296879883-3965305654-1000\Software\Microsoft\Windows\CurrentVersion\Run\random.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001084001\\random.exe" explorgu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 4 pastebin.com 24 pastebin.com 34 pastebin.com 40 pastebin.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe FirstZ.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe reakuqnanrkn.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 3344 ca53d2999d03224645aa0286d276d5f546a1651b09525463f1a4c9ae5214c44c.exe 4808 explorgu.exe 3248 random.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 724 set thread context of 828 724 gold.exe 82 PID 4552 set thread context of 3348 4552 alexxxxxxxx.exe 83 PID 4408 set thread context of 3944 4408 swiiiii.exe 96 PID 2868 set thread context of 2636 2868 Uni400uni.exe 101 PID 3288 set thread context of 2620 3288 file300un.exe 114 PID 1960 set thread context of 1488 1960 swiiii.exe 124 PID 2528 set thread context of 3108 2528 reakuqnanrkn.exe 181 PID 2528 set thread context of 1132 2528 reakuqnanrkn.exe 186 PID 1588 set thread context of 4760 1588 DocuWorks.exe 187 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorgu.job ca53d2999d03224645aa0286d276d5f546a1651b09525463f1a4c9ae5214c44c.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3816 sc.exe 2224 sc.exe 4796 sc.exe 1180 sc.exe 8 sc.exe 1400 sc.exe 4436 sc.exe 2276 sc.exe 3764 sc.exe 2152 sc.exe 4532 sc.exe 704 sc.exe 1084 sc.exe 1176 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3892 4408 WerFault.exe 92 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3808 schtasks.exe -
Modifies data under HKEY_USERS 50 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 propro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 propro.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3344 ca53d2999d03224645aa0286d276d5f546a1651b09525463f1a4c9ae5214c44c.exe 3344 ca53d2999d03224645aa0286d276d5f546a1651b09525463f1a4c9ae5214c44c.exe 4808 explorgu.exe 4808 explorgu.exe 2868 Uni400uni.exe 4948 rundll32.exe 4948 rundll32.exe 4948 rundll32.exe 4948 rundll32.exe 4948 rundll32.exe 4948 rundll32.exe 3248 random.exe 3248 random.exe 3288 file300un.exe 3288 file300un.exe 4948 rundll32.exe 4948 rundll32.exe 4948 rundll32.exe 4948 rundll32.exe 2072 Traffic.exe 2072 Traffic.exe 472 powershell.exe 472 powershell.exe 472 powershell.exe 1248 propro.exe 1248 propro.exe 1488 RegAsm.exe 1488 RegAsm.exe 1864 FirstZ.exe 4772 jok.exe 4772 jok.exe 4772 jok.exe 4772 jok.exe 128 powershell.exe 128 powershell.exe 128 powershell.exe 1248 propro.exe 1248 propro.exe 1248 propro.exe 1248 propro.exe 1864 FirstZ.exe 1864 FirstZ.exe 4772 jok.exe 1864 FirstZ.exe 1864 FirstZ.exe 1864 FirstZ.exe 1864 FirstZ.exe 1864 FirstZ.exe 1864 FirstZ.exe 1864 FirstZ.exe 1864 FirstZ.exe 1864 FirstZ.exe 1864 FirstZ.exe 1864 FirstZ.exe 1864 FirstZ.exe 2528 reakuqnanrkn.exe 1488 RegAsm.exe 1488 RegAsm.exe 1464 powershell.exe 1464 powershell.exe 1464 powershell.exe 2528 reakuqnanrkn.exe 2528 reakuqnanrkn.exe 2528 reakuqnanrkn.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 688 Process not Found -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 2072 Traffic.exe Token: SeDebugPrivilege 2868 Uni400uni.exe Token: SeBackupPrivilege 2072 Traffic.exe Token: SeSecurityPrivilege 2072 Traffic.exe Token: SeSecurityPrivilege 2072 Traffic.exe Token: SeSecurityPrivilege 2072 Traffic.exe Token: SeSecurityPrivilege 2072 Traffic.exe Token: SeDebugPrivilege 2636 regasm.exe Token: SeDebugPrivilege 3288 file300un.exe Token: SeDebugPrivilege 2620 regsvcs.exe Token: SeDebugPrivilege 472 powershell.exe Token: SeDebugPrivilege 1248 propro.exe Token: SeDebugPrivilege 128 powershell.exe Token: SeDebugPrivilege 4772 jok.exe Token: SeDebugPrivilege 3348 RegAsm.exe Token: SeShutdownPrivilege 420 powercfg.exe Token: SeCreatePagefilePrivilege 420 powercfg.exe Token: SeShutdownPrivilege 2356 powercfg.exe Token: SeCreatePagefilePrivilege 2356 powercfg.exe Token: SeShutdownPrivilege 3188 powercfg.exe Token: SeCreatePagefilePrivilege 3188 powercfg.exe Token: SeShutdownPrivilege 724 powercfg.exe Token: SeCreatePagefilePrivilege 724 powercfg.exe Token: SeDebugPrivilege 1464 powershell.exe Token: SeShutdownPrivilege 1352 powercfg.exe Token: SeCreatePagefilePrivilege 1352 powercfg.exe Token: SeShutdownPrivilege 3788 powercfg.exe Token: SeCreatePagefilePrivilege 3788 powercfg.exe Token: SeShutdownPrivilege 3816 powercfg.exe Token: SeCreatePagefilePrivilege 3816 powercfg.exe Token: SeShutdownPrivilege 4152 powercfg.exe Token: SeCreatePagefilePrivilege 4152 powercfg.exe Token: SeLockMemoryPrivilege 1132 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3344 ca53d2999d03224645aa0286d276d5f546a1651b09525463f1a4c9ae5214c44c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 4552 4808 explorgu.exe 79 PID 4808 wrote to memory of 4552 4808 explorgu.exe 79 PID 4808 wrote to memory of 4552 4808 explorgu.exe 79 PID 4808 wrote to memory of 724 4808 explorgu.exe 81 PID 4808 wrote to memory of 724 4808 explorgu.exe 81 PID 4808 wrote to memory of 724 4808 explorgu.exe 81 PID 724 wrote to memory of 828 724 gold.exe 82 PID 724 wrote to memory of 828 724 gold.exe 82 PID 724 wrote to memory of 828 724 gold.exe 82 PID 724 wrote to memory of 828 724 gold.exe 82 PID 724 wrote to memory of 828 724 gold.exe 82 PID 724 wrote to memory of 828 724 gold.exe 82 PID 724 wrote to memory of 828 724 gold.exe 82 PID 724 wrote to memory of 828 724 gold.exe 82 PID 724 wrote to memory of 828 724 gold.exe 82 PID 4552 wrote to memory of 3348 4552 alexxxxxxxx.exe 83 PID 4552 wrote to memory of 3348 4552 alexxxxxxxx.exe 83 PID 4552 wrote to memory of 3348 4552 alexxxxxxxx.exe 83 PID 4552 wrote to memory of 3348 4552 alexxxxxxxx.exe 83 PID 4552 wrote to memory of 3348 4552 alexxxxxxxx.exe 83 PID 4552 wrote to memory of 3348 4552 alexxxxxxxx.exe 83 PID 4552 wrote to memory of 3348 4552 alexxxxxxxx.exe 83 PID 4552 wrote to memory of 3348 4552 alexxxxxxxx.exe 83 PID 4808 wrote to memory of 804 4808 explorgu.exe 84 PID 4808 wrote to memory of 804 4808 explorgu.exe 84 PID 4808 wrote to memory of 804 4808 explorgu.exe 84 PID 804 wrote to memory of 3808 804 NewB.exe 85 PID 804 wrote to memory of 3808 804 NewB.exe 85 PID 804 wrote to memory of 3808 804 NewB.exe 85 PID 3348 wrote to memory of 2072 3348 RegAsm.exe 87 PID 3348 wrote to memory of 2072 3348 RegAsm.exe 87 PID 3348 wrote to memory of 1248 3348 RegAsm.exe 89 PID 3348 wrote to memory of 1248 3348 RegAsm.exe 89 PID 3348 wrote to memory of 1248 3348 RegAsm.exe 89 PID 804 wrote to memory of 1864 804 NewB.exe 90 PID 804 wrote to memory of 1864 804 NewB.exe 90 PID 4808 wrote to memory of 4408 4808 explorgu.exe 92 PID 4808 wrote to memory of 4408 4808 explorgu.exe 92 PID 4808 wrote to memory of 4408 4808 explorgu.exe 92 PID 804 wrote to memory of 2868 804 NewB.exe 94 PID 804 wrote to memory of 2868 804 NewB.exe 94 PID 4408 wrote to memory of 3944 4408 swiiiii.exe 96 PID 4408 wrote to memory of 3944 4408 swiiiii.exe 96 PID 4408 wrote to memory of 3944 4408 swiiiii.exe 96 PID 4408 wrote to memory of 3944 4408 swiiiii.exe 96 PID 4408 wrote to memory of 3944 4408 swiiiii.exe 96 PID 4408 wrote to memory of 3944 4408 swiiiii.exe 96 PID 4408 wrote to memory of 3944 4408 swiiiii.exe 96 PID 4408 wrote to memory of 3944 4408 swiiiii.exe 96 PID 4408 wrote to memory of 3944 4408 swiiiii.exe 96 PID 4808 wrote to memory of 2652 4808 explorgu.exe 98 PID 4808 wrote to memory of 2652 4808 explorgu.exe 98 PID 4808 wrote to memory of 2652 4808 explorgu.exe 98 PID 2868 wrote to memory of 2636 2868 Uni400uni.exe 101 PID 2868 wrote to memory of 2636 2868 Uni400uni.exe 101 PID 2868 wrote to memory of 2636 2868 Uni400uni.exe 101 PID 2868 wrote to memory of 2636 2868 Uni400uni.exe 101 PID 2868 wrote to memory of 2636 2868 Uni400uni.exe 101 PID 2868 wrote to memory of 2636 2868 Uni400uni.exe 101 PID 2868 wrote to memory of 2636 2868 Uni400uni.exe 101 PID 2868 wrote to memory of 2636 2868 Uni400uni.exe 101 PID 2868 wrote to memory of 3396 2868 Uni400uni.exe 102 PID 2868 wrote to memory of 3396 2868 Uni400uni.exe 102 PID 2868 wrote to memory of 3396 2868 Uni400uni.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca53d2999d03224645aa0286d276d5f546a1651b09525463f1a4c9ae5214c44c.exe"C:\Users\Admin\AppData\Local\Temp\ca53d2999d03224645aa0286d276d5f546a1651b09525463f1a4c9ae5214c44c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3344
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\1000985001\alexxxxxxxx.exe"C:\Users\Admin\AppData\Local\Temp\1000985001\alexxxxxxxx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:2584
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:1504
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001053001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1001053001\gold.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:828
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe"C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe" /F3⤵
- Creates scheduled task(s)
PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\1000191001\FirstZ.exe"C:\Users\Admin\AppData\Local\Temp\1000191001\FirstZ.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1864 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:1304
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:3432
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:8
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:704
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:2276
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:3764 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2844
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:2152
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:420
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:724
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "WSNKISKT"4⤵
- Launches sc.exe
PID:3816
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "WSNKISKT" binpath= "C:\ProgramData\wikombernizc\reakuqnanrkn.exe" start= "auto"4⤵
- Launches sc.exe
PID:1400
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:2224
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "WSNKISKT"4⤵
- Launches sc.exe
PID:1084
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000192001\Uni400uni.exe"C:\Users\Admin\AppData\Local\Temp\1000192001\Uni400uni.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"4⤵PID:3396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001073001\swiiiii.exe"C:\Users\Admin\AppData\Local\Temp\1001073001\swiiiii.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 8803⤵
- Program crash
PID:3892
-
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"2⤵PID:2652
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
PID:780 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4948 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:2844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\516240262229_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:472
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001084001\random.exe"C:\Users\Admin\AppData\Local\Temp\1001084001\random.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\1001085001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1001085001\file300un.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3288 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"3⤵PID:4288
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001107001\jok.exe"C:\Users\Admin\AppData\Local\Temp\1001107001\jok.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\1001108001\swiiii.exe"C:\Users\Admin\AppData\Local\Temp\1001108001\swiiii.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4396
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:3440
-
-
C:\Users\Admin\AppData\Local\Temp\1001152001\DocuWorks.exe"C:\Users\Admin\AppData\Local\Temp\1001152001\DocuWorks.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1588 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe3⤵PID:4760
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4408 -ip 44081⤵PID:4004
-
C:\ProgramData\wikombernizc\reakuqnanrkn.exeC:\ProgramData\wikombernizc\reakuqnanrkn.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:1748
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:1320
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:4532
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:4796
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:1176
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:1180
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:4436
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:3108
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe1⤵
- Executes dropped EXE
PID:1300
-
C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe1⤵
- Executes dropped EXE
PID:3568
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
3KB
MD5ae626d9a72417b14570daa8fcd5d34a4
SHA1c103ebaf4d760df722d620df87e6f07c0486439f
SHA25652cc3f3028fab0d347a4a3fffef570b42f85748176d81a3344996d42fd1de32a
SHA512a0690bda318bdf43d6f292f88d4ea2ebeec83b95e9ebca80083dbb08e7ddcdb9735cc58b89d369a34f10acf8a114d4a207ed8d0f070c5baf87c5798e9f35bc14
-
Filesize
1KB
MD5b3a83d0196afc480a90a1e7444210036
SHA16376ef283df20976769287b3bdc6bcd5d5ce371f
SHA2563ac4190b1c447f3b5365b056150575ec779ffba10b82d940c93009e2f6809a07
SHA512dfff8f23370ae8ab390b8a3dd675dd71ca6a8d0fac0f0c9a8b43453763ba5fa96a79a4b5a8891bcac86996471b912ca51dfc6b877d647391d14e355191d77370
-
Filesize
1.8MB
MD56494e2a481a49e8ccf7faedabdf340e7
SHA178800e726a00b45f291456b11388d7007f8c5d65
SHA256ca53d2999d03224645aa0286d276d5f546a1651b09525463f1a4c9ae5214c44c
SHA512697a146ef7dd9a1d20242d8d45724ad8e59a80fc91814a2015481a7794ade56a9e7a1b6391be659397b91500a49db00d47d90925a45ed427801ba1f321f1c20d
-
Filesize
2.5MB
MD5ffada57f998ed6a72b6ba2f072d2690a
SHA16857b5f0c40a1cdb0411eb34aa9fe5029bcdb84f
SHA256677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12
SHA5121de77f83a89935bb3fc3772d5190c3827d76a998785d451e2c0d11a0061cfd28f1b96eccb41b012c76ddda2021e3333a0a647489ae3c6dac10cfb8302abdf33f
-
Filesize
383KB
MD581f2e982687c695ee0bbadf147feca3b
SHA1b33a15b47c3b99c65f2277562a928bf9ce9dabf7
SHA256b1bf0f6717341cb605ebf48e85805282b77e5a3d610f211b90e4ec726b448331
SHA51216461398006e12c7acc47ae87859bc4567405a7fdca2e3d13863cf14b424036c1703d882f30a3e4aa62a2cec9d8c994b6fa823ba8250ec0e6ba35f52ae2ecf05
-
Filesize
1.7MB
MD585a15f080b09acace350ab30460c8996
SHA13fc515e60e4cfa5b3321f04a96c7fb463e4b9d02
SHA2563a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b
SHA512ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f
-
Filesize
308KB
MD5818b475b766c54df6d845cb10b6eedcf
SHA169ba418b84f5eb0930ba483c8fb1d8416b0b8749
SHA2568ceca5e241d721a22aa11fa5fc0700c394c9c809fc2565458dedf5c45e99c478
SHA51293371ece9326b2e88425c01d4f6f7dcc19ae5ee252295d8ddf283bc21ae4f5a72761b0f3ae1204dc85fcd1a11096ccd6c3af4b9e6a85ad9833e8cb06b85c5ca4
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
321KB
MD51c7d0f34bb1d85b5d2c01367cc8f62ef
SHA133aedadb5361f1646cffd68791d72ba5f1424114
SHA256e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c
SHA51253bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d
-
Filesize
2.1MB
MD55b25b32ad1a1f314805ae9a2d52c3955
SHA1e18523eb5cf1a8724f200e309df06a61846dfefe
SHA25631529f97328eec072db4d1a069e21ca4d1266f53be5c826e5b2ef6a9ccb1cd6c
SHA512accac655e5c6672837d136534faec341ba35231f9cebfe1aeb1d0a82d14c6ac2b5619cee0dee451814501a6c656e353eb2514cb2a2d4b3f297b0245ea427724d
-
Filesize
384KB
MD53170aed3eb44bd638cce6f67650d4b50
SHA122519afd371ed56fe6b4b4565534e09d0dd20453
SHA256d562b3b44859f761645676e0c0e7daad1226c5b90f53b4fe5e5395bf77454ec7
SHA5127e7c6289de619d06a7ca36fdb11d3d1a04e0913dffcfabac7af71213e2e8c54bb367ecf318b07e40b8734d3a7db92cb5de6f73e99caa9c254eec876130c93f36
-
Filesize
304KB
MD58510bcf5bc264c70180abe78298e4d5b
SHA12c3a2a85d129b0d750ed146d1d4e4d6274623e28
SHA256096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6
SHA5125ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d
-
Filesize
158KB
MD5586f7fecacd49adab650fae36e2db994
SHA135d9fb512a8161ce867812633f0a43b042f9a5e6
SHA256cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e
SHA512a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772
-
Filesize
8.9MB
MD5a4ac2edda7280dfabfc0e168ad4a0f71
SHA1c545cd8c7801f480ea3f311d7ab2fe8b79b8c85b
SHA256ec0949ba67afa666619ee7906753c470adaac94331f67a9d968405c57f3474d4
SHA512915f40c008695d1ecb656e6a54ec79f8a69eff42b9a33f5060a0ec0b58b80f3493773e229a9dc10855ce457b8ab138b4750541fccf4eb1196aca792943bdecd8
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
46KB
MD58f5942354d3809f865f9767eddf51314
SHA120be11c0d42fc0cef53931ea9152b55082d1a11e
SHA256776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea
SHA512fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218
-
Filesize
46KB
MD514ccc9293153deacbb9a20ee8f6ff1b7
SHA146b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3
SHA2563195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511
SHA512916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
541KB
MD51fc4b9014855e9238a361046cfbf6d66
SHA1c17f18c8246026c9979ab595392a14fe65cc5e9f
SHA256f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50
SHA5122af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12
-
Filesize
304KB
MD5cc90e3326d7b20a33f8037b9aab238e4
SHA1236d173a6ac462d85de4e866439634db3b9eeba3
SHA256bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7
SHA512b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521
-
Filesize
2KB
MD5993b43112400ae37ddd5d7fa29c0892c
SHA17e4b9e5b3480e981181723f7b560f6e17a84739a
SHA256f7cec02ad6b3e47b171f133ee183f6f2d14114a1b4028ef36d0085c047ade9b9
SHA51266b4da6f4efe2ee9dfa54bc55f322ca008f14a7714ab1e89152219f7d2b197934f0d673aca99e336763ed76d0598656f2166f7cd1cd464664fa42207eb520a73
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
2KB
MD5ec7d005fe8bea530a969d82ae14c638b
SHA1e7ff6e1d715b3af383dcbadf338815319c3b3641
SHA25628081fe397f2413ed2cdea49176764f39e2eb05503dbbbbab022fab0f5ed8f3b
SHA512799c9c207b6f24c823174bce0bb70deb3e8b98474b6b5845872bb9c8e0a782096ce12f85ffd0c9ba376c76239197b873ae93ce2eec18c8943934c0eda3cf04b0